Identification method, device and system
A technology for identification and identification results, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems of low identification accuracy of identification methods, improve identification accuracy, solve the problem of low identification accuracy, The effect of enhancing the sense of experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0034] According to the embodiments of the present application, an embodiment of an identification method is provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings may be executed in a computer system such as a set of computer-executable instructions, and although A logical order is shown in the flowcharts, but in some cases steps shown or described may be performed in an order different from that herein.
[0035] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. figure 1 A block diagram of the hardware structure of a computer terminal (or mobile device) for implementing the identity recognition method is shown. like figure 1 As shown, the computer terminal 10 (or mobile device 10 ) may include one or more processors 102 (shown as 102a, 102b, . or a processing device such as a programmable logic device FPGA), a memory 104...
Embodiment 2
[0088] According to an embodiment of the present application, an embodiment of an identity recognition method is also provided. It should be noted that the steps shown in the flowchart of the accompanying drawings may be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases steps shown or described may be performed in an order different from that herein.
[0089] Figure 4 It is a flowchart of an identity recognition method according to Embodiment 2 of the present application. like Figure 4 As shown, the method may include the following steps:
[0090] Step S42, acquiring the voice signal of the target object and the first timestamp, where the first timestamp is used to represent the time when the voice signal is acquired.
[0091] Specifically, in the process of using a smart speaker at home, when a user (that is, the above-mentioned target object) needs to control the smart...
Embodiment 3
[0116] According to an embodiment of the present application, an embodiment of an identity recognition method is also provided. It should be noted that the steps shown in the flowchart of the accompanying drawings may be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases steps shown or described may be performed in an order different from that herein.
[0117] Figure 5 It is a flowchart of an identity recognition method according to Embodiment 3 of the present application. like Figure 5 As shown, the method may include the following steps:
[0118] Step S52: Acquire sound information of the target object, where the sound information includes: voiceprint features and a first timestamp when the sound information is acquired.
[0119] Specifically, in the process of using a smart speaker at home, when a user (that is, the above-mentioned target object) needs to control the s...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com