TWM603551U - Real-name monitoring system - Google Patents
Real-name monitoring system Download PDFInfo
- Publication number
- TWM603551U TWM603551U TW109209116U TW109209116U TWM603551U TW M603551 U TWM603551 U TW M603551U TW 109209116 U TW109209116 U TW 109209116U TW 109209116 U TW109209116 U TW 109209116U TW M603551 U TWM603551 U TW M603551U
- Authority
- TW
- Taiwan
- Prior art keywords
- image
- monitoring
- identity
- information
- monitoring host
- Prior art date
Links
Images
Landscapes
- Collating Specific Patterns (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
Abstract
本創作為提供一種實名制之監控系統,其以監控主機分別連接第一影像擷取裝置、第二影像擷取裝置以及第三影像擷取裝置,以取得用戶實際提供之身分資訊、實際臉部影像以及現場對應之監控畫面影像進行綁定,並進一步以對應於身分資訊之身分影像與實際臉部影像進行比對,而可快速進行實名制之監控,大幅提升作業效率,以及避免不肖人士盜用身分證件。This creation is to provide a real-name monitoring system that connects the first image capture device, the second image capture device and the third image capture device to the monitoring host to obtain the identity information and actual facial images actually provided by the user And the corresponding monitoring screen image on the scene is bound, and the identity image corresponding to the identity information is further compared with the actual facial image, and real-name monitoring can be carried out quickly, which greatly improves the efficiency of the operation and prevents the unscrupulous person from embezzling the identity certificate .
Description
本創作係關於一種監控系統,尤其是一種實名制之監控系統。This creation is about a monitoring system, especially a real-name monitoring system.
實名制係以真實身分參與活動之制度,故需以法定證件證明自己身分才可參與活動,如搭乘飛機、開立銀行帳戶或者現行實施的口罩實名制等,需提供法定證件才可進行活動的參與,而如何驗證實名制所提供之法定證件為用戶本人即為相當重要的議題。The real-name system is a system for participating in activities with a real identity. Therefore, you need to prove your identity with legal documents to participate in activities. For example, when flying, opening a bank account, or the current real-name mask system, you need to provide legal documents to participate in activities. And how to verify that the legal certificate provided by the real-name system is the user himself is a very important issue.
現行實名制所涵蓋的行業逐漸增加,且為了因應疫情的產生,大多公共場所皆需測量體溫,但隨著疫情趨緩,許多限制政策大多轉向有條件的鬆綁,例如娛樂場所進行實名制的管理,但如此一來,有些不肖份子為避免他人得知自身的行蹤,即可能盜用他人身分證件進入娛樂場所,由於證件上的照片不一定為近期之照片,導致許多店家難以辨別此身分證件是否為用戶本人,因而實名制管理將淪為擺設,當需要查找某段時間進出的用戶時,將可能查得實際進入用戶與其提供之身分證件不符之情形,此時,將難以回溯當時實際進入用戶之真實身分。The industries covered by the current real-name system are gradually increasing, and in order to respond to the outbreak of the epidemic, most public places require body temperature measurement. However, as the epidemic slows down, many restrictive policies have mostly shifted to conditional relaxation, such as the management of real-name systems in entertainment venues. As a result, in order to prevent others from knowing their whereabouts, some unscrupulous individuals may embezzle other people’s identity certificates to enter entertainment venues. Since the photos on the certificates are not necessarily recent photos, it is difficult for many stores to distinguish whether the identity certificates are the users themselves. Therefore, the real-name system management will be reduced to furnishings. When it is necessary to find users who enter and exit for a certain period of time, it may be possible to find out that the actual entering user does not match the ID provided by the user. At this time, it will be difficult to trace back the actual identity of the actual user at that time.
查專利號TW I650716揭示一種自動化驗證方法,其以接收來自客戶端裝置的客戶帳號與儲存單元的帳號比對、接收客戶端傳來的生物特徵資料、身份證圖像、電話號碼及識別碼、地址資訊,以判斷生物特徵存檔及生物特徵資訊是否符合,生成第一驗證結果;判斷身份證換補領資訊是否符合,生成第二驗證結果;傳送行動電話號碼及行動電話辨識碼至電信伺服器,並依據電信伺服器回覆之實名驗證訊息,判定第三驗證結果;以及經傳送行動電話號碼及地理座標至電信伺服器,並依據電信伺服器回覆之距離,判定第四驗證結果,最後處理單元經第一驗證結果、第二驗證結果、第三驗證結果至徵審系統,以完成驗證方法。Zha Patent No. TW I650716 discloses an automated verification method, which receives the client account from the client device and compares the account number of the storage unit, receives the biometric data, ID card image, phone number and identification code from the client, Address information to determine whether the biometric file and biometric information are consistent, and generate the first verification result; determine whether the ID card replacement information is consistent, and generate the second verification result; send the mobile phone number and mobile phone identification code to the telecommunications server , And determine the third verification result based on the real-name verification message replies from the telecommunications server; and send the mobile phone number and geographic coordinates to the telecommunications server, and determine the fourth verification result based on the distance from the telecommunications server, and finally the processing unit The first verification result, the second verification result, and the third verification result are sent to the examination system to complete the verification method.
惟前述之專利必須以客戶帳號、生物特徵資料、身分證資料、電話號碼、地址資訊等個人資料進行驗證,在實務上,提供如此繁雜的資料才可進出公共場所,其實行上非常困難,除了可能拉長驗證時間以外,同時亦可能造成民眾困擾,且擔憂如此多的資訊是否可能被不肖業者加以利用。However, the aforementioned patents must be verified with personal data such as customer account numbers, biometric data, ID card data, telephone numbers, address information, etc. In practice, it is very difficult to implement such complicated data before entering and leaving public places. In addition to prolonging the verification time, it may also cause public distress and worry about whether so much information may be used by shameless industry players.
依據上述內容可以知道,本創作為提供一種實名制之監控系統,其以監控主機分別連接第一影像擷取裝置、第二影像擷取裝置以及第三影像擷取裝置取得用戶實際提供之身分資訊、實際影像以及現場對應之監控畫面影像進行綁定,並進一步以身分資訊之身分影像與實際影像進行比對,其僅需提供身分證件,其餘交由現場之第一影像擷取裝置、第二影像擷取裝置以及第三影像擷取裝置進行採集臉部影像與現場對應之監控畫面影像,而可快速進行實名制之監控,大幅提升作業效率,又可防止有心人事盜用身分證件。Based on the above content, it can be known that this creation is to provide a real-name monitoring system that connects the first image capture device, the second image capture device, and the third image capture device to the monitoring host to obtain the identity information actually provided by the user, The actual image and the corresponding monitoring screen image on the scene are bound, and the identity image of the identity information is further compared with the actual image. It only needs to provide the identity certificate, and the rest is handed over to the first image capture device and the second image on the spot The capture device and the third image capture device collect facial images and the corresponding monitoring screen images at the scene, and can quickly perform real-name monitoring, which greatly improves work efficiency and prevents deliberate personnel from embezzling identity documents.
本創作之主要目的,在於提供一種實名制之監控系統,其以監控主機、第一影像擷取裝置、第二影像擷取裝置以及第三影像擷取裝置,以執行實名制之監控方法,而取得用戶實際提供之身分資訊、實際影像以及現場對應之監控畫面影像進行綁定,並與其身分資訊之身分影像進行驗證比對,確認用戶提供之身分識別卡是否為本人,以避免不肖份子竊取他人證件進行不法活動。The main purpose of this creation is to provide a real-name monitoring system, which uses a monitoring host, a first image capture device, a second image capture device, and a third image capture device to implement the real-name monitoring method and obtain users The actual identity information provided, the actual image, and the corresponding surveillance screen image of the scene are bound, and the identity image of the identity information is verified and compared to confirm whether the identity identification card provided by the user is the person himself, so as to prevent the shackles from stealing the ID of others. Illegal activities.
為了達到上述之目的,本創作提供一種實名制之監控系統,其包含:一監控主機,其具有一資料庫;一第一影像擷取裝置,其與該監控主機連接,擷取一身分識別卡影像,以取得一身分資訊,該身分資訊具有一身分編號以及一身分影像;一第二影像擷取裝置,其與該監控主機連接,以擷取一臉部影像;及一第三影像擷取裝置,其與該監控主機連接,以擷取現場對應之一監控畫面影像;其中,該監控主機依據該臉部影像及該監控畫面影像與對應之該身分資訊進行綁定,並儲存至該資料庫;及該監控主機依據該身分資訊取得對應之一身分影像與該臉部影像進行比對,並輸出一比對結果。In order to achieve the above purpose, this creation provides a real-name surveillance system, which includes: a surveillance host with a database; a first image capture device connected to the surveillance host to capture an image of an ID card To obtain an identity information, the identity information having an identity number and an identity image; a second image capture device connected to the monitoring host to capture a face image; and a third image capture device , Which is connected with the monitoring host to capture a corresponding monitoring screen image on site; wherein, the monitoring host binds the corresponding identity information according to the facial image and the monitoring screen image, and stores it in the database ; And the monitoring host obtains a corresponding identity image and compares the facial image according to the identity information, and outputs a comparison result.
本創作提供一實施例,其中該監控主機依據該身分資訊取得對應之該監控畫面影像。This creation provides an embodiment in which the monitoring host obtains the corresponding monitoring screen image according to the identity information.
本創作提供一實施例,更包含一溫度感測裝置及一生物感測裝置,並分別與該監控主機連接,該溫度感測裝置感測一溫度,以及該生物感測裝置感測一生物特徵資訊,以儲存於對應之該參考資訊。This creation provides an embodiment, which further includes a temperature sensing device and a biological sensing device, which are respectively connected to the monitoring host, the temperature sensing device senses a temperature, and the biological sensing device senses a biological feature Information to be stored in the corresponding reference information.
本創作提供一實施例,其中該生物感測裝置為一指紋感測裝置、一虹膜感測裝置或一靜脈感測裝置,該生物特徵資訊為一指紋特徵資訊、一虹膜特徵資訊、一靜脈特徵資訊或上述之組合。This creation provides an embodiment, wherein the biological sensing device is a fingerprint sensing device, an iris sensing device or a vein sensing device, and the biological characteristic information is a fingerprint characteristic information, an iris characteristic information, and a vein characteristic Information or a combination of the above.
本創作提供一實施例,其中該身分資訊更具有一時間資訊,並於一預設時間後,該監控主機於該資料庫刪除該身分資訊。This creation provides an embodiment in which the identity information has more time information, and after a preset time, the monitoring host deletes the identity information in the database.
為使 貴審查委員對本創作之特徵及所達成之功效有更進一步之瞭解與認識,謹佐以較佳之實施例及配合詳細之說明,說明如後:In order to enable your review committee to have a better understanding and understanding of the characteristics of this creation and the effects achieved, I would like to provide a better embodiment and detailed explanations. The explanation is as follows:
習知實名制驗證或監控方式,必須請用戶提供許多的個人資料才可進行核對或驗證,惟此種方式於出入公共場所之實行上非常困難,除了可能拉長驗證時間以外,同時亦可能造成民眾困擾,且擔憂如此多的資訊是否可能被不肖業者加以利用,而本創作提供一種實名制之監控系統,以讀取裝置、影像擷取裝置以及生物感測裝置取得用戶實際提供之身分資訊、實際影像以及實際生物特徵資訊,並與其資料庫內之參考資訊進行比對,進一步進行驗證,確認用戶提供之身分識別卡是否為本人,以避免不肖份子竊取他人證件進行不法活動,同時大幅增加作業效率。Conventional real-name verification or monitoring methods require users to provide a lot of personal information before they can be verified or verified. However, this method is very difficult to implement in and out of public places. In addition to prolonging the verification time, it may also cause people I am troubled and worried about whether so much information may be used by the unscrupulous industry. This creation provides a real-name monitoring system to obtain the identity information and actual images actually provided by the user by the reading device, image capturing device and biosensing device And the actual biometric information is compared with the reference information in the database, and further verification is performed to confirm whether the identity card provided by the user is the person himself, so as to avoid fraudsters from stealing other people's credentials for illegal activities, and greatly increase the efficiency of operations.
在下文中,將藉由圖式來說明本創作之各種實施例來詳細描述本創作。然而本創作之概念可能以許多不同型式來體現,且不應解釋為限於本文中所闡述之例式性實施例。In the following, various embodiments of this creation will be described in detail by using drawings. However, the concept of this creation may be embodied in many different forms, and should not be construed as being limited to the exemplary embodiments described herein.
首先,請參閱第一圖及第二圖,其為本創作之一實施例之方法流程圖以及系統示意圖。其為一種實名制之監控方法,其應用於監控主機1,其分別連接第一影像擷取裝置第一影像擷取裝置2、第二影像擷取裝置第二影像擷取裝置3及第三影像擷取裝置第三影像擷取裝置4,並具有資料庫11,其監控方法之步驟包含:First of all, please refer to the first and second figures, which are the method flowchart and system schematic diagram of an embodiment of the creation. It is a real-name monitoring method, which is applied to the
步驟S1: 該第一影像擷取裝置擷取一身分識別卡影像,以取得一身分資訊,傳送至該監控主機;Step S1: The first image capturing device captures an image of an identity recognition card to obtain an identity information and send it to the monitoring host;
步驟S3: 該第二影像擷取裝置擷取一臉部影像,傳送至該監控主機;Step S3: The second image capturing device captures a face image and sends it to the monitoring host;
步驟S5: 該第三影像擷取裝置擷取現場對應之一監控畫面影像,傳送至該監控主機;及Step S5: The third image capture device captures an image of a monitoring screen corresponding to the scene, and transmits it to the monitoring host; and
步驟S7: 該監控主機依據該臉部影像及該監控畫面影像與對應之該身分資訊進行綁定,並儲存至該資料庫。Step S7: The monitoring host binds the facial image and the monitoring screen image with the corresponding identity information, and stores it in the database.
復閱第二圖,其為本創作之一實施例之系統示意圖。如圖所示,其為一種實名制之監控系統,其包含監控主機1、第一影像擷取裝置第一影像擷取裝置2、第二影像擷取裝置第二影像擷取裝置3以及第三影像擷取裝置第三影像擷取裝置4,其中監控主機1具有資料庫11,且監控主機1分別連接第一影像擷取裝置第一影像擷取裝置2、第二影像擷取裝置第二影像擷取裝置3以及第三影像擷取裝置第三影像擷取裝置4,且監控主機1更進一步連接溫度感測裝置5以及生物感測裝置6,分述如下。Review the second figure, which is a system schematic diagram of an embodiment of the creation. As shown in the figure, it is a real-name monitoring system, which includes a
如步驟S1所示,以第一影像擷取裝置2擷取用戶提供之身分識別卡,如國民身分證、健保卡或護照,以取得身分資訊,並傳送至監控主機1,當監控主機1接收身分資訊時,其身分資訊更具有時間資訊,且於預設時間後,監控主機1於資料庫11刪除身分資訊。As shown in step S1, the first image capturing
如步驟S3所示,第二影像擷取裝置3擷取用戶之臉部影像,並傳送至監控主機1,本創作最佳實施例之第二影像擷取裝置3為人臉辨識監控裝置。As shown in step S3, the second
如步驟S5所示,第三影像擷取裝置4擷取現場對應之監控畫面影像,並傳送至監控主機1。As shown in step S5, the third
如步驟S7所示,監控主機1依據擷取之用戶之臉部影像及對應之監控畫面影像與對應之身分資訊進行綁定,並儲存於資料庫11,其中監控主機1依據身分資訊取得對應之身分影像與用戶之臉部影像進行比對,並輸出比對結果,如此一來,監控主機1可依據身分資訊取得對應之監控畫面影像,而不需以傳統方式一一尋找相對時間,而逐一進行查詢,同時監控主機1依據比對結果儲存至對應之身分資訊。As shown in step S7, the
復閱第一圖以及第二圖,本實施例於步驟S7後更進一步包含:Reviewing the first figure and the second figure, this embodiment further includes after step S7:
步驟S9: 一溫度感測裝置感測一溫度,傳送至該監控主機;Step S9: A temperature sensing device senses a temperature and transmits it to the monitoring host;
步驟S11:一生物感測裝置擷取一生物特徵資訊,傳送至該監控主機;及Step S11: A biological sensing device captures a piece of biological characteristic information and sends it to the monitoring host; and
步驟S13:該監控主機依據該溫度以及該生物特徵資訊,儲存於對應之該身分資訊。Step S13: The monitoring host stores the corresponding identity information according to the temperature and the biometric information.
如步驟S9所示,以溫度感測裝置5感測用戶之溫度,並傳送至監控主機1,本創作最佳實施例之溫度感測裝置5為紅外線溫度感測裝置,並接續步驟S11所示,以生物感測裝置6擷取生物特徵資訊,並傳送至監控主機1,最後如步驟S13所示,監控主機1依據該溫度以及該生物特徵資訊儲存至對應之身分資訊,其中生物感測裝置6為指紋感測裝置、虹膜感測裝置或靜脈感測裝置,生物特徵資訊為指紋特徵資訊、虹膜特徵資訊、靜脈特徵資訊或上述之組合。As shown in step S9, the
為清楚表達本創作之方法流程,將列舉實施例如下進行說明,用戶出示身分證至第一影像擷取裝置2,以取得對應身分證之身分資訊,如身分證字號、姓名以及身分影像等個人資料,同時第二影像擷取裝置3將擷取用戶之臉部影像以及第三影像擷取裝置4擷取現場對應之監控畫面影像,並分別傳送至監控主機1,監控主機1依據臉部影像以及現場對應之監控畫面影像與對應之身分資訊進行綁定,並儲存於資料庫11,同時,監控主機1依據身分資訊取得對應之身分影像與臉部影像進行比對,而輸出比對結果,同時亦可連接溫度感測裝置5以及生物感測裝置6取得對應用戶之溫度以及生物特徵資訊,並分別傳送至監控主機1以儲存至對應之身分資訊,以供查詢使用。In order to clearly express the method flow of this creation, the following examples will be illustrated. The user presents his ID card to the first
本創作最佳實施例,當監控主機1接收到前述之身分資訊時,將具有時間資訊,如109/06/18下午05:30,並於預設時間如三個月,故將於109/09/18下午05:30分後刪除該名用戶之身分資訊,以確保資訊安全,但不在此限,並且監控主機1可依據身分資訊取得對應之監控畫面影像,而可快速查詢到對應於身分資訊之監控畫面影像。In the best embodiment of this creation, when the
以上所述之實施例,本創作之實名制之監控系統,其以監控主機分別連接第一影像擷取裝置、第二影像擷取裝置及第三影像擷取裝置,並依據第一影像擷取裝置讀取身分識別卡,以取得身分資訊傳送至監控主機,並分別依據第二影像擷取裝置及第三影像擷取裝置,取得臉部影像及現場對應之監控畫面影像,並傳送至監控主機,監控主機可進一步依據臉部影像及監控畫面影像與對應之身分資訊進行綁定,同時,監控主機亦可依據身分資訊取得對應之身分影像而與臉部影像進行比對,輸出比對結果,而可得知提供身分識別卡之用戶與身分識別卡是否為同一人,進而達到實名制之監控,以避免不肖之徒盜用身分證明文件。In the above-mentioned embodiment, the real-name monitoring system of this creation uses the monitoring host to connect the first image capturing device, the second image capturing device and the third image capturing device respectively, and according to the first image capturing device Read the ID card to obtain the identity information and send it to the monitoring host, and according to the second image capture device and the third image capture device respectively, obtain the face image and the corresponding monitoring screen image of the scene, and send it to the monitoring host, The monitoring host can further bind the corresponding identity information based on the facial image and the monitoring screen image. At the same time, the monitoring host can also obtain the corresponding identity image based on the identity information to compare with the facial image, and output the comparison result. It is possible to know whether the user who provided the ID card and the ID card are the same person, so as to achieve real-name monitoring to prevent shameless people from embezzling identity documents.
故本創作實為一具有新穎性、進步性及可供產業上利用者,應符合我國專利法專利申請要件無疑,爰依法提出新型專利申請,祈鈞局早日賜准專利,至感為禱。Therefore, this creation is really novel, progressive, and available for industrial use. It should meet the patent application requirements of my country's patent law. There is no doubt that Yan filed a new patent application in accordance with the law. I pray that the office will grant the patent as soon as possible.
惟以上所述者,僅為本創作之較佳實施例而已,並非用來限定本創作實施之範圍,舉凡依本創作申請專利範圍所述之形狀、構造、特徵及精神所為之均等變化與修飾,均應包括於本創作之申請專利範圍內。However, the above are only the preferred embodiments of this creation, and are not used to limit the scope of implementation of this creation. For example, the shape, structure, characteristics and spirit described in the scope of patent application for this creation have equal changes and modifications. , Should be included in the scope of patent application for this creation.
1:監控主機 2:第一影像擷取裝置 3:第二影像擷取裝置 4:第三影像擷取裝置 5:溫度感測裝置 6:生物感測裝置 S1-S13:步驟 1: Monitoring host 2: The first image capture device 3: Second image capture device 4: Third image capture device 5: Temperature sensing device 6: Biological sensing device S1-S13: steps
第一圖:其為本新型之一實施例之方法流程圖;以及Figure 1: It is a flow chart of the method of an embodiment of the new model; and
第二圖:其為本新型之一實施例之系統示意圖。Figure 2: It is a schematic diagram of the system of one embodiment of the new model.
1:監控主機 1: Monitoring host
2:第一影像擷取裝置 2: The first image capture device
3:第二影像擷取裝置 3: Second image capture device
4:第三影像擷取裝置 4: Third image capture device
5:溫度感測裝置 5: Temperature sensing device
6:生物感測裝置 6: Biological sensing device
Claims (5)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW109209116U TWM603551U (en) | 2020-07-16 | 2020-07-16 | Real-name monitoring system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW109209116U TWM603551U (en) | 2020-07-16 | 2020-07-16 | Real-name monitoring system |
Publications (1)
Publication Number | Publication Date |
---|---|
TWM603551U true TWM603551U (en) | 2020-11-01 |
Family
ID=74203076
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW109209116U TWM603551U (en) | 2020-07-16 | 2020-07-16 | Real-name monitoring system |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWM603551U (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI756741B (en) * | 2020-07-16 | 2022-03-01 | 易立配股份有限公司 | Monitoring method and system for real-name |
-
2020
- 2020-07-16 TW TW109209116U patent/TWM603551U/en unknown
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TWI756741B (en) * | 2020-07-16 | 2022-03-01 | 易立配股份有限公司 | Monitoring method and system for real-name |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11611553B2 (en) | Online identity verification platform and process | |
KR102350507B1 (en) | Access control method, access control device, system and storage medium | |
US20190199718A1 (en) | Methods and systems for providing online verification and security | |
CN108804884B (en) | Identity authentication method, identity authentication device and computer storage medium | |
US9544308B2 (en) | Compliant authentication based on dynamically-updated credentials | |
Vacca | Biometric technologies and verification systems | |
US20210089635A1 (en) | Biometric identity verification and protection software solution | |
JP4531374B2 (en) | Information holding device | |
CN205015915U (en) | Management system by oneself stays | |
CN107800672B (en) | Information verification method, electronic equipment, server and information verification system | |
WO2016066040A1 (en) | Identity authentication method and device | |
US20030163708A1 (en) | Method and system for detecting and eliminating fraud | |
CN106803289A (en) | A kind of false proof method and system of registering of intelligent mobile | |
US11074327B2 (en) | Methods and systems for ensuring that an individual is authorized to conduct an activity | |
CN107025397B (en) | Identity information acquisition method and device | |
JP2017524998A (en) | Method and system for performing identity verification | |
CN108959884B (en) | Human authentication verification device and method | |
CN107038509A (en) | Self-service registration-management system | |
CN108629259A (en) | Identity identifying method and device and storage medium | |
CN107656959A (en) | A kind of message leaving method, device and message equipment | |
Podio et al. | Biometric authentication technology: From the movies to your desktop | |
TWM603551U (en) | Real-name monitoring system | |
TWI756741B (en) | Monitoring method and system for real-name | |
US8442277B1 (en) | Identity authentication system for controlling egress of an individual visiting a facility | |
JP2023112682A (en) | Systems and methods for enhancing biometric matching accuracy |