Unlock instant, AI-driven research and patent intelligence for your innovation.

User identity identification method and device

A user identification and user technology, applied in the field of user identification methods and devices, can solve problems such as insufficient security of application programs, and achieve the effect of improving security

Inactive Publication Date: 2017-04-19
SHENZHEN TRANZDA TECH CO LTD
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the embodiment of the present invention is to provide a user identification method, aiming to solve the problem that the existing mobile terminal is not safe enough to run the application program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity identification method and device
  • User identity identification method and device
  • User identity identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] figure 1 It is a flowchart of the implementation of the user identification method provided by the embodiment of the present invention, and is described in detail as follows:

[0022] In step S101, detect whether the currently started application program needs identity authentication;

[0023] In step S102, if identity authentication is required, user fingerprint matching events, user face image recognition events and user voice recognition events are executed;

[0024] In step S103, when the user's fingerprint is successfully matched and the user's facial image is successfully recognized, the application is executed, or, when the user's fingerprint is successfully matched and the user's voice is recognized successfully, the application is executed.

[0025] When the user's fingerprint is successfully matched and the user's facial image is successfully recognized, it means that the identity authentication is passed, and the application program is run.

[0026] When th...

Embodiment 2

[0033] figure 2 It is a flowchart of the implementation of step S102 in the user identification method provided by the embodiment of the present invention, and is described in detail as follows:

[0034] Step S201, if identity authentication is required, the fingerprint information input in the fingerprint input area is collected;

[0035] Step S202, matching the collected fingerprint information with the pre-stored user fingerprint information;

[0036] Step S203, collecting facial images captured by the front camera;

[0037] Step S204, matching the collected face image with the pre-stored user face image;

[0038] Step S205, collecting sound through the built-in microphone;

[0039] Step S206, matching the collected voice with the pre-stored user voice.

[0040] Step S206, specifically:

[0041] Sampling the collected sound to obtain the characteristic value of the collected sound;

[0042] Generate a sound similarity according to the feature value of the collected s...

Embodiment 3

[0045] The embodiment of the present invention describes the configuration process of user fingerprint information and user facial images, which are described in detail as follows:

[0046] Configure user fingerprint information, user facial images, and user voices.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of mobile terminals and provides a user identity identification method and a device. The user identity identification method comprises steps of detecting whether a currently started application program should be subjected to identity identification or not; if yes, executing a user fingerprint matching event, a user face image identification event and a user voice identification event; and when the user fingerprint is successively matched and the user face image is successively identified, operating the application program, or when the user fingerprint is successively matched and the user voice is successively identified, operating the application program. According to the invention, a problem of an unsafe application program operated by a current mobile terminal is solved; and when the user fingerprint is successively matched and the user face image is successively identified, the application program is operated, or when the user fingerprint is successively matched and the user voice is successively identified, the application program is operated, so safety of a system is improved.

Description

technical field [0001] The invention belongs to the technical field of mobile terminals, and in particular relates to a user identification method and device. Background technique [0002] With the advent of the era of mobile terminal intelligence, the configuration of mobile terminals is becoming more and more powerful, and the functions are becoming more and more complete. Usually, in order to avoid the occurrence of misdialing events caused by accidentally touching the keys of the mobile phone, the mobile terminal locks the screen to Prevent users from misoperation and eliminate unnecessary troubles. [0003] However, after the existing mobile terminal is unlocked, when it is detected that the user clicks on the application program, the application program is run. Since the user is not identified, it is not safe to run some sensitive application programs, which is not conducive to protecting user information. Contents of the invention [0004] The purpose of the embodi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 王晓炜温泉胡旭辉周辉彭春祥
Owner SHENZHEN TRANZDA TECH CO LTD