Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity verification method, device and system

An identity verification and identity technology, applied in the direction of user identity/authority verification, transmission system, digital transmission system, etc., can solve the problem of low accuracy of identity verification methods, improve the level of security verification, improve accuracy, and improve favorability. Effect

Inactive Publication Date: 2018-11-23
ALIBABA GRP HLDG LTD
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides an identity verification method, device and system to at least solve the technical problem of low accuracy of the identity verification method based on a single biometric feature in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method, device and system
  • Identity verification method, device and system
  • Identity verification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] According to an embodiment of the present application, an embodiment of an identity verification system is provided.

[0039] figure 1 is a schematic diagram of an identity verification system according to an embodiment of the present application, such as figure 1As shown, the system can include:

[0040] The fingerprint collection device 102 is configured to collect the fingerprint information of the target object entered in the fingerprint entry area in the current display interface.

[0041] Specifically, the above-mentioned fingerprint collection device can be set on a mobile device, and the setting position depends on the design of the mobile device manufacturer, including: a front-mounted fingerprint device and a rear-mounted fingerprint device. This application does not specifically limit this, and the mobile device may include: Smart phones (including Android mobile phones, IOS mobile phones), IPADs, tablet computers, handheld computers and other equipment; th...

Embodiment 2

[0153] According to the embodiment of the present application, an embodiment of an identity verification method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0154] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Figure 10 It is a block diagram of a hardware structure of a mobile device for implementing an identity verification method according to an embodiment of the present application. Such as Figure 10 As shown, the mobile device 100 may include one or more (shown by 1002a, 1002b, ..., 1002n in the figure) processor 1002 (the processor ...

Embodiment 3

[0184] According to the embodiment of the present application, an embodiment of an identity verification method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0185] Figure 12 is a flow chart of another identity verification method according to an embodiment of the present application. Such as Figure 12 As shown, the above method may include the following steps:

[0186] Step S1202, enter the fingerprint information of the target object in the fingerprint entry area in the current display interface, and collect the currently entered voice information, wherein the currently entered voice information is the information entered by the target object while re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses an identity verification method, device and system. The system includes: a fingerprint collection device, for collecting fingerprint information of a target object entered in a fingerprint entry area in a current display interface; a voice collection device, for collecting currently entered voice information, wherein the currently entered voice information is information entered by the target object after reading of content in the display interface; and a processor, for pre-processing the entered fingerprint information and the entered voice information separately to obtain pre-processing results, then performing similarity scoring on the pre-processing results, and after scoring results of the entered fingerprint information and the entered voice information are obtained, performing a comprehensive scoring on the scoring results of the entered fingerprint information and the entered voice information to verify identify of the target object. The systemsolves a technical problem that accuracy of a single-biometric-characteristic-based identity verification method in the prior art is low.

Description

technical field [0001] The present application relates to the field of biometric identification, in particular, to an identity verification method, device and system. Background technique [0002] Biometric authentication technology, including the close combination of computer and high-tech means such as optics, acoustics, biosensors and biostatistics, using the inherent physiological characteristics of the human body (such as fingerprints, faces, irises, etc.) and behavioral characteristics (such as handwriting) , voice, gait, etc.) for personal identification. Existing biometric authentication technologies mainly include: single voiceprint verification and single fingerprint verification. However, single voiceprint verification has the disadvantage that the recognition performance is easily affected by the user and the acquisition device, and it is not easy to extract voiceprint features in complex environments. Disadvantages: Single fingerprint verification is difficult ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32G10L15/22G06K9/00
CPCH04L9/3231H04L9/3239G10L15/22G10L17/22G10L25/24G06V40/1365
Inventor 蒋伟
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products