Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for checking identity and server

An identity verification and voice technology, applied in the field of communication, can solve the problems of low reliability, easy interception of confirmation messages, low security, etc., and achieve the effect of improving security and reliability.

Inactive Publication Date: 2015-03-11
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, although the user identity verification method based on a digital password can guarantee security to a certain extent, the digital password is easy to be stolen and deciphered, and its reliability is low; the user identity verification method based on a confirmation message and a verification code , the confirmation SMS is easy to be intercepted, so that the verification code can be easily obtained, and its security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for checking identity and server
  • Method and device for checking identity and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0024] figure 1 It is a flow chart of Embodiment 1 of the identity verification method of the present invention. like figure 1 As shown, the identity verification method provided in this embodiment may be specifically executed by an identity verification device, or by a server integrated with an identity verification device. Specifically, the me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for checking identity and a server. The method comprises the following steps of utilizing the specialty of user voice information and the uniqueness of vocal print, using the common voice input of the user and the corresponding vocal print information as the references for judging the identity of a user of software and / or equipment, comparing the current input voice and corresponding vocal print of the user and the reference voice information and the reference vocal print, and judging whether the user is the legal user of the software and / or the equipment according to the comparison result, so as to improve the safety and reliability of the identity checking of the user.

Description

technical field [0001] The invention relates to a communication technology, in particular to an identity verification method, device and server. Background technique [0002] At present, with the rapid development of mobile communication technology, the rapid maturity of smart terminal technology, and the further enrichment of mobile phone software, people have increasingly used smart terminal software in various aspects of life, work, and study. When using smart terminal software, in order to improve security, user identity verification is usually required. [0003] There are mainly two types of identity verification methods for mobile phone software commonly used at present. One is to verify the user’s identity for software login by entering a digital password; the other is to verify the user’s identity to log in as the software. [0004] However, although the user identity verification method based on a digital password can guarantee security to a certain extent, the di...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 曹万鹏
Owner CHINA UNITED NETWORK COMM GRP CO LTD