Identity authentication method and device based on fusion features, equipment and storage medium

A technology of identity authentication and feature fusion, applied in the field of biometric authentication, can solve the problems of unfavorable protection of information security, low security of information system, and low face recognition

Active Publication Date: 2020-10-23
北京远鉴信息技术有限公司
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, when performing identity authentication, since face recognition is less difficult, it is easier to pass identity authentication only by using face recognition, resulting in lower security for information system login, which is not conducive to protecting information. Safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device based on fusion features, equipment and storage medium
  • Identity authentication method and device based on fusion features, equipment and storage medium
  • Identity authentication method and device based on fusion features, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] figure 1 It shows a schematic flowchart of an identity authentication method based on fusion features provided by the embodiment of the present application, the method includes steps S101-S103; specifically:

[0073] S101. Acquire a first feature vector of facial features and a second feature vector of voiceprint features.

[0074] Specifically, when obtaining the feature vector corresponding to the biological feature, the feature information that can represent the biological identity can be extracted from the collected biological data through the biometric feature recognition technology according to the type of biological feature, and according to the extracted feature information, Get the feature vector corresponding to the type of biological feature.

[0075] Illustratively, for the acquisition of the first feature vector, the facial feature vector can be extracted from the collected facial image of the creature as the first feature vector; for the acquisition of th...

Embodiment 2

[0170] Figure 6 A schematic structural diagram of an identity authentication device based on fusion features provided by an embodiment of the present invention is shown, and the identity authentication device includes:

[0171] A data collection module 601, configured to obtain a first feature vector of facial features and a second feature vector of voiceprint features;

[0172] A data processing module 602, configured to perform fusion processing on the first feature vector and the second feature vector to obtain an identity feature vector;

[0173] The identity authentication module 603 is configured to perform identity authentication according to the identity feature vector.

[0174] Optionally, the data processing module 602 includes:

[0175] an integrated processing unit (not shown in the figure), configured to perform integrated processing on the first feature vector and the second feature vector to obtain an integrated feature vector;

[0176] The first mapping uni...

Embodiment 3

[0197] Such as Figure 7 As shown, an embodiment of the present application provides a computer device 700 for executing the identity authentication method based on fusion features in the present application, the device includes a memory 701, a processor 702 and stored in the memory 701 and can be used in The computer program running on the processor 702, wherein, when the processor 702 executes the computer program, the above-mentioned steps of the identity authentication method based on fusion features are realized.

[0198] Specifically, the above-mentioned memory 701 and processor 702 may be general-purpose memory and processor, which are not specifically limited here. When the processor 702 runs the computer program stored in the memory 701, it can execute the above-mentioned fusion feature-based identity authentication method.

[0199] Corresponding to the fusion feature-based identity authentication method in this application, the embodiment of this application also pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity authentication method and device based on fusion features, equipment and a storage medium. The identity authentication method comprises the steps of: obtaining a first feature vector of a facial feature and a second feature vector of a voiceprint feature; performing fusion processing on the first feature vector and the second feature vector to obtain an identityfeature vector; and performing identity authentication according to the identity feature vector. Thus, during identity authentication, as the identity feature vector is the result of fusion processingof the facial feature and the voiceprint feature, the passing difficulty of identity authentication can be effectively improved, the login security of an information system is further improved, and information security is protected.

Description

technical field [0001] The present invention relates to the technical field of biological authentication, in particular to an identity authentication method, device, equipment and storage medium based on fusion features. Background technique [0002] With the advent of the information age, people often encounter scenarios that require identity verification in their daily lives, such as unlocking mobile phones, unlocking computers, logging into bank accounts, making payments, etc., all of which require identity authentication for users. Ensure information security. When logging in to the system, due to the uniqueness of the identity, when the identity is stolen, it will seriously threaten the security of personal information and system information. Therefore, safe and effective identity authentication is a problem that cannot be ignored. In this case, how to increase the difficulty of identity authentication to protect information security has gradually become an urgent tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/32G06F21/45
CPCG06F21/32G06F21/45
Inventor 白世杰吴富章
Owner 北京远鉴信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products