Identity authentication method and terminal equipment

A terminal equipment and identity authentication technology, applied in the computer field, can solve the problems of low security, easy to enter wrong passwords, remember, etc., to achieve the effect of improving security, avoiding security problems, and maintaining convenience

Active Publication Date: 2016-11-09
FOSHAN UNIVERSITY
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the widely used identity authentication includes: password authentication, the details are as follows: the user enters the password and presets the password, and the device compares the password entered by the user with the preset password; however, the password authentication requires the user to remember the password, and It is easy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and terminal equipment
  • Identity authentication method and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0043] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. . Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0044] The embodiment of the present invention provides an identity authentication method, such as figure 1 Shown, including:

[0045] 101: The terminal device displays the trial reading text and prompts the user to read the trial reading text, collect the trial reading voice data of the trial reading text through the audio collection device, and perform feature extraction on the trial reading voice data to obtain the trial readi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an identity authentication method and terminal equipment. The realization of the method comprises the steps that trial reading characters are displayed and a user is prompted to read the trial reading characters, trial reading voice data are acquired and trial reading voice features are obtained through extraction; feature character information is determined, character paragraphs are displayed and the feature voice data of the character paragraphs are read through acquisition, the voice features are extracted and target voice features are stored; a fingerprint image is acquired and living biological feature information is acquired; the feature character information is acquired; authentication character paragraphs are randomly generated, the authentication voice data of the authentication character paragraphs are read through acquisition and the authentication voice features are extracted; and the authentication voice features and the target voice features are compared, and the identity of the current user is determined to be the user identity if the authentication voice features and the target voice features are matched. Therefore, convenience of identity authentication can be maintained and the security of identity authentication can be enhanced.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an identity authentication method and terminal equipment. Background technique [0002] Identity authentication, also known as "identity verification" or "identity authentication", refers to the process of confirming the identity of the operator in the computer and computer network system, so as to determine whether the user has access and use rights to certain resources, and then make the computer And network system access policies can be implemented reliably and effectively, preventing attackers from posing as legitimate users to gain access to resources, ensuring the security of systems and data, and the legitimate interests of authorized visitors. [0003] At present, the widely used identity authentication includes: password authentication, the details are as follows: the user enters the password and presets the password, and the device compares the password entered by the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G10L17/24H04L9/32
CPCG10L17/24H04L9/3231
Inventor 霍颖瑜马莉钟勇
Owner FOSHAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products