Identity verification method, device and equipment
An identity verification method and identity verification technology, applied in the field of identity verification methods, devices and equipment, can solve the problems of leakage, reduced account security, long user operation process, etc., so as to shorten the operation process, improve convenience, and improve security. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0071] like figure 1 As shown, the embodiment of the present application provides an identity verification method, and the execution body of the method may be a terminal device or a server, and the terminal device may be a mobile terminal device such as a mobile phone and a tablet computer, or a terminal such as a personal computer. A device and a server can be an independent server or a server cluster composed of multiple servers. In this embodiment of the present application, in order to improve the efficiency of speech recognition and voiceprint extraction, the execution body of the method is described in detail by taking a server as an example. For the case of a terminal device, the specific processing of the following server can be referred to for execution, which is not repeated here. . The method may specifically include the following steps:
[0072] In step S102, the voice data of the voice uttered by the user for the verification question data is acquired.
[0073]...
Embodiment 2
[0086] like image 3 As shown, the embodiment of the present application provides an identity verification method, the execution subject of the method may be a terminal device or a server, and the terminal device may be a mobile terminal device such as a mobile phone, a tablet computer, etc., or a personal computer, etc. For terminal equipment, the server can be an independent server or a server cluster composed of multiple servers. In this embodiment of the present application, in order to improve the efficiency of speech recognition and voiceprint extraction, the execution body of the method is described in detail by taking a server as an example. For the case of a terminal device, the specific processing of the following server can be referred to for execution, which is not repeated here. . The method specifically includes the following:
[0087] In step S302, an identity verification request initiated by the user is received, and the identity verification request include...
Embodiment 3
[0125] The identity verification method provided by the embodiment of the present application above, based on the same idea, the embodiment of the present application also provides an identity verification device, such as Figure 4 shown.
[0126] The identity verification device includes: a voice acquisition module 401, an identification extraction module 402 and a verification module 403, wherein:
[0127] Voice acquisition module 401, for acquiring the voice data of the voice sent by the user for the verification question data;
[0128] A recognition and extraction module 402, configured to perform speech recognition and voiceprint extraction on the voice data to obtain a speech recognition result and a voiceprint feature;
[0129] The verification module 403 is configured to verify the identity of the user according to the voice recognition result and the voiceprint feature.
[0130] In this embodiment of the present application, the device further includes:
[0131] a ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com