Abstract
I. INTRODUCTION
II. BIO-CERTIFICATION SYSTEM TECHNOLOGY RESEARCH
A. Bio authentication technology vulnerability analysis
B. Multi-bio authentication technology research
C. Research on attack and security technology when applying AI authentication technology
III. BIO-CERTIFICATION SYSTEM TECHNOLOGY VERIFICATION
A. Bio-certification system safety verification
IV. CONCLUSION
Acknowledgment
REFERENCES