User authentication method and user authentication device

A user authentication, user technology, applied in the field of survival authentication

Inactive Publication Date: 2016-04-20
GUANGDONG TECSUN SCIENCE & TECHNOLOGY CO LTD
View PDF3 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present invention propose a method and device for user authentication, aiming to solve the problem of how to improve the accuracy and security of user identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method and user authentication device
  • User authentication method and user authentication device
  • User authentication method and user authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] figure 1 It is a schematic flowchart of a user authentication method provided in Embodiment 1 of the present invention. The method may be performed by a user-authenticated device, wherein the device may be implemented by software and / or hardware. Such as figure 1 As shown, the method includes:

[0065] Step 101, receiving the first data information of the user collected by the terminal, comparing the first data information with the pre-stored data information corresponding to the user, and obtaining the compared first similarity, the first data information Including face data information or voice data information;

[0066] Specifically, if the first data information is face data information, the device for user authentication includes a social security personnel avatar database; a mobile device terminal with a camera for image collection; a network for data communication between the collection terminal and the background server A unit is a server used to implement a...

Embodiment 2

[0094] refer to figure 2 , figure 2 It is a schematic flowchart of a method for collecting voice data information by a terminal provided in Embodiment 2 of the present invention. The methods include:

[0095] Step 201, the terminal converts the pre-stored text information through the speech synthesis module in the reading guide module to obtain the reading guide voice information when the voiceprint is collected, and plays the reading guide voice information through the terminal voice playback module in the reading guide module;

[0096] Step 202, the terminal collects the analog voice signal of the user reading the guide voice information through the microphone in the voiceprint collection module, and converts the analog voice signal through the voice processing circuit in the voiceprint collection module The signal is converted into a digital voice signal;

[0097] Step 203, the terminal analyzes the digital voice signal to generate voice information;

[0098] Step 204...

Embodiment 3

[0105] refer to Figure 5 , Figure 5 It is a schematic flowchart of a method for collecting voice data information by a terminal provided in Embodiment 3 of the present invention. The methods include:

[0106] Step 501, the terminal obtains the basic information of the user, the basic information includes the user's name, ID number and / or mobile phone number;

[0107] Step 502, the terminal queries the background server for the corresponding pre-stored user unique identifier according to the basic information of the user;

[0108] Step 503, the terminal binds the unique user identifier and the first data information, and sends the bound first data information to the background server.

[0109] Specifically, in the process of voice authentication, the basic information entered by the insured person or the basic user information obtained from the social security database generates a unique ID number in the database as the unique identification of the insured person. The voic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a user authentication method and a user authentication device. The user authentication method comprises the following steps: receiving first data information of a user collected by a terminal and comparing the first data information with pre-stored data information corresponding to the user, so as to obtain a first similarity after comparison; if the first similarity does not exceed a preset first similarity, receiving second data information of the user collected by the terminal and comparing the second data information with the pre-stored data information corresponding to the user, so as to obtain a second similarity after comparison; if the second similarity exceeds a preset second similarity, determining that the user passes authentication; and if the second similarity does not exceed a preset second similarity, determining that the user authentication fails. According to the user authentication method and the user authentication device disclosed by the embodiment of the invention, two ways of voiceprint recognition and face recognition are adopted for survival authentication, and therefore, the recognition accuracy rate is high, the recognition time is short, and the security is high.

Description

technical field [0001] The technical field of survival authentication involved in the embodiments of the present invention, in particular, relates to a method and device for user authentication. Background technique [0002] With the deepening of socialized management of retirees and the increasing difficulty of management, the confirmation of the living conditions of retirees is a difficult problem in the payment of pensions. One of the key issues in the pension distribution work is: whether it is possible to quickly, safely and accurately remotely identify and confirm the identity of social security recipients. As long as the legal identity can be ensured through some simple, convenient, safe and reliable means, the phenomenon of pensions being illegally received can be basically eliminated. [0003] With the development of mobile network and intelligent identification technology, in order to solve the current problems of deceiving social security and the difficulty of au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06Q50/26
CPCG06F21/32G06Q50/26G10L17/04G06V40/16
Inventor 朱会东张斌
Owner GUANGDONG TECSUN SCIENCE & TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products