Method and system for identifying identity

A technology of identity recognition and identity identification, applied in the field of identity recognition, can solve the problems of reducing system security and system vulnerability

Active Publication Date: 2015-05-06
IFLYTEK CO LTD
View PDF4 Cites 60 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, attackers can still use one-by-one attack methods, such as recording to attack the voiceprint system, video to attack the face system, etc.; making the system extremely easy to be breached
Greatly reduces the security of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for identifying identity
  • Method and system for identifying identity
  • Method and system for identifying identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0111] In order to enable those skilled in the art to better understand the solutions of the embodiments of the present invention, the embodiments of the present invention will be further described in detail below in conjunction with the drawings and implementations.

[0112] Such as figure 1 Shown is a flowchart of the identification method provided by the embodiment of the present invention, including the following steps:

[0113] Step 101, when a user registers, generate a biometric model corresponding to the user's registration ID, and save the biometric model in a user registration database.

[0114] The biometric model may be a voiceprint model and / or a face model, and of course may also be other biometric models, such as fingerprints, irises, etc., which are not limited in this embodiment of the present invention. The user registration process will be described in detail later.

[0115] Step 102, acquiring a user identity when performing user identity identification. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for identifying an identity. The method comprises the following steps: generating a biological characteristic model corresponding to a user registration identity mark when a user registers; generating and displaying a verification text and recording a voice and an image of a user reading verification text when the user identity is identified; identifying the recorded voice and image of the user reading verification text, thereby acquiring a valid starting time of the voice, the text content of the voice, the valid starting time of lip motion and a lip language text content; acquiring biological characteristics of the user if the valid starting time of lip motion conforms to the valid starting time of the voice and the lip language text content and the text content of the voice both conform to the verification text; matching the acquired biological characteristics with the biological characteristic model in a user register database, thereby acquiring a matching score; confirming if the user identity is correct according to the matching score. The method provided by the invention can be utilized to effectively increase the safety of the identity identification.

Description

technical field [0001] The invention relates to the technical field of identification, in particular to an identification method and system. Background technique [0002] With the popularization of mobile Internet technology, mobile payment has become a very important part of people's work, study, entertainment and life. Subsequently, the security issues brought about by mobile payment have become increasingly prominent. How to ensure the user's information security and how to confirm the user's identity conveniently and effectively has become an important part of mobile payment. Today's mainstream payment platforms mostly use traditional password methods, or use dynamic tokens (tokens) and other methods to confirm user identities. This method plays a role in protecting user information to a certain extent. [0003] However, the traditional method cannot confirm the identity of the user, but only confirms the content of the password. Once the password is stolen by others, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 赵敏志雷琴辉赵彬郭涛胡安洲
Owner IFLYTEK CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products