Identity verification method, device and equipment

An identity verification method and identity verification technology, applied in the field of identity verification methods, devices and equipment, can solve the problems of leakage, reduced account security, long user operation process, etc., so as to shorten the operation process, improve convenience, and improve security. Effect

Active Publication Date: 2019-03-05
ADVANCED NEW TECH CO LTD
View PDF2 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above-mentioned methods are easy to leak relevant information of the user, especially to people who are familiar with the user in life, resulting in a decrease in the security of the user's account. Moreover, the above-mentioned verification process usually requires the combination of multiple verification questions. The user operation process is long and the convenience is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method, device and equipment
  • Identity verification method, device and equipment
  • Identity verification method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] like figure 1 As shown, the embodiment of the present application provides an identity verification method, and the execution body of the method may be a terminal device or a server, and the terminal device may be a mobile terminal device such as a mobile phone and a tablet computer, or a terminal such as a personal computer. A device and a server can be an independent server or a server cluster composed of multiple servers. In this embodiment of the present application, in order to improve the efficiency of speech recognition and voiceprint extraction, the execution body of the method is described in detail by taking a server as an example. For the case of a terminal device, the specific processing of the following server can be referred to for execution, which is not repeated here. . The method may specifically include the following steps:

[0072] In step S102, the voice data of the voice uttered by the user for the verification question data is acquired.

[0073]...

Embodiment 2

[0086] like image 3 As shown, the embodiment of the present application provides an identity verification method, the execution subject of the method may be a terminal device or a server, and the terminal device may be a mobile terminal device such as a mobile phone, a tablet computer, etc., or a personal computer, etc. For terminal equipment, the server can be an independent server or a server cluster composed of multiple servers. In this embodiment of the present application, in order to improve the efficiency of speech recognition and voiceprint extraction, the execution body of the method is described in detail by taking a server as an example. For the case of a terminal device, the specific processing of the following server can be referred to for execution, which is not repeated here. . The method specifically includes the following:

[0087] In step S302, an identity verification request initiated by the user is received, and the identity verification request include...

Embodiment 3

[0125] The identity verification method provided by the embodiment of the present application above, based on the same idea, the embodiment of the present application also provides an identity verification device, such as Figure 4 shown.

[0126] The identity verification device includes: a voice acquisition module 401, an identification extraction module 402 and a verification module 403, wherein:

[0127] Voice acquisition module 401, for acquiring the voice data of the voice sent by the user for the verification question data;

[0128] A recognition and extraction module 402, configured to perform speech recognition and voiceprint extraction on the voice data to obtain a speech recognition result and a voiceprint feature;

[0129] The verification module 403 is configured to verify the identity of the user according to the voice recognition result and the voiceprint feature.

[0130] In this embodiment of the present application, the device further includes:

[0131] a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an identity verification method, device and equipment. The method comprises the following steps: obtaining voice data of voice made by a user aimed at verification problem data; carrying out voice recognition and voiceprint extraction on the voice to obtain a voice recognition result and a voiceprint characteristic; and verifying the identity of the user according to the voice recognition result and the voiceprint characteristic. The embodiment of the invention is used so that the safety of a target account of the user can be improved; moreover, the operation process of the user can be shortened; and the convenience for authentication is improved.

Description

technical field [0001] The present application relates to the field of core body technology, and in particular, to an identity verification method, apparatus and device. Background technique [0002] Personal information security, especially the security of personal information in applications in financial scenarios, has attracted more and more attention. How to ensure user information security, improve user experience, and eliminate people's worries about using related applications has become a problem that needs to be solved. important issue. [0003] In most cases, identity verification is an indispensable module of the online system. It is used to determine whether the user corresponding to the account currently logged in to the server is the registered user. Only the user corresponding to the account currently logged in is guaranteed to belong to the user. , the user's resources stored in the server can be secure and controllable. Verification question is a commonly u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06G10L15/26
CPCH04L9/3231H04L63/0861G10L17/22G10L15/26
Inventor 江璇董鹂贇林述民
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products