Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity verification method, device and electronic device

An identity verification method and identity verification technology, applied in the field of identity verification methods, devices and electronic equipment, can solve problems affecting the user's property or information security, and the low reliability of security system security protection, so as to improve reliability, The effect of reducing safety loss

Active Publication Date: 2021-01-05
SOUNDAI TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when the user is coerced or there are other security threats, if the authentication is performed only based on the biometric feature and the operation related to the authentication is performed, the reliability of the security protection of the security system will be too low, thus affecting the Security of the user's property or information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method, device and electronic device
  • Identity verification method, device and electronic device
  • Identity verification method, device and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The identity verification method of the present application can be applied to any intelligent security system (also called an intelligent security platform), and the intelligent security system can be an intelligent door lock system, an information protection system or a payment verification system, etc.

[0053] For ease of understanding, the intelligent security system applicable to this application is firstly introduced. Such as figure 1 As shown, it shows a schematic diagram of the composition and structure of an intelligent security system of the present application.

[0054] Depend on figure 1 It can be seen that the intelligent security system may include: an intelligent protection device 101 and at least one server 102 connected to the intelligent protection device through a network.

[0055] In the embodiment of the present application, the intelligent protection device 101 includes: a controller, a sound collection module for collecting sound signals, and a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity verification method and device and electronic equipment. The method comprises the following steps of acquiring a sound signal of a user; detecting whether voiceprint features of the sound signal are matched with set voiceprint features of the legal user or not; acquiring environment feature identification data associated with the user, wherein the environment feature identification data are used for representing whether a security threat exists in the environment where the user is located or not; and if the voiceprint features of the sound signal are matchedwith the voiceprint features of the legal user and it is determined that the security threat does not exist in the environment where the user is located based on the environment feature identification data, confirming that identity verification is passed. According to the scheme, the security and reliability of identity verification can be improved, so that the safety protection reliability is improved.

Description

technical field [0001] The present application relates to the field of security technology, in particular to an identity verification method, device and electronic equipment. Background technique [0002] Identity verification is a relatively common security protection measure in security systems. For example, in a smart door lock system, the door lock will not be opened until the user's identity verification is passed; another example, in the transfer or payment transaction system, the transfer or payment transaction requested by the user needs to be responded to after the identity verification is passed. [0003] At present, the identity verification method of the security system is only to compare the extracted biometric features such as faces or fingerprints with the preset biometric features. When the similarity exceeds the threshold, the security system will confirm that the identity verification is passed. , and perform operations such as unlocking or transferring fu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G10L17/06G10L25/63G10L15/08H04L9/32
CPCG10L15/08G10L17/06G10L25/63H04L9/3231
Inventor 陈井林苏少炜陈孝良常乐
Owner SOUNDAI TECH CO LTD