Identity authentication method and system

A technology for identity authentication and verification results, applied in the field of identity authentication methods and identity authentication systems, can solve the problem of low security of identity authentication, and achieve the effect of improving security strength and ensuring security

Inactive Publication Date: 2018-08-21
BEIJING SINOVOICE TECH CO LTD
View PDF7 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides an identity authentication method and system to solve the problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and system
  • Identity authentication method and system
  • Identity authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] For the above-mentioned purpose of the present invention,

[0036] The features and advantages can be more obvious and understandable, and the present invention will be further described in detail below in conjunction with the drawings and specific embodiments.

[0037] refer to figure 1 , shows a working flow chart of an identity authentication system according to an embodiment of the present invention.

[0038] The identity authentication system includes a voiceprint information processing module, a fingerprint information processing module, a face information processing module and a comprehensive biometric identity authentication module.

[0039] For the general workflow of the identity authentication system:

[0040] When users want to use figure 1 In the business system shown, identity authentication is required, and the user can send an identity authentication request using the business system to the identity authentication system of the embodiment of the prese...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method and system. The method comprises the steps of collecting voice signals, fingerprint image data and face image data of a user; extracting spectrum features of the voice signals to obtain voiceprint feature information; converting the voiceprint feature information, the fingerprint image data and the face image data into a voiceprint matrix, afingerprint image matrix and a face image matrix of preset dimensions; splicing the three matrixes to obtain identity matrix data; inputting the identity matrix data into a preset neural network model to obtain first biological feature data of the user; calculating the similarity between the first biological feature data and second biological feature data of pre-registered users; determining a target user corresponding to the highest similarity; returning a verification result showing that the target user passes the identity authentication if the highest similarity is greater than a preset similarity threshold; and returning the verification result showing that the target user does not pass the identity authentication if the highest similarity is smaller than or equal to the preset similarity threshold.

Description

technical field [0001] The invention relates to the technical field of computer security information, in particular to an identity authentication method and an identity authentication system. Background technique [0002] At present, smart terminals such as computers and smart phones have become important assistants in people's work and life. Shopping, financial management, filing, data storage, etc. through the user's device provide users with very convenient services, but it is followed by security issues such as user data and user property. Therefore, the user device side needs to solve the user's identity authentication problem. [0003] Traditional static passwords have great security risks. Although dynamic passwords can further protect user information security, they cannot solve the situation that user devices are hacked or lost. With the development of various human biometric identification technologies, people use voiceprint, fingerprints, face and other biologic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G06F21/32
CPCG06F21/32H04L9/3231
Inventor 李健郑晓明王富田张连毅武卫东
Owner BEIJING SINOVOICE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products