Identity authentication method, device and apparatus and data processing method

An identity authentication and identity technology, applied in the field of computer Internet, can solve the problems of easy imitation of user information and hidden dangers in the security of the authentication system, so as to solve the hidden dangers of security, improve the difficulty of attack, and enhance the effect of security.

Inactive Publication Date: 2019-01-15
ALIBABA GRP HLDG LTD
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The embodiment of the present invention provides a method, device, equipment and data processing method for identity authentication, so as to at least solve the technical problem that user information is easily imitated in the existing living body detection scheme, which leads to hidden dangers in the security of the authentication system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, device and apparatus and data processing method
  • Identity authentication method, device and apparatus and data processing method
  • Identity authentication method, device and apparatus and data processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] According to the embodiment of this application, an embodiment of an identity authentication device is provided. It should be noted that this embodiment can be applied to but not limited to registering or logging in to a website, online payment, consumer card swiping, access control, ATM machine withdrawal, time attendance, etc. Scenario, the device can be a smart terminal device such as a computer, a laptop, a tablet computer, or a mobile phone, or a terminal device that needs to be identified, such as an attendance machine, an ATM cash machine, or the like.

[0043] With the rapid development of electronics, computers, networks and communication technologies, people pay more and more attention to the security of electronic information. Traditional identity verification methods using passwords, passwords, keys, smart cards or certificates are prone to loss, theft and vulnerability. Replication problem. Due to the uniqueness and stability of human biological characteris...

Embodiment 2

[0077] According to the embodiment of this application, an embodiment of an identity authentication method is also provided. The identity authentication method provided in this embodiment can be applied to any software and hardware products or systems that require identity authentication, as an optional implementation This method can be applied to identity authentication performed on the server in various applications or Web-based services. It should be noted that the steps shown in the flowcharts of the accompanying drawings may be performed in a computer system, such as a set of computer-executable instructions, and that although a logical order is shown in the flowcharts, in some cases, The steps shown or described may be performed in an order different than here.

[0078] Due to the existing living body detection scheme based on biometrics, the identity of the user is verified by prompting the user to make some facial movements or prompting the user to input a piece of voi...

Embodiment 3

[0142] According to the embodiment of the present application, a device embodiment for implementing the above identity authentication method is also provided, Figure 11 is a schematic diagram of an identity authentication device according to an embodiment of this application, such as Figure 11 As shown, the device includes: a first acquisition unit 111 , a first identification unit 113 and a first verification unit 115 .

[0143] Wherein, the first obtaining unit 111 is used to obtain voice information, wherein the voice information is information generated by the target object reading predetermined content according to a predetermined reading method;

[0144] The first identification unit 113 is used to identify the reading method to be tested from the voice information;

[0145] The first verification unit 115 is configured to successfully verify the identity of the target object when the comparison result between the reading method to be tested and the predetermined read...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses an identity authentication method, device and apparatus and a data processing method. The method includes: acquiring voice information, wherein the voice informationis information generated by a target object reading the predetermined content according to a predetermined reading mode; identifying a reading mode to be tested from the voice information; and when acomparison result of the reading mode to be tested and the predetermined reading mode satisfies a predetermined condition, successfully verifying the identity of the target object. The method solves the technical problem that the user information in an existing living body detection scheme is easy to imitate so that the security of the authentication system has a hidden danger.

Description

technical field [0001] The present application relates to the field of computer Internet, in particular, to an identity authentication method, device, equipment and data processing method. Background technique [0002] With the development of computer Internet technology, people pay more and more attention to network security. The traditional identity authentication method based on "username and password" can no longer meet the requirements of today's users for network security. Therefore, the identity authentication system based on biometric identification technology is widely used in various Internet applications (for example, the payment function and remote account opening of financial and shopping products on mobile phone clients, the time attendance in enterprise human resource management software, etc.) Sign-in and authority management, login and access permission of social and personal data management software, etc.), common biometric recognition is face recognition, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K9/00
CPCG06F21/32G10L17/00G10L17/02G10L21/0208G10L25/51G10L25/90H04L63/0861G06V40/161G06V40/45G10L17/22G06V40/40G10L25/84
Inventor 冯雪涛王炎
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products