Identity verification method and device

An identity verification and verification-to-be-authenticated technology, applied in the field of identity verification methods and devices, can solve problems such as user property loss and safety hazards, and achieve the effects of increasing safety, avoiding safety hazards, and reducing the risk of unnecessary losses

Active Publication Date: 2017-07-25
BEIJING XIAOMI MOBILE SOFTWARE CO LTD
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the problems existing in the related technology, the embodiment of the present disclosure provides an identity verification method and device to solve the hidden safety problem of the related technology and avoid unnecessary losses to the user's property

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method and device
  • Identity verification method and device
  • Identity verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0079] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0080] Figure 1A is a flowchart of an identity verification method shown according to an exemplary embodiment, Figure 1B is a schematic diagram of an identity verification method shown according to an exemplary embodiment, Figure 1C It is a schematic diagram of components in a mobile device shown according to an exemplary embodiment; the identity verification method can be applied to mobile ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an identity verification method and device. The method comprises that a supersonic wave emitter is controlled to emit a supersonic wave signal; on the basis of supersonic echo signal of the supersonic wave signal, a first face characteristic vector of an object to be verified and a distance between the object to be verified and mobile equipment are determined; when the first face characteristic vector satisfies a first preset condition, an image pick-up device is controlled to collect a face image of the object to be verified; a second face characteristic vector of the object to be verified is extracted from the face image; and when the second face characteristic vector of the object to be verified satisfies a second preset condition, the identity of the object to be verified is verified according to the first and second face characteristic vectors. Thus, the safety of identity verification is improved via both supersonic verification and face verification manners, and the possibility of unnecessary property loss is reduced.

Description

technical field [0001] The present disclosure relates to the technical field of mobile devices, in particular to an identity verification method and device. Background technique [0002] With the rapid development and wide application of mobile devices, users have higher and higher security requirements for mobile devices (such as smart phones, tablet computers, etc.), and various authentication methods are developed in parallel to meet users' requirements for mobile devices. security needs. [0003] In related technologies, identity verification can be performed through face recognition, that is, feature extraction and recognition are performed on input face images or video streams, and compared with preset user feature data, thereby verifying user identity. The face recognition method in the related technology has the defect of spoofing attack, that is, the illegal user can pass the verification through the facial photo, video stream or 3D model of the legitimate user, so...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/00
CPCG06V40/168G06V20/46
Inventor 司新伟
Owner BEIJING XIAOMI MOBILE SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products