CN103177238A - Terminal and user identifying method - Google Patents

Terminal and user identifying method Download PDF

Info

Publication number
CN103177238A
CN103177238A CN2011104409080A CN201110440908A CN103177238A CN 103177238 A CN103177238 A CN 103177238A CN 2011104409080 A CN2011104409080 A CN 2011104409080A CN 201110440908 A CN201110440908 A CN 201110440908A CN 103177238 A CN103177238 A CN 103177238A
Authority
CN
China
Prior art keywords
data
user
active user
password
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011104409080A
Other languages
Chinese (zh)
Other versions
CN103177238B (en
Inventor
毕忱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201110440908.0A priority Critical patent/CN103177238B/en
Publication of CN103177238A publication Critical patent/CN103177238A/en
Application granted granted Critical
Publication of CN103177238B publication Critical patent/CN103177238B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The invention provides a terminal. The terminal comprises a collecting device, an oral area image collecting module, an audio collecting module and a judging module, wherein the collecting device is used for collecting image data and audio data, the oral area image collecting module collects oral area dynamic image data through the collecting device, the oral area dynamic image data are generated when real time users input passwords, the audio collecting module collects audio data through the collecting device, the audio data are generated when real time users input passwords, and the judging module compares the oral area dynamic image data collected by the image collecting module and the audio data collected by the audio collecting module with pre-stored data, and confirms the real time users to be authorized users if the oral area dynamic image data and the audio data are matched with the pre-stored data. Correspondingly, the invention further provides a user identifying method. By means of the technical scheme of the terminal and the user identifying method, forged user characteristics such as photos for face identification can be effectively identified, so that safety of identifying processes is enhanced.

Description

Terminal and user identification method
Technical field
The present invention relates to user recognition technology, in particular to a kind of terminal and a kind of user identification method.
Background technology
In correlation technique, the mode of user's identification is more and more, such as by modes such as recognition of face or speech recognitions, can effectively identify.But along with above-mentioned recognition method is used more and more extensively, also manifest gradually the defective of these recognition method, as the mode for recognition of face, can pass through identification by user's photo, and the mode of speech recognition, also can adopt the mode of recording to carry out, this security for identification is difficult to ensure.
Therefore, need a kind of New Consumers recognition technology, can effectively identify the user characteristics of forgery as carry out the behavior of recognition of face by photo, strengthened the security of identifying.
Summary of the invention
The present invention just is being based on the problems referred to above, has proposed a kind of New Consumers recognition technology, can effectively identify the user characteristics of forgery as carry out the behavior of recognition of face by photo, has strengthened the security of identifying.
In view of this, the present invention proposes a kind of terminal, comprising: mouth images acquisition module, the oral area dynamic image data when gathering active user input password by harvester; Voice acquisition module, the speech data when gathering the described password of described active user input by described harvester; And judge module, respectively the described oral area dynamic image data of described mouth images acquisition module collection, the described speech data that reaches described voice acquisition module collection and pre-deposit data are compared, if all mate, confirm that described active user is authorized user.
In this technical scheme, carry out user identification by voice and image technique simultaneously, wherein, voice technology refers to gather user's sound, and after comparing with former owner's sound, if coupling is confirmed; Image technique is by gathering user's real-time oral area dynamic image data, here " dynamically " is due in related art scheme, use the systems of also can out-tricking such as recording or photo, complete identifying operation, if and during user's oral area generation dynamic change, can prove that the image that obtains and voice etc. come from real user, have avoided said circumstances.Simultaneously, identify for fear of using video file, the password here can be one section word, a word etc., make the user when reading this password, on the one hand to voice whether with the voice match of authorized user, on the one hand whether language and the password of reading is mated on word, lip-syncly on the other hand whether mate on word with password, judge by above-mentioned aspect comprehensively, thus the security of lifting user identifying.In addition, the harvester here comprises: camera, microphone etc. can gather the view data of outside and speech data etc.
In technique scheme, preferably, also comprise: the facial image acquisition module, by the real-time face data of the described active user of described harvester collection; And described judge module also is used for: described real-time face data and the described pre-deposit data of the collection of described facial image acquisition module are compared, if coupling confirms that described active user is described authorized user.In this technical scheme, can also at first carry out " recognition of face " to the user, if can't need not to carry out the identification of voice or the shape of the mouth as one speaks by identification, save identification step and system resource.
In technique scheme, preferably, also comprise: the Graphics Processing module demonstrates described password, and points out described active user to read described password in the Preset Time threshold value on described terminal.In this technical scheme, can demonstrate a word or a sentence on the screen of terminal, and the prompting user reads.When the user read this password, terminal can be obtained user's language data and mouth shape data simultaneously, in order to carry out user's identification.
In technique scheme, preferably, described judge module specifically comprises: the phonetic decision submodule compares the speech data in described real-time voice data and described pre-deposit data; Mouth images judgement submodule compares the described dynamic mouth shape data in described oral area dynamic image data and described pre-deposit data; And the processing submodule, in the situation that being, the judged result of described phonetic decision submodule and described mouth images judgement submodule is complementary, confirm that described active user is described authorized user.In this technical scheme, preset data can be divided into a plurality of data, comprise language data, mouth shape data, face data etc., all gather voice from authorized user, image etc., thereby the various data such as mouth shape data, speech data, face data are compared respectively, complete the identification to the user.
In technique scheme, preferably, also comprise: the password receiver module in the situation that can't confirm that described active user is described authorized user, receives the recognition code of described active user input; And the password judge module, judge whether the described recognition code that described password receiver module receives is identical with default recognition code, if identical, confirms that described active user is described authorized user.In this technical scheme, terminal may can't effectively identify the user for some reason, make on account of illness the not obvious or other reasons of phonetic feature as the user, perhaps the user may wish for some reason that other users substitute its obtaining information from terminal, perhaps under some other reasonses, in order still to obtain the information in terminal, one or more one or more groups super codes can be set, when other recognition method can't effectively be identified, the super administrator right that has by this password is smoothly by verifying and obtain information in terminal.
According to another aspect of the invention, comprising: step 202, oral area dynamic image data and speech data when gathering active user input password by harvester; Step 204 is compared described oral area dynamic image data and described speech data respectively with pre-deposit data, if all mate, confirm that described active user is authorized user.
In this technical scheme, carry out user identification by voice and image technique simultaneously, wherein, voice technology refers to gather user's sound, and after comparing with former owner's sound, if coupling is confirmed; Image technique is by gathering user's real-time oral area dynamic image data, here " dynamically " is due in related art scheme, use the systems of also can out-tricking such as recording or photo, complete identifying operation, if and during user's oral area generation dynamic change, can prove that the image that obtains and voice etc. come from real user, have avoided said circumstances.Simultaneously, identify for fear of using video file, the password here can be one section word, a word etc., make the user when reading this password, on the one hand to voice whether with the voice match of authorized user, on the one hand whether language and the password of reading is mated on word, lip-syncly on the other hand whether mate on word with password, judge by above-mentioned aspect comprehensively, thus the security of lifting user identifying.In addition, the harvester here comprises: camera, microphone etc. can gather the view data of outside and speech data etc.
In technique scheme, preferably, before described step 202, also comprise: described harvester gathers the real-time face data of described active user, and described real-time face data and described pre-deposit data are compared; If described real-time face data and described pre-deposit data are complementary, confirm that described active user is described authorized user.In this technical scheme, can also at first carry out " recognition of face " to the user, if can't need not to carry out the identification of voice or the shape of the mouth as one speaks by identification, save identification step and system resource.
In technique scheme, preferably, described step 202 also comprises: demonstrate described password on described terminal, and point out described active user to read described password in the Preset Time threshold value.In this technical scheme, can demonstrate a word or a sentence on the screen of terminal, and the prompting user reads.When the user read this password, terminal can be obtained user's language data and mouth shape data simultaneously, in order to carry out user's identification.
In technique scheme, preferably, described step 204 also comprises: described pre-deposit data refer to that the pronunciation with described password is complementary, from dynamic mouth shape data and the speech data of described authorized user; If the described speech data in described real-time voice data and described pre-deposit data is complementary, and the described dynamic mouth shape data in described oral area dynamic image data and described pre-deposit data is complementary, and confirms that described active user is described authorized user.In this technical scheme, preset data can be divided into a plurality of data, comprise language data, mouth shape data, face data etc., all gather voice from authorized user, image etc., thereby the various data such as mouth shape data, speech data, face data are compared respectively, complete the identification to the user.
In technique scheme, preferably, also comprise: if can't confirm that described active user is described authorized user, fills in recognition code by described active user in described terminal, if described recognition code is identical with default recognition code, confirm that described active user is described authorized user.In this technical scheme, terminal may can't effectively identify the user for some reason, make on account of illness the not obvious or other reasons of phonetic feature as the user, perhaps the user may wish for some reason that other users substitute its obtaining information from terminal, perhaps under some other reasonses, in order still to obtain the information in terminal, one or more one or more groups super codes can be set, when other recognition method can't effectively be identified, the super administrator right that has by this password is smoothly by verifying and obtain information in terminal.
By above technical scheme, can effectively identify the user characteristics of forgery as carry out the behavior of recognition of face by photo, strengthened the security of identifying.
Description of drawings
Fig. 1 shows the block diagram of terminal according to an embodiment of the invention;
Fig. 2 shows the process flow diagram of user identification method according to an embodiment of the invention;
Fig. 3 shows the particular flow sheet of user's identification according to an embodiment of the invention;
Fig. 4 shows the particular flow sheet of user's identification according to an embodiment of the invention;
Fig. 5 shows the particular flow sheet of user's identification according to an embodiment of the invention;
Fig. 6 shows the particular flow sheet of user's identification according to an embodiment of the invention.
Embodiment
In order more clearly to understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.
Set forth in the following description a lot of details so that fully understand the present invention, still, the present invention can also adopt other to be different from other modes described here and implement, and therefore, the present invention is not limited to the restriction of following public specific embodiment.
Fig. 1 shows the block diagram of terminal according to an embodiment of the invention.
As shown in Figure 1, terminal 100 according to an embodiment of the invention, comprising: mouth images acquisition module 102, the oral area dynamic image data when gathering active user input password by harvester; Voice acquisition module 104, the speech data when gathering active user input password by harvester; And judge module 106, the oral area dynamic image data that respectively mouth images acquisition module 102 is gathered, the speech data that reaches voice acquisition module 104 collections and pre-deposit data compare, if all mate, confirm that active user is authorized user.
In this technical scheme, carry out user identification by voice and image technique simultaneously, wherein, voice technology refers to gather user's sound, and after comparing with former owner's sound, if coupling is confirmed; Image technique is by gathering user's real-time oral area dynamic image data, here " dynamically " is due in related art scheme, use the systems of also can out-tricking such as recording or photo, complete identifying operation, if and during user's oral area generation dynamic change, can prove that the image that obtains and voice etc. come from real user, have avoided said circumstances.Simultaneously, identify for fear of using video file, the password here can be one section word, a word etc., make the user when reading this password, on the one hand to voice whether with the voice match of authorized user, on the one hand whether language and the password of reading is mated on word, lip-syncly on the other hand whether mate on word with password, judge by above-mentioned aspect comprehensively, thus the security of lifting user identifying.In addition, the harvester here comprises: camera, microphone etc. can gather the view data of outside and speech data etc.
In technique scheme, also comprise: facial image acquisition module 108 gathers the real-time face data of active user by harvester; And judge module 106 also is used for: the real-time face data that facial image acquisition module 108 is gathered compares with pre-deposit data, if coupling confirms that active user is authorized user.In this technical scheme, can also at first carry out " recognition of face " to the user, if can't need not to carry out the identification of voice or the shape of the mouth as one speaks by identification, save identification step and system resource.
In technique scheme, also comprise: Graphics Processing module 110, demonstrate password on terminal 100, and the prompting active user is read password in the Preset Time threshold value.In this technical scheme, can demonstrate a word or a sentence on the screen of terminal 100, and the prompting user reads.When the user read this password, terminal can be obtained user's language data and mouth shape data simultaneously, in order to carry out user's identification.
In technique scheme, judge module 106 specifically comprises: phonetic decision submodule 1062 compares the speech data in real-time voice data and pre-deposit data; Mouth images judgement submodule 1064 compares the dynamic mouth shape data in oral area dynamic image data and pre-deposit data; And process submodule 1066, and in the situation that being, the judged result of phonetic decision submodule 1062 and mouth images judgement submodule 1064 is complementary, the confirmation active user is authorized user.In this technical scheme, preset data can be divided into a plurality of data, comprise language data, mouth shape data, face data etc., all gather voice from authorized user, image etc., thereby the various data such as mouth shape data, speech data, face data are compared respectively, complete the identification to the user.
In technique scheme, also comprise: password receiver module 112 in the situation that can't confirm that active user is authorized user, receives the recognition code of active user input; And password judge module 114, judge whether the recognition code that password receiver module 112 receives is identical with default recognition code, if identical, confirms that active user is authorized user.in this technical scheme, terminal 100 may can't effectively identify the user for some reason, make on account of illness the not obvious or other reasons of phonetic feature as the user, perhaps the user may wish for some reason that other users substitute its obtaining information from terminal 100, perhaps under some other reasonses, in order still to obtain the information in terminal 100, one or more one or more groups super codes can be set, when other recognition method can't effectively be identified, the super administrator right that has by this password, smoothly by verifying and obtain information in terminal.
Fig. 2 shows the process flow diagram of user identification method according to an embodiment of the invention.
As shown in Figure 2, user identification method, comprising: step 202, oral area dynamic image data and speech data when gathering active user input password by harvester according to an embodiment of the invention; Step 204 is compared oral area dynamic image data and speech data and pre-deposit data respectively, if all mate, confirms that active user is authorized user.
In this technical scheme, carry out user identification by voice and image technique simultaneously, wherein, voice technology refers to gather user's sound, and after comparing with former owner's sound, if coupling is confirmed; Image technique is by gathering user's real-time oral area dynamic image data, here " dynamically " is due in related art scheme, use the systems of also can out-tricking such as recording or photo, complete identifying operation, if and during user's oral area generation dynamic change, can prove that the image that obtains and voice etc. come from real user, have avoided said circumstances.Simultaneously, identify for fear of using video file, the password here can be one section word, a word etc., make the user when reading this password, on the one hand to voice whether with the voice match of authorized user, on the one hand whether language and the password of reading is mated on word, lip-syncly on the other hand whether mate on word with password, judge by above-mentioned aspect comprehensively, thus the security of lifting user identifying.In addition, the harvester here comprises: camera, microphone etc. can gather the view data of outside and speech data etc.
In technique scheme, before step 202, also comprise: harvester gathers the real-time face data of active user, and real-time face data and pre-deposit data are compared; If face data is complementary with pre-deposit data in real time, confirm that active user is authorized user.In this technical scheme, can also at first carry out " recognition of face " to the user, if can't need not to carry out the identification of voice or the shape of the mouth as one speaks by identification, save identification step and system resource.
In technique scheme, step 202 also comprises: demonstrate described password on terminal, and the prompting active user is read password in the Preset Time threshold value.In this technical scheme, can demonstrate a word or a sentence on the screen of terminal, and the prompting user reads.When the user read this password, terminal can be obtained user's language data and mouth shape data simultaneously, in order to carry out user's identification.
In technique scheme, step 204 also comprises: pre-deposit data refer to that the pronunciation with password is complementary, from dynamic mouth shape data and the speech data of authorized user; If the real-time voice data are complementary with speech data in pre-deposit data, and the oral area dynamic image data is complementary with dynamic mouth shape data in pre-deposit data, confirms that active user is authorized user.In this technical scheme, preset data can be divided into a plurality of data, comprise language data, mouth shape data, face data etc., all gather voice from authorized user, image etc., thereby the various data such as mouth shape data, speech data, face data are compared respectively, complete the identification to the user.
In technique scheme, also comprise: if can't confirm that active user is authorized user, filled in recognition code by active user in terminal, if recognition code is identical with default recognition code, confirm that active user is authorized user.In this technical scheme, terminal may can't effectively identify the user for some reason, make on account of illness the not obvious or other reasons of phonetic feature as the user, perhaps the user may wish for some reason that other users substitute its obtaining information from terminal, perhaps under some other reasonses, in order still to obtain the information in terminal, one or more one or more groups super codes can be set, when other recognition method can't effectively be identified, the super administrator right that has by this password is smoothly by verifying and obtain information in terminal.
Fig. 3 shows the particular flow sheet of user's identification according to an embodiment of the invention.
As shown in Figure 3, the idiographic flow of user's identification is as follows according to an embodiment of the invention:
Step 302 is waken the screen of terminal up, and in this embodiment, the terminal that is used to be under holding state based on technical scheme of the present invention reenters normal running status.Certainly, technical scheme of the present invention obviously can also be used for other multiple occasions, the customer identification device when being used for opening the door, or the unlatching of the terminals such as mobile phone, computer etc., can be used for the various switch behaviors of identifying realization by the user in a word.
Step 304 judges whether by normal recognition of face, if enter step 306, otherwise enter step 316.By face recognition technology, can user's facial characteristics be caught, but in actual use procedure, user's photo also can authenticate by identification, this makes the safety in utilization of this technology greatly reduce.
Step 306 demonstrates identifying code on screen.
Step 308, the user reads identifying code.
Step 310A obtains the real-time voice data.
Step 310B obtains real-time mouth shape data.
Step 312 judges whether speech data coupling and mouth shape data coupling, if coupling enters step 314, otherwise enters step 316.Only the user is carried out recognition of face in step 304, but in practical application, therefore user's photo also can need to add other technological means successfully by recognition of face, as real-time voice data and the real-time mouth shape data of obtaining respectively in step 310A and step 310B.Obtaining of the real-time mouth shape data here, for definite detected " people's face " is not the static images on photo, but from real " people ", its shape of the mouth as one speaks can change along with reading identifying code, is dynamic process.Simultaneously, whether the shape of the mouth as one speaks that real-time mouth shape data and identifying code are real corresponding is mated, judgement is that the dynamic image that detects is Real-time Obtaining, rather than the video of playing etc.In addition, by the detection of real-time voice data, avoid because other users' facial characteristics may be similar with the actual user, and carried out Real-time and Dynamic Detection, and be mistaken for real user.Therefore, by to many aspects and angles such as recognition of face, speech recognition, dynamic Mouth-Shape Recognition, complete the real identification to the user, promoted accuracy rate and the security of identification.
Step 314 is proved to be successful.
Step 316, the input super code.The super code here has highest weight limit, and other identifying all during failure, still can be used for by checking immediately.This be for prevent due to such as the user sick after, phonetic feature changes and can't correctly identify, or the user may wish by other users from his terminal on behalf of obtaining some data, can realize in this way.
Step 318 judges whether super code is correct.
Step 320, authentication failed.
Fig. 4 shows the particular flow sheet of user's identification according to an embodiment of the invention.
As shown in Figure 4, the idiographic flow of user's identification is as follows according to an embodiment of the invention:
Step 402 is waken the screen of terminal up, and in this embodiment, the terminal that is used to be under holding state based on technical scheme of the present invention reenters normal running status.Certainly, technical scheme of the present invention obviously can also be used for other multiple occasions, the customer identification device when being used for opening the door, or the unlatching of the terminals such as mobile phone, computer etc., can be used for the various switch behaviors of identifying realization by the user in a word.
Step 404 demonstrates identifying code on screen.
Step 406, the user reads identifying code.
Step 408A obtains the real-time voice data.
Step 408B obtains real-time mouth shape data.
Step 410 judges whether speech data coupling and mouth shape data coupling, if coupling enters step 412, otherwise enters step 414.If only the user is carried out recognition of face, in actual applications, therefore user's photo also can need to add other technological means successfully by recognition of face, as real-time voice data and the real-time mouth shape data of obtaining respectively in step 408A and step 408B.Obtaining of the real-time mouth shape data here, for definite detected " people's face " is not the static images on photo, but from real " people ", its shape of the mouth as one speaks can change along with reading identifying code, is dynamic process.Simultaneously, whether the shape of the mouth as one speaks that real-time mouth shape data and identifying code are real corresponding is mated, judgement is that the dynamic image that detects is Real-time Obtaining, rather than the video of playing etc.In addition, by the detection of real-time voice data, avoid because other users' facial characteristics may be similar with the actual user, and carried out Real-time and Dynamic Detection, and be mistaken for real user.Therefore, by to many aspects and angles such as recognition of face, speech recognition, dynamic Mouth-Shape Recognition, complete the real identification to the user, promoted accuracy rate and the security of identification.
Step 412 judges whether by normal recognition of face, if enter step 418, otherwise enter step 420.Be judged as true man in step 410, rather than the recording or the video recording that use, more further by face recognition technology, user's facial characteristics caught, avoided similar due on sound just, caused occuring mistake identification.
Step 414, the input super code.The super code here has highest weight limit, and other identifying all during failure, still can be used for by checking immediately.This be for prevent due to such as the user sick after, phonetic feature changes and can't correctly identify, or the user may wish by other users from his terminal on behalf of obtaining some data, can realize in this way.
Step 416 judges whether super code is correct.
Step 418 is proved to be successful.
Step 420, authentication failed.
Fig. 5 shows the particular flow sheet of user's identification according to an embodiment of the invention.
As shown in Figure 5, the idiographic flow of user's identification is as follows according to an embodiment of the invention:
Step 502 is waken the screen of terminal up, and in this embodiment, the terminal that is used to be under holding state based on technical scheme of the present invention reenters normal running status.Certainly, technical scheme of the present invention obviously can also be used for other multiple occasions, the customer identification device when being used for opening the door, or the unlatching of the terminals such as mobile phone, computer etc., can be used for the various switch behaviors of identifying realization by the user in a word.
Step 504 demonstrates identifying code on screen.
Step 506, the user reads identifying code.
Step 508 is obtained real-time mouth shape data.
Step 510 judges whether mouth shape data mates, if coupling enters step 512, otherwise enters step 514.If only the user is carried out recognition of face, in actual applications, therefore user's photo also can need to add other technological means successfully by recognition of face, as real-time voice data and the real-time mouth shape data of obtaining respectively in step 508.Obtaining of the real-time mouth shape data here, for definite detected " people's face " is not the static images on photo, but from real " people ", its shape of the mouth as one speaks can change along with reading identifying code, is dynamic process.Simultaneously, whether the shape of the mouth as one speaks that real-time mouth shape data and identifying code are real corresponding is mated, judgement is that the dynamic image that detects is Real-time Obtaining, rather than the video of playing etc.Therefore, by to aspect and angles such as dynamic Mouth-Shape Recognition, complete the real identification to the user, promoted accuracy rate and the security of identification.
Step 512 judges whether by normal recognition of face, if enter step 518, otherwise enter step 520.Be judged as true man in step 510, rather than the photo or the video recording that use, more further by face recognition technology, user's facial characteristics caught, avoided similar due on sound just, caused occuring mistake identification.
Step 514, the input super code.The super code here has highest weight limit, and other identifying all during failure, still can be used for by checking immediately.This be for prevent due to such as the user sick after, phonetic feature changes and can't correctly identify, or the user may wish by other users from his terminal on behalf of obtaining some data, can realize in this way.
Step 516 judges whether super code is correct.
Step 518 is proved to be successful.
Step 520, authentication failed.
Fig. 6 shows the particular flow sheet of user's identification according to an embodiment of the invention.
As shown in Figure 6, the idiographic flow of user's identification is as follows according to an embodiment of the invention:
Step 602 is waken the screen of terminal up, and in this embodiment, the terminal that is used to be under holding state based on technical scheme of the present invention reenters normal running status.Certainly, technical scheme of the present invention obviously can also be used for other multiple occasions, the customer identification device when being used for opening the door, or the unlatching of the terminals such as mobile phone, computer etc., can be used for the various switch behaviors of identifying realization by the user in a word.
Step 604 demonstrates identifying code on screen.
Step 606, the user reads identifying code.
Step 608A obtains the real-time voice data.
Step 608B obtains real-time mouth shape data.
Step 610 judges whether speech data coupling and mouth shape data coupling, if coupling enters step 616, otherwise enters step 612.In actual applications, therefore user's photo also can need to add other technological means successfully by recognition of face, as real-time voice data and the real-time mouth shape data of obtaining respectively in step 608A and step 608B.Obtaining of the real-time mouth shape data here, for definite detected " people's face " is not the static images on photo, but from real " people ", its shape of the mouth as one speaks can change along with reading identifying code, is dynamic process.Simultaneously, whether the shape of the mouth as one speaks that real-time mouth shape data and identifying code are real corresponding is mated, judgement is that the dynamic image that detects is Real-time Obtaining, rather than the video of playing etc.In addition, by the detection of real-time voice data, avoid because other users' facial characteristics may be similar with the actual user, and carried out Real-time and Dynamic Detection, and be mistaken for real user.Therefore, by to many aspects and angles such as recognition of face, speech recognition, dynamic Mouth-Shape Recognition, complete the real identification to the user, promoted accuracy rate and the security of identification.
Step 612, the input super code.The super code here has highest weight limit, and other identifying all during failure, still can be used for by checking immediately.This be for prevent due to such as the user sick after, phonetic feature changes and can't correctly identify, or the user may wish by other users from his terminal on behalf of obtaining some data, can realize in this way.
Step 614 judges whether super code is correct.
Step 616 is proved to be successful.
Step 618, authentication failed.
More than be described with reference to the accompanying drawings technical scheme of the present invention, considered in correlation technique, for the mode of recognition of face, can pass through identification by user's photo, and the mode of speech recognition also can adopt the mode of recording to carry out, and this security for identification is difficult to ensure.Therefore, the invention provides a kind of terminal and a kind of user identification method, can effectively identify the user characteristics of forgery as carry out the behavior of recognition of face by photo, strengthened the security of identifying.
The above is only the preferred embodiments of the present invention, is not limited to the present invention, and for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (10)

1. a terminal, is characterized in that, comprising:
The mouth images acquisition module, the oral area dynamic image data when gathering active user input password by harvester;
Voice acquisition module, the speech data when gathering the described password of described active user input by described harvester; And
Judge module compares the described oral area dynamic image data of described mouth images acquisition module collection, the described speech data that reaches described voice acquisition module collection and pre-deposit data respectively, if all mate, confirms that described active user is authorized user.
2. terminal according to claim 1, is characterized in that, also comprises:
The facial image acquisition module is by the real-time face data of the described active user of described harvester collection; And
Described judge module also is used for: described real-time face data and the described pre-deposit data of the collection of described facial image acquisition module are compared, if coupling confirms that described active user is described authorized user.
3. terminal according to claim 1, is characterized in that, also comprises:
The Graphics Processing module demonstrates described password on described terminal, and points out described active user to read described password in the Preset Time threshold value.
4. terminal according to claim 1, is characterized in that, described judge module specifically comprises:
The phonetic decision submodule compares the speech data in described real-time voice data and described pre-deposit data;
Mouth images judgement submodule compares the described dynamic mouth shape data in described oral area dynamic image data and described pre-deposit data; And
Process submodule, be complementary in the situation that the judged result of described phonetic decision submodule and described mouth images judgement submodule is, confirm that described active user is described authorized user.
5. terminal according to claim 1, is characterized in that, also comprises:
The password receiver module in the situation that can't confirm that described active user is described authorized user, receives the recognition code of described active user input; And
The password judge module judges whether the described recognition code that described password receiver module receives is identical with default recognition code, if identical, confirms that described active user is described authorized user.
6. a user identification method, is characterized in that, comprising:
Step 202, oral area dynamic image data and speech data when gathering active user input password by harvester;
Step 204 is compared described oral area dynamic image data and described speech data respectively with pre-deposit data, if all mate, confirm that described active user is authorized user.
7. user identification method according to claim 6, is characterized in that, before described step 202, also comprises:
Described harvester gathers the real-time face data of described active user, and described real-time face data and described pre-deposit data are compared;
If described real-time face data and described pre-deposit data are complementary, confirm that described active user is described authorized user.
8. user identification method according to claim 6, is characterized in that, described step 202 also comprises:
Demonstrate described password on described terminal, and point out described active user to read described password in the Preset Time threshold value.
9. user identification method according to claim 6, is characterized in that, described step 204 also comprises:
That described pre-deposit data refers to is that the pronunciation with described password is complementary, from dynamic mouth shape data and the speech data of described authorized user;
If the described speech data in described real-time voice data and described pre-deposit data is complementary, and the described dynamic mouth shape data in described oral area dynamic image data and described pre-deposit data is complementary, and confirms that described active user is described authorized user.
10. user identification method according to claim 6, is characterized in that, also comprises:
If can't confirm that described active user is described authorized user, fill in recognition code by described active user in described terminal, if described recognition code is identical with default recognition code, confirm that described active user is described authorized user.
CN201110440908.0A 2011-12-26 2011-12-26 Terminal and user identification method Active CN103177238B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110440908.0A CN103177238B (en) 2011-12-26 2011-12-26 Terminal and user identification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110440908.0A CN103177238B (en) 2011-12-26 2011-12-26 Terminal and user identification method

Publications (2)

Publication Number Publication Date
CN103177238A true CN103177238A (en) 2013-06-26
CN103177238B CN103177238B (en) 2019-01-15

Family

ID=48637081

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110440908.0A Active CN103177238B (en) 2011-12-26 2011-12-26 Terminal and user identification method

Country Status (1)

Country Link
CN (1) CN103177238B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103841108A (en) * 2014-03-12 2014-06-04 北京天诚盛业科技有限公司 Authentication method and system of biological characteristics of user
CN104157015A (en) * 2014-08-20 2014-11-19 优化科技(苏州)有限公司 Self-service card dispenser control system
CN104217212A (en) * 2014-08-12 2014-12-17 优化科技(苏州)有限公司 Real person identity verification method
CN104348621A (en) * 2013-08-02 2015-02-11 成都林海电子有限责任公司 Authentication system based on voiceprint recognition and method thereof
CN106911630A (en) * 2015-12-22 2017-06-30 上海仪电数字技术股份有限公司 Terminal and the authentication method and system of identity identifying method, terminal and authentication center
CN108427874A (en) * 2018-03-12 2018-08-21 平安科技(深圳)有限公司 Identity identifying method, server and computer readable storage medium
CN108573131A (en) * 2017-03-09 2018-09-25 腾讯科技(深圳)有限公司 The method and apparatus verified in control terminal equipment
CN108830153A (en) * 2018-05-07 2018-11-16 平安普惠企业管理有限公司 For the auth method of recognition of face, device, equipment and storage medium
CN109377995A (en) * 2018-11-20 2019-02-22 珠海格力电器股份有限公司 A kind of method and apparatus controlling equipment
CN109547641A (en) * 2018-12-21 2019-03-29 汝保共 Mode controllable type smart phone and correlation method
CN109815806A (en) * 2018-12-19 2019-05-28 平安科技(深圳)有限公司 Face identification method and device, computer equipment, computer storage medium
CN110348466A (en) * 2018-04-08 2019-10-18 北京京东尚科信息技术有限公司 The method and apparatus of identification

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070083375A1 (en) * 2005-09-02 2007-04-12 Delta Electronics, Inc. Method and system for template inquiry dialogue system
CN102023703A (en) * 2009-09-22 2011-04-20 现代自动车株式会社 Combined lip reading and voice recognition multimodal interface system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070083375A1 (en) * 2005-09-02 2007-04-12 Delta Electronics, Inc. Method and system for template inquiry dialogue system
CN102023703A (en) * 2009-09-22 2011-04-20 现代自动车株式会社 Combined lip reading and voice recognition multimodal interface system

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104348621A (en) * 2013-08-02 2015-02-11 成都林海电子有限责任公司 Authentication system based on voiceprint recognition and method thereof
CN103841108A (en) * 2014-03-12 2014-06-04 北京天诚盛业科技有限公司 Authentication method and system of biological characteristics of user
CN103841108B (en) * 2014-03-12 2018-04-27 北京天诚盛业科技有限公司 The authentication method and system of user biological feature
CN104217212A (en) * 2014-08-12 2014-12-17 优化科技(苏州)有限公司 Real person identity verification method
CN104157015A (en) * 2014-08-20 2014-11-19 优化科技(苏州)有限公司 Self-service card dispenser control system
CN106911630A (en) * 2015-12-22 2017-06-30 上海仪电数字技术股份有限公司 Terminal and the authentication method and system of identity identifying method, terminal and authentication center
CN108573131B (en) * 2017-03-09 2020-12-08 腾讯科技(深圳)有限公司 Method and device for controlling verification in terminal equipment
CN108573131A (en) * 2017-03-09 2018-09-25 腾讯科技(深圳)有限公司 The method and apparatus verified in control terminal equipment
WO2019174131A1 (en) * 2018-03-12 2019-09-19 平安科技(深圳)有限公司 Identity authentication method, server, and computer readable storage medium
CN108427874A (en) * 2018-03-12 2018-08-21 平安科技(深圳)有限公司 Identity identifying method, server and computer readable storage medium
CN110348466A (en) * 2018-04-08 2019-10-18 北京京东尚科信息技术有限公司 The method and apparatus of identification
CN108830153A (en) * 2018-05-07 2018-11-16 平安普惠企业管理有限公司 For the auth method of recognition of face, device, equipment and storage medium
CN109377995A (en) * 2018-11-20 2019-02-22 珠海格力电器股份有限公司 A kind of method and apparatus controlling equipment
CN109815806A (en) * 2018-12-19 2019-05-28 平安科技(深圳)有限公司 Face identification method and device, computer equipment, computer storage medium
CN109547641A (en) * 2018-12-21 2019-03-29 汝保共 Mode controllable type smart phone and correlation method
CN109547641B (en) * 2018-12-21 2021-06-18 深圳市九州华科通讯有限公司 Mode-controllable smart phone and corresponding method

Also Published As

Publication number Publication date
CN103177238B (en) 2019-01-15

Similar Documents

Publication Publication Date Title
CN103177238A (en) Terminal and user identifying method
KR101997371B1 (en) Identity authentication method and apparatus, terminal and server
CN109326058B (en) Identity verification method and device based on intelligent teller machine, terminal and readable medium
KR101971697B1 (en) Method and apparatus for authenticating user using hybrid biometrics information in a user device
CN101441869A (en) Method and terminal for speech recognition of terminal user identification
US20070038460A1 (en) Method and system to improve speaker verification accuracy by detecting repeat imposters
CN104899490A (en) Terminal positioning method and user terminal
WO2016015687A1 (en) Voiceprint verification method and device
US7949535B2 (en) User authentication system, fraudulent user determination method and computer program product
CN103577737A (en) Mobile terminal and automatic authority adjusting method thereof
JP2002229955A (en) Information terminal device and authentication system
CN106529379A (en) Method and device for recognizing living body
CN102110195A (en) Computer system and identification method and device for user
CN109034029A (en) Detect face identification method, readable storage medium storing program for executing and the electronic equipment of living body
KR20230128464A (en) Method and device for user recognition
EP1461781B1 (en) User identification method and device
CN100538717C (en) Authenticate device, authentication method
CN111611437A (en) Method and device for preventing face voiceprint verification and replacement attack
CN106469269B (en) A kind of method, apparatus and terminal of Password Management
US20120121140A1 (en) Leveraging Real-Time Biometric Recognition Software in Software Systems Management
WO2021244471A1 (en) Real-name authentication method and device
JP2006260461A (en) Access control system and information processing system using the same
CN108540357B (en) Voice control method and device and sound equipment
CN107294981B (en) Authentication method and equipment
CN109302659A (en) Disconnect intelligent sound box safety encryption, device and the intelligent sound box of circuit certification

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant