Identity authentication method and apparatus

An identity authentication and consistency technology, applied in the network field, can solve problems such as low reliability, security risks, and cumbersome operations, and achieve the effects of ensuring accuracy, preventing video recording, and simplifying user operations

Inactive Publication Date: 2017-11-28
ALIBABA GRP HLDG LTD
View PDF6 Cites 39 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the related technologies, there are also many identity authentication methods for the Internet, such as face recognition, voiceprint recognition, etc., but the operation of the commonly used authentication methods is relatively cumbersome, for example, the user needs to enter his own identification ID and then verify the voiceprint and,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and apparatus
  • Identity authentication method and apparatus
  • Identity authentication method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0026] The identity authentication method provided by the embodiment of the present application can be applied to Internet identity authentication. For example, when logging into a network application, the identity authentication of this method is allowed to log in, so as to ensure the security of application use.

[0027] The following takes logging in to an application with high securi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method and apparatus. The method comprises the steps of obtaining an audio/video stream which is collected and is generated by a to-be-authenticated target object, judging whether a lip language and a voice in the audio/video stream meet consistency, and if the lip language and the voice meet the consistency, taking a voice content which is obtained by performing voice recognition on an audio stream in the audio/video stream as an object identifier of the target object; if the object identifier is included in pre-stored object registration information, obtaining a template physiological characteristic corresponding to the object identifier in the object registration information; performing physiological recognition on the audio/video stream to obtain a physiological characteristic of the target object; and comparing the physiological characteristic of the target object with the template physiological characteristic to obtain a comparison result, and if the comparison result meets an authentication condition, confirming that the target object passes through authentication. According to the identity authentication method and apparatus provided by the invention, the efficiency and the reliability of the identity authentication are improved.

Description

technical field [0001] This application relates to network technology, in particular to an identity authentication method and device. Background technique [0002] The development of Internet technology has made people use the Internet more and more widely. For example, you can send and receive emails through mailboxes, shop online, and even work online. Some applications require higher security and need to verify the identity of users. When shopping, users need to verify their identity before paying, or when logging in to an application with high security requirements, the user is only allowed to log in after passing the identity verification. In the related technologies, there are also many identity authentication methods for the Internet, such as face recognition, voiceprint recognition, etc., but the operation of the commonly used authentication methods is relatively cumbersome, for example, the user needs to enter his own identification ID and then verify the voiceprint...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G10L15/25G10L17/22
CPCG10L15/25G10L17/22H04L9/3231G06F21/32H04L9/40G06F18/00G10L15/08G06V40/16G06V40/20G10L17/06G10L17/00G06V40/172
Inventor 李鹏孙逸鹏谢永祥李亮
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products