We're all living codes.

Source: Internet
Author: User
Keywords Code whereabouts really.
Tags account password alipay alipay wallet apple authentication behavior biometric technology certification

Absrtact: In 2054, your whereabouts are at your disposal, no matter where you go, the subway or the building. Because everyone's iris information is stored in the computer, countless iris scanners are staring at you. This is the scene from the Minority Report. 2015, you sell Meng

In 2054, your whereabouts are kept in mind wherever you go, the subway or the building. Because everyone's iris information is stored in the computer, countless iris scanners are staring at you. This is the scene from the Minority Report.

2015, you sell Meng to the mobile phone shouted a "Dear most handsome", money immediately to the account; Staring at the treasure page of the baby look 10 seconds, payment success. This may be the reality of the scene.

In fact, I also see some magical means of payment, I dare to imagine such a future. Ant Gold has a secret organization that specializes in the human body's code. Making a payment version of "Minority Report" is only a small part of its work, its name is "seven workshop".

We're all living codes.

We have been asked to enter the password countless times, not so annoying and helpless. These increasingly tedious tasks are, in the final analysis, one thing: proving that the current operator is you. The machine is not a parade, only through the data for comparison verification. As a result, the password is the most commonly used security authentication method. But the problem is, the password is possible to be stolen! This is the same as the key, the thief stole your key can enter your door. The door knows only the key, it is not a dog, will not recognize the host.

We will naturally find the key that cannot be stolen. For biology, there are two kinds of characteristics that are not easy to change: one is biological characteristic, the other is behavior habit, which is the main two directions of the seven workshops engaged in the research and development of biometric authentication. Comprehensive consideration of technology, cost, safety, ease of use and other factors, at this stage, the focus of seven biological identification technology plant has six kinds, respectively, is the face, voice, fingerprint, palm, handwriting and keyboard percussion. Six kinds of technology, each have the use of each scene.

First, palmprint recognition. The Palmprint is "a living two-dimensional code", contains a wealth of information, we often say that the lifeline, career line, Love Line is the most common pattern characteristics, the number of large and irregular wise also have texture features, the width of the palm, length and provide geometric features, these can "link to the only individual." Using a mobile phone camera, scanning the palm print, you can definitely determine the identity of a person. QI Workshop has independently developed a skin detection, palmprint positioning, cutting and recognition algorithms, in small payments and mobile phone-binding applications such as the use of the scene.

Of course, if your girlfriend is good at prodigal, you don't have to worry, even if she chop your hand, scan "human body two-dimensional code" success, also certainly not pass the pay treasure wallet in vivo detection. Do not show a few gestures to prove that you are alive, Alipay wallet is absolutely cannot let you pass the certification.

Again face recognition. The traditional way is to use image processing and pattern recognition technology, simply to extract the features of the feature data, and the pre-saved facial feature value to determine identity. Ant Financial Security Product Technology senior expert Zhang Jie told 36 Krypton, Qi Workshop will be the latest in-depth learning technology for face detection recognition, the first to help machine learning to identify organs, to help machine identify whether the same person, and now the machine is like constantly learn knowledge, thrive Young, You have no idea what features and data are specifically used to identify it. The big data has turned face recognition into another area that has been subverted by the Internet, and the traditional forensic use of features, skulls, etc. to do calibration of the identification of the way no machine.

Similarly, the face must be painted in vivo. Next year you see someone to the phone shook his head, smile, open mouth, that is really not insane, just make a payment certification. But the girls who love plastic surgery, men should be cautious, seven workshop found, generally good-looking, long beautiful indeed relatively not easy to identify. Maybe the beauty is similar, or Miss Korea is all the same. Those whose facial features are particularly obvious are not easily mistaken, so it is ugly to protect your wallet. It is likely that the next version of the Alipay Wallet will recognize face recognition as a means of supporting authentication. Open pay treasure purse to take a photo, machine will be used with the Public Security Department of Identity information, determine the identity of the person.

If you are using a mobile phone such as Huawei or Samsung, and you have a fingerprint sensor that opens a Alipay wallet built into your phone, you can pay for it with a fingerprint, which was just online yesterday. Each person's action on the keyboard is different, when the user uses the keyboard input card number or the password, Alipay has collected each key input time interval, without disturbing the user's case, has established the machine learning model, the user carries on the behavior analysis, has been as the auxiliary verification means. When you talk to a client, the voice print is also invisible as part of the sign, and it has nothing to do with what you say.

Multi-level three-dimensional control system

These recognition methods involve extremely complex models and algorithms. In fact, the human brain is doing more complex operations every day, you see a person, you can feel is so-and-so. It is not so easy to make the machine imitate the structure model and thinking mode of the human brain, to keep on learning and to realize the recessive expression of the law and rule of face recognition. It sounds very traditional handwriting recognition, the recognition method is not only to judge the similarity degree of handwriting graphics, but also includes dynamic writing behavior pattern, stroke sequence and writing rhythm of each pen, so it is necessary to calculate the similarity of handwriting by the nonlinear time alignment template matching algorithm and machine learning algorithm.

Our brains are doing more complex operations every day, and when we see an acquaintance, we can recognize So-and-so at a draught. But it's not that easy to get machines to imitate our brains. In order to realize this structure model and thinking mode, the machine must keep learning and realize the recessive expression of the rule and rules of recognition. For example, handwriting recognition, its recognition is not only by judging the similarity of the handwriting figure to determine, but also need to consider some implicit expression, such as dynamic writing behavior patterns, stroke sequence and the writing rhythm of each pen.

This must be difficult, but in terms of security, biometric recognition is certainly more reliable and more convenient than passwords. Otherwise there will not be so many people in the field of research and exploration, Apple did fingerprint identification, Alipay this year also the first push of fingerprint payment, there are many biometric technology in the progressive commercial.

Different biometrics techniques have different advantages. Under different scenes, choose the most convenient one or several, can achieve more secure than password protection. Voice print recognition because it does not involve privacy, user acceptance is high, moreover, it is especially suitable for remote identity authentication based on voice call, etc. the Palmprint collection area is relatively big, easy to obtain the high quality picture, the verification result is higher, in the light good place, uses the Palm line to be very suitable; the handwriting and the touch screen behavior are dynamic, To imitate a graphic is not difficult, to imitate the entire writing process is extremely difficult, but also overcome the fingerprint, palmprint and other biological features template is not modified. In some very high security scenarios, two-factor identification can be used, such as face + handwriting, fingerprint + handwriting and so on.

You must have been watching these sci-fi-like identification techniques. However, from the current technological progress, biometric identification still have a lot of technical problems to conquer. For example, voice-print recognition can be influenced by age, and handwriting and keyboard percussion involve individual behavior changes, also need to be tracked and differentiated, fingerprint in vivo detection is difficult, there is the risk of counterfeiting. Moreover, it is necessary to further improve the computational efficiency of these biometric recognition processes.

These still need to be tested biometric identification for financial security certification, used for your property account, ant Gold Clothing is quite confident. Ant, a senior expert in the technology Department of Financial Security products, told 36 Krypton that at this stage their handwriting recognition rate of one out of 10,000 accuracy can achieve 99.28%.

This biometric technology is based on the ant-Service multi-level security technology system, through a number of layers of defense under the protection of identity authentication: the first is terminal security, ant Gold Clothing will be the Trojan Horse control, and support TEE trusted execution environment, implementation end and channel encryption and decryption. Secondly, the system security, through the perfect position monitoring and flow monitoring and other means of active defense. The user through the front of these two layers of defense, can enter the identity authentication this line of defense. In this line of defense, in addition to digital certificates, account passwords and mobile phone dynamic password, biometric certification products are also added to the user security certification products of the family, for the user's payment transactions escort.

If the multi-level three-dimensional prevention and control system is a visible hand, manipulating the financial network there is an invisible hand-large data risk identification evaluation system. Ant Gold Suit now the trading risk control ability can support more than tens of thousands of payment transactions per second, as well as more than billions of daily risk identification. During the calculation of each transaction rule and model, it is possible to scan hundreds of or thousands of records and complete real-time computations of more than thousands of variables, which can be done within a short period of 200 milliseconds. The system behind biometrics has tens of thousands of strategies and dozens of and hundreds of data models working silently, like an invisible big net that protects the user's every transaction.

In order to provide users with accurate and convenient biometric identification services, the plant also uses a template protection algorithm, such as fuzzy vault to protect the user's biological characteristics, to prevent them from being attacked. In addition, fingerprint identification and palmprint recognition process running in the mobile terminal security isolation environment, biological features stored in any Third-party applications can not access the safe storage area, thereby strengthening the security line, so that the security of the user safety certification product itself is guaranteed.

Subversion Digital Password

For information security, the first code was invented in the sheepskin belt by the Peloponnesian of Athens and Sparta in 405 BC. 1960, MIT built a large time-sharing computer CTSS, the first computer code was born. Flies, mobile internet age, each person has at least dozens of account password. A string of characters are given real names, guarding our most precious things, protecting data and information, caring for dreams and memories, guarding against secrets and fears ...

People who invented passwords thought that simple passwords were enough, but the Spartan general just happened to wrap his belt around the stick and cracked the first cipher; two years later, MIT PhD Allan Scherr, in order to increase the length of the machine, cracked the first computer password and used the administrator's account to do a prank. Villains, outsmart. Now, with up to 10,000 attempts, your iphone will be unlocked, and Android will only need 389,112 tries. Whatever the digital code, this is not a problem for a machine with powerful computing power. Now almost everyone has a lot of account password, sometimes have to need 1Password, LastPass such software to help us remember, in order to fully memorize the password. Although everyone's digital possessions are more and more important, when our loved ones die, we are likely to be unable to retrieve their digital legacy because we do not know the password.

Now it's time to subvert these digital codes.

Apple, Google, Samsung and other manufacturers to introduce fingerprint identification equipment and products, Mozilla company Webmaker website launched a password-free landing system, Cambridge University Computer Laboratory development of electronic gas field (Tepco aura), Nymi want to use your heart rhythm to unlock, Motorola Show Password pill ...

Say subversion, seems a little bit of people heard. The self-confidence of the workshop is built on the support of large data, Apple, Google, Samsung, these large companies have only tested water fingerprint identification. Biological certification to popularize, there is a long way to go, and do not say the technical difficulties, educating users is not easy. Let's put aside these fears and start with the fingerprint recognition and face recognition of the workshop to do some interesting and entertaining new attempts, like scanning fingerprints, looking at my life today. What kind of products to buy, a spoiled cart to pay for the application only need to shout "Dear I Love You", both interesting, and will not have high accuracy of recognition requirements, Also can accumulate some machine to study the material by the way.

One day, these authentication methods, such as fingerprint payment, directly built into the mobile phone, such as the bottom of mobile devices, digital password will become the past, biometric identification as the representative of the new password interaction will be popular. Perhaps, in the future you have to be like a sci-fi movie, first to spend 1 seconds to do face recognition, you have permission to read this article Oh.

PS:

Thank the Ant Financial Zhang Jie for the help of this article. Zhang Jie, nickname, such as the Ant Financial Security Products Technology Department of senior experts, the "Linux is this stylish" book.

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.