Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method and device

A technology of identity authentication and identity authentication results, applied in the direction of digital data authentication, etc., can solve problems such as blurred pictures, poor ambient light, and user's cold voice change, to achieve the effect of improving robustness and accuracy, and avoiding interference factors

Pending Publication Date: 2020-05-26
HUAWEI TECH CO LTD
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, technologies for integrated identity authentication based on biometrics usually require sequential authentication of multiple biometrics, that is, the identification and authentication of the second biometric will only be enabled if the confidence level of the first biometric is within the preset confidence interval; However, when the confidence of the first biometric identification is less than the minimum value of the confidence interval, the authentication will directly fail; that is, if the acquired biometric cannot be recognized due to the smart terminal or the user's own factors, such as When the smart terminal device is shooting, the ambient light is not good, blurred pictures are captured, and the smart terminal device does not capture the user's frontal image; the background noise is large during sound detection, no one is talking, the user's voice is low, or the user's voice changes due to a cold, etc. In this case, it will cause the accuracy of the smart terminal device to identify the user's identity to be low, or even unable to identify the user's identity.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device
  • Identity authentication method and device
  • Identity authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] The following will describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0085] figure 1 It is a schematic diagram of the system architecture provided by the embodiment of this application. Such as figure 1 As shown, the system 100 may include a mobile terminal 110 , an intelligent robot 120 , a user 130 and a cloud 140 .

[0086] Exemplarily, the mobile terminal 110 may refer to a mobile phone terminal, a tablet computer, a notebook computer, etc., wherein an application program (application, APP) for controlling the intelligent robot 120 may be installed in the mobile term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity authentication method and device applied to the field of artificial intelligence AI. The invention can be specifically applied to intelligent terminal equipment suchas an intelligent robot for user identity authentication, and comprises the steps of acquiring information of multi-modal biological characteristics of a to-be-recognized user wherein the multi-modalbiological characteristics comprise at least two biological characteristics of the to-be-recognized user; performing identity authentication on the to-be-identified user in parallel according to at least two biological characteristics; and determining an identity authentication result of the to-be-identified user according to an identification result obtained by performing identity authenticationon the to-be-identified user in parallel, with the identity authentication result being obtained based on a confidence coefficient of matching of the multi-modal biological feature and a preset biological feature. According to the technical scheme, interference factors existing in identity authentication through a single biological feature can be effectively avoided, and therefore the robustnessand accuracy of the identity authentication method are improved.

Description

technical field [0001] This application relates to the field of artificial intelligence, and more specifically, to a method and device for identity authentication. Background technique [0002] Artificial intelligence (AI) is a theory, method, technology and application system that uses digital computers or machines controlled by digital computers to simulate, extend and expand human intelligence, perceive the environment, acquire knowledge and use knowledge to obtain the best results. In other words, artificial intelligence is the branch of computer science that attempts to understand the nature of intelligence and produce a new class of intelligent machines that respond in ways similar to human intelligence. Artificial intelligence is to study the design principles and implementation methods of various intelligent machines, so that the machines have the functions of perception, reasoning and decision-making. Research in the field of artificial intelligence includes roboti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 杨长盛
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products