Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identification method, device and system

A technology for identification and identification results, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problems of low identification accuracy of identification methods, improve identification accuracy, solve the problem of low identification accuracy, The effect of enhancing the sense of experience

Active Publication Date: 2022-07-08
ALIBABA GRP HLDG LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides an identification method, device and system to at least solve the technical problem of low recognition accuracy of the identification method in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification method, device and system
  • Identification method, device and system
  • Identification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] According to the embodiments of the present application, an embodiment of an identification method is provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings may be executed in a computer system such as a set of computer-executable instructions, and although A logical order is shown in the flowcharts, but in some cases steps shown or described may be performed in an order different from that herein.

[0035] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. figure 1 A block diagram of the hardware structure of a computer terminal (or mobile device) for implementing the identity recognition method is shown. like figure 1 As shown, the computer terminal 10 (or mobile device 10 ) may include one or more processors 102 (shown as 102a, 102b, . or a processing device such as a programmable logic device FPGA), a memory 104...

Embodiment 2

[0088] According to an embodiment of the present application, an embodiment of an identity recognition method is also provided. It should be noted that the steps shown in the flowchart of the accompanying drawings may be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases steps shown or described may be performed in an order different from that herein.

[0089] Figure 4 It is a flowchart of an identity recognition method according to Embodiment 2 of the present application. like Figure 4 As shown, the method may include the following steps:

[0090] Step S42, acquiring the voice signal of the target object and the first timestamp, where the first timestamp is used to represent the time when the voice signal is acquired.

[0091] Specifically, in the process of using a smart speaker at home, when a user (that is, the above-mentioned target object) needs to control the smart...

Embodiment 3

[0116] According to an embodiment of the present application, an embodiment of an identity recognition method is also provided. It should be noted that the steps shown in the flowchart of the accompanying drawings may be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases steps shown or described may be performed in an order different from that herein.

[0117] Figure 5 It is a flowchart of an identity recognition method according to Embodiment 3 of the present application. like Figure 5 As shown, the method may include the following steps:

[0118] Step S52: Acquire sound information of the target object, where the sound information includes: voiceprint features and a first timestamp when the sound information is acquired.

[0119] Specifically, in the process of using a smart speaker at home, when a user (that is, the above-mentioned target object) needs to control the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses an identity recognition method, device and system. Wherein, the method includes: acquiring the voiceprint feature of the target object and a first timestamp, wherein the first timestamp is used to represent the time when the voiceprint feature is acquired; acquiring the voiceprint feature from a voiceprint database that is successfully matched with the voiceprint feature Pre-stored voiceprint features and a second time stamp, wherein the second time stamp is used to represent the time when the pre-stored voiceprint features are obtained; based on the first time stamp and the second time stamp, a similarity threshold is determined; based on the similarity threshold, As well as the similarity between the voiceprint feature and the pre-stored voiceprint feature, the recognition result of the target object is obtained. The present application solves the technical problem that the identification accuracy of the identification method in the prior art is low.

Description

technical field [0001] The present application relates to the field of voiceprint recognition, and in particular, to an identity recognition method, device and system. Background technique [0002] Smart speakers are tools for family members to access the Internet through voice, such as on-demand songs, online shopping, or knowing the weather forecast. It can also control smart home devices, such as opening curtains, setting refrigerator temperature, and warming up the water heater in advance. In order to improve the security of the smart speaker and prevent non-family members from illegally controlling the smart speaker, family members need to register in the smart speaker and perform identity authentication before each control. [0003] However, demand background: due to the environmental information contained in the audio registered by the user, as well as the speaker's own information, subtle or large changes will occur over time, including environmental noise (such as h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32G10L17/00H04N21/439
CPCH04L9/3231H04L9/3297H04N21/4394G10L17/00
Inventor 赵情恩索宏彬刘刚卓著雷赟
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products