Unlock instant, AI-driven research and patent intelligence for your innovation.
User identity identification method and device
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A user identification and user technology, applied in the field of user identification methods and devices, can solve problems such as insufficient security of application programs, and achieve the effect of improving security
Inactive Publication Date: 2017-04-19
SHENZHEN TRANZDA TECH CO LTD
View PDF3 Cites 11 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0004] The purpose of the embodiment of the present invention is to provide a user identification method, aiming to solve the problem that the existing mobile terminal is not safe enough to run the application program
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0021] figure 1 It is a flowchart of the implementation of the user identification method provided by the embodiment of the present invention, and is described in detail as follows:
[0022] In step S101, detect whether the currently started application program needs identity authentication;
[0023] In step S102, if identity authentication is required, user fingerprint matching events, user face image recognition events and user voice recognition events are executed;
[0024] In step S103, when the user's fingerprint is successfully matched and the user's facial image is successfully recognized, the application is executed, or, when the user's fingerprint is successfully matched and the user's voice is recognized successfully, the application is executed.
[0025] When the user's fingerprint is successfully matched and the user's facial image is successfully recognized, it means that the identity authentication is passed, and the application program is run.
[0026] When th...
Embodiment 2
[0033] figure 2 It is a flowchart of the implementation of step S102 in the user identification method provided by the embodiment of the present invention, and is described in detail as follows:
[0034] Step S201, if identity authentication is required, the fingerprint information input in the fingerprint input area is collected;
[0035] Step S202, matching the collected fingerprint information with the pre-stored user fingerprint information;
[0036] Step S203, collecting facial images captured by the front camera;
[0037] Step S204, matching the collected face image with the pre-stored user face image;
[0038] Step S205, collecting sound through the built-in microphone;
[0039] Step S206, matching the collected voice with the pre-stored user voice.
[0040] Step S206, specifically:
[0041] Sampling the collected sound to obtain the characteristic value of the collected sound;
[0042] Generate a sound similarity according to the feature value of the collected s...
Embodiment 3
[0045] The embodiment of the present invention describes the configuration process of user fingerprint information and user facial images, which are described in detail as follows:
[0046] Configure user fingerprint information, user facial images, and user voices.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention relates to the technical field of mobile terminals and provides a user identity identification method and a device. The user identity identification method comprises steps of detecting whether a currently started application program should be subjected to identity identification or not; if yes, executing a user fingerprint matching event, a user face image identification event and a user voice identification event; and when the user fingerprint is successively matched and the user face image is successively identified, operating the application program, or when the user fingerprint is successively matched and the user voice is successively identified, operating the application program. According to the invention, a problem of an unsafe application program operated by a current mobile terminal is solved; and when the user fingerprint is successively matched and the user face image is successively identified, the application program is operated, or when the user fingerprint is successively matched and the user voice is successively identified, the application program is operated, so safety of a system is improved.
Description
technical field [0001] The invention belongs to the technical field of mobile terminals, and in particular relates to a user identification method and device. Background technique [0002] With the advent of the era of mobile terminal intelligence, the configuration of mobile terminals is becoming more and more powerful, and the functions are becoming more and more complete. Usually, in order to avoid the occurrence of misdialing events caused by accidentally touching the keys of the mobile phone, the mobile terminal locks the screen to Prevent users from misoperation and eliminate unnecessary troubles. [0003] However, after the existing mobile terminal is unlocked, when it is detected that the user clicks on the application program, the application program is run. Since the user is not identified, it is not safe to run some sensitive application programs, which is not conducive to protecting user information. Contents of the invention [0004] The purpose of the embodi...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.