Discussion on Application Design of Biological Identification System in ****

1. Introduction 1.1 Biometric technology Biometric technology is an identity verification method that uses the unique physiological characteristics and behavioral characteristics of the human body to conduct personal identification. Compared with traditional identity authentication methods based on known things and possessions, biometric identification technology has the advantages of high intensity, easy use, easy forgetting, forgery and easy integration with computer systems. Biometric identification methods that have been proposed such as: fingerprint recognition, retina recognition, iris recognition, facial feature recognition, palm geometry recognition, vein recognition, and gait recognition. These verification methods are gradually entering people’s daily lives and protecting the public. Benefits and security have played a huge role.

At present, fingerprints, facial features, and palm recognition technologies have been widely used, and biometric authentication technologies such as iris and gait recognition are difficult to popularize due to their simplicity and integration. In general, various verification methods are Test efficiency, accuracy, ease of use, and integration are still quite different [2]. Although many biometric technologies have achieved good results in more and more areas, some problems have also been exposed in the actual application process. These problems have caused widespread concern among experts in the security field, making them biometric research. Hot spot. Mainly include: biometric extraction technology, biometric retrieval and matching algorithm, living body inspection technology, and biometric identification system evaluation technology.

1.2 Biometric identification systems differ from traditional authentication methods based on passwords, ID cards, and USBKeys. Biometrics generally contain rich biological data. When used, specialized biometric capture devices, computers, and database systems are required for data processing and storage. Therefore, the hardware devices of the biometric identification system include: biometric acquisition devices, computers, and database systems. For public-use systems, special servers are also required to perform feature information storage and retrieval matching to improve efficiency. From the workflow: Biometrics include two modes of feature collection and authentication, but regardless of the mode, the working process includes: biometric data collection, detailed feature extraction, and feature matching.

2. Application of Biometrics Technology in Social Security Work The implementation of the social security mechanism balances the gap between the rich and the poor, buffers social conflicts, and protects the basic livelihood security and medical needs of vulnerable groups. It gives all citizens a sense of security and promotes undecided and harmonious development of society. has great significance. At the 16th National Congress of our country, we clearly formulated the goal of "comparing a sound social security system" as an overall goal of building a well-to-do society. However, with the in-depth development of the social insurance industry in recent years and the continuous expansion of the scope of personnel involved, there have been many cases of fraudulent claims, fraudulent payments, repeated payments, and repeated insurements, which have seriously affected the safety of social security funds. For example, the old-age insurance and the survivors involved in military service are all older, inconvenient in moving, and may live in different places. The verification of the identity and living status of these people in the issuance of social security funds has become a difficult task: The insured person himself is inconvenient in action, and verification by the social security institution one by one will lead to huge work pressure; in addition, due to the difficulty in effectively certifying the identity of the insured person and the insurance recipient, unemployment insurance, occupational injury, and medical insurance are also used. There is a common situation where insurance premiums are paid and fraudulent claims are made.

Different from the requirements of the general biometric authentication system, the social security work has the characteristics of large number of users, high precision requirements and the need for survivability verification. In order to solve these problems, units are sent back across the country, send fingerprints, take photos and video chat. There are various forms of authentication system arrangements, but more and more methods are being used to take out social insurance benefits. Therefore, the identification of the identity of the insured person and the state of existence to ensure the identity of the insured and the recipient has become an urgent problem to be solved in the social insurance work. At present, domestic and foreign scholars have begun to study the introduction of biometrics in social insurance work. Technology to protect the safety of social insurance funds.

2.1 Application of biometrics technology in social security work In foreign countries, methods for biometric identification of the insured’s identity to ensure the safety of social security funds have long been applied. In 1994, the Ontario Province of Canada proposed to integrate the palm size and fingerprint information of the social security participants into the social security card so as to prevent some Americans from claiming social insurance premiums in Canada. Once this proposal was put forward, it would receive 1.4 billion yuan annually. The social security of the dollar was strongly supported by the MetroToronto community [5]. In the United States, the Obama administration proposed to provide social security cards containing biometric information for these residents in order to solve the employment problem of local residents and encourage them to give priority to employing these people.

Some provinces and cities in China have also begun to use biometrics to ensure the safety of social security funds. In May 2010, the Bureau of Human Resources and Social Security of Shayang County, Hubei, took the lead in applying portrait recognition technology to elderly pensions, and issued the “Shayang County Social Insurance Retirement and Dependent Person Portrait Recognition Collection Implementation Program”. , Retired people with poor health and inconvenient mobility, and the implementation of unified on-site service, remote collection and remote certification after resettlement and repatriation, took 7 months to implement 98.66% of the county's pensioners. The collection of face information, at the same time, investigated and punished 3 people who had received a pension, and fraudulently subsidized the life of the survivors, recovering a total loss of RMB 38,900. Through the use of portrait recognition technology, it effectively reduced the expenses and work burdens for the insured's identity, survival proof, and was widely praised. In June 2011, the Haikou City Humanities and Social Bureau deployed and deployed the “retired face recognition system” to verify the survival of retirees. The system uses a computer camera to collect and verify biometric information for retirees. A total of more than 10,000 retirees in Haikou, including Haikou, Singapore, Macau, Hong Kong, and Mainland provinces and cities, collected facial information. In August 2011, Hunan Province also began to use a face-based modelling pension collection system. The application of these biometric systems has played a good role in reducing management costs and preventing the loss of social security funds.

2.2 Design of biometric identification system in social security As the number of people involved in social security work is large, the biometric system must solve the problem of performance and matching accuracy caused by 1:n verification; in addition, it supports insurance for multiple social security agencies at the same time. In the case of gold distribution, the system must also have the capability of distributed deployment. Finally, dual factor authentication can be implemented by combining with traditional authentication technologies to further improve the security of the system. The basic structure and working process of the system are as follows:

1) Feature acquisition mode: The insured person registers in the system, fills in the basic information such as his ID card, age, address, and affiliation, sets his own system login password, and collects biometric information; the system includes all user information and its The corresponding biometrics are stored centrally in the database.

2) Authentication mode: The insured regularly logs in using a password or ID card, and performs biometric authentication to confirm the identity and living status of the insured; the system extracts the biometrics according to the login information provided by the user for matching verification. During the certification process, video verification data can be saved.

3) The social insurance information system decides how to issue social insurance based on the identity and survival information obtained through certification.

Problems with biometrics in social security 2.3 Problems with biometrics in social security applications Although biometrics technology has gradually entered social security work and has played an important role in protecting social security funds, as mentioned above, At present, biometric technology still has some technical and safety issues. Face recognition technology is used as an example: Many biometrics experts believe that face recognition technology is not a very secure biometric authentication technology. First, most face recognition systems have problems with light and make-up sensitive. In addition, people with similar facial appearance are similar in appearance. There may not be many, but when it comes to such large-scale application of social security, it may cause problems. Third, the face recognition system must also face the challenges of ultra-fine latex masks, face facial features modeling technology, and finally, U.S. security experts have also proposed that face recognition systems may cause personal privacy issues.

Therefore, face recognition technology is very difficult and is considered to be one of the most difficult research topics in the field of biometrics and even artificial intelligence. On the other hand, although biometrics have the advantages of high security, portability, and tamper resistance, if biometrics are counterfeited, it cannot be easily modified like a password change. This is also biometric authentication technology. The promotion of the application has brought potential security risks. For this reason, people have further proposed multiple biometric identification technologies that combine multiple biometric features to perform personnel identity verification [ ], thereby significantly improving the safety of biometric authentication technology. It is believed that with the further development of technology, there will be more accurate, safe, fast and easy-to-use biometric identification technologies suitable for social security applications.

3. Conclusions This article first briefly summarized and analyzed biometrics-based identity verification technology, demonstrated some special needs of biometric identification technologies for social security services, and then proceeded with the application of current biometric technologies in the field of social security. Based on the analysis, a social security-based social security issuance system architecture design is performed; finally, the paper points out some of the current security problems in the biometric authentication technology. It is believed that these problems will eventually be solved with the further development of the technology. We will make greater contributions to protecting the security and healthy development of social security work.

Zinc Alloy Valves

Zinc Alloy Valves,Alloy Valves,Alloy Valves And Control,Alloy Valves And Control Inc

AS-SUR INDUSTRIAL VALVE CO., LTD. , https://www.assur-valve.com

Posted on