CN105205367B - Information processing method and electronic equipment - Google Patents

Information processing method and electronic equipment Download PDF

Info

Publication number
CN105205367B
CN105205367B CN201410302781.XA CN201410302781A CN105205367B CN 105205367 B CN105205367 B CN 105205367B CN 201410302781 A CN201410302781 A CN 201410302781A CN 105205367 B CN105205367 B CN 105205367B
Authority
CN
China
Prior art keywords
identification information
confidence level
verification
threshold
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410302781.XA
Other languages
Chinese (zh)
Other versions
CN105205367A (en
Inventor
赵方
赵一方
戴海生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201410302781.XA priority Critical patent/CN105205367B/en
Publication of CN105205367A publication Critical patent/CN105205367A/en
Application granted granted Critical
Publication of CN105205367B publication Critical patent/CN105205367B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides a kind of information processing method and electronic equipments.Information processing method is applied to electronic equipment, including:Start to acquire identification information input by user;With acquisition identification information concurrently, verification processing is performed using collected identification information as object identification information, the verification processing includes:Obtain the confidence level of the object identification information;When the confidence level is more than first threshold, stop acquisition identification information, and pass through verification;When the confidence level is less than second threshold, stop acquisition identification information, not by verification;When the confidence level is less than first threshold and is more than second threshold, continue to acquire identification information, and the verification processing will be continued to execute as object identification information from acquisition start time collected all identification informations.Information processing method according to the present invention can be done dynamically accurate and efficient Information Authentication.

Description

Information processing method and electronic equipment
Technical field
The present invention relates to a kind of information processing method and electronic equipment more particularly to can be done dynamically it is accurate and The information processing method and electronic equipment of efficient Information Authentication.
Background technology
Nowadays, with the development of information technology, people are increasing to the dependence of electronic equipment, usually by account, a People's information etc. is related to property or the important information of individual privacy stores in the electronic device.In order to ensure the safety of information, Authentication can be carried out when handling this category information.In addition, Internet resources are abused on website by robot in order to prevent, often adopt User is caused to input certain code on an electronic device with the form of identifying code, so as to complete Information Authentication.
Now there are many verification method of mainstream, such as there are input password, speech recognition, recognition of face etc..If pass through Input password is verified, is usually compared password input by user with the password stored in database, only complete Pass through verification when complete consistent.But in the verification methods such as speech recognition, recognition of face, by the voice messaging of input or Sample in the identification information and database of human face image information is compared, but it is difficult to ensure that identification information input by user It is completely the same with sample.Even this is because same person, it is also difficult to send out identical sound or make complete phase Same expression.Therefore, for this kind of identification information, the similarity degree generally between identification information and sample is assessed, It calculates confidence level, and whether is more than defined threshold to determine whether passing through verification according to the confidence level.
However, by taking speech recognition as an example, after the voice inputted in prompting user according to the certain length content of display, electronics When the confidence level that equipment is calculated according to the voice messaging inputted compared between sample information is near defined threshold, It there may be following two undesirable situations:The first situation is that the people of input voice information is the people for meeting verification condition In the case of, when difference between the voice and sample of input larger (such as because throat problem when), will not reach regulation threshold Value, i.e., in the ideal situation should be by the people of verification not over verification;The second situation be the people of input voice information not In the case of being the people for meeting verification condition because this change people of the sound of people to meeting verification condition sound it is similar and will Threshold value is reached, i.e., in perfect condition to verification should not have been passed through by the people of verification.
In the first scenario, which can again be verified, but this needs user by re-entering voice Proving program is restarted, the voice of certain length is inputted again, big inconvenience is caused to user.In the second situation Under, allow this that should not pass through verification by the people of verification, cause the security risk of information, harmfulness is larger.
Invention content
The present invention is in view of the completion of Yi Shang subject, it is intended that provide a kind of information processing method and electronic equipment, Verification processing is concurrently carried out, and be difficult to clearly judge whether according to the identification information acquired while acquiring identification information It should be by a certain range of verification, i.e., in the confidence level of the identification information of input between first threshold and second threshold When, the information for continuing acquisition is verified as object identification information, so as to be done dynamically high efficiency and accurately test Card.
Information processing method according to an embodiment of the invention, applied to electronic equipment, the electronic equipment includes identification Information acquisition module, which is characterized in that the method includes:Start to acquire identification information input by user;With acquisition identification letter Breath concurrently, using collected identification information as object identification information performs verification processing, and the verification processing includes: Obtain the confidence level of the object identification information;When the confidence level is more than first threshold, stop acquisition identification information, and lead to Cross verification;When the confidence level is less than second threshold, stop acquisition identification information, not by verification;When the confidence level During less than first threshold and more than second threshold, continue to acquire identification information, and will be from acquisition start time collected institute There is identification information to continue to execute the verification processing as object identification information.
Electronic equipment according to an embodiment of the invention, which is characterized in that including:Identification information acquisition module, configuration come Acquire identification information input by user;Verification processing module, configuration come with the acquisition concurrently, by collected identification Information performs verification processing as object identification information, and the verification processing includes:Obtain the confidence of the object identification information Degree;When the confidence level is more than first threshold, stop acquisition identification information, and pass through verification;When the confidence level is less than the During two threshold values, stop acquisition identification information, not by verification;When the confidence level is less than first threshold and more than the second threshold During value, continue to acquire identification information, and will be from acquisition start time collected all identification informations as object identification information Continue to execute the verification processing.
Information processing method and electronic equipment according to the present invention are concurrently tested while identification information is acquired Card processing, and be difficult to clearly decide whether in a certain range by verification according to the identification information acquired, that is, exist When the confidence level of the identification information of input is between first threshold and second threshold, can immediately will continue acquisition information as Object identification information is verified, so as to be done dynamically high efficiency and accurately verify.
Description of the drawings
Fig. 1 is the flow chart for illustrating information processing method according to an embodiment of the invention.
Fig. 2 is the sequential for illustrating the relationship between acquisition process according to an embodiment of the invention and verification processing Figure.
Fig. 3 is the schematic diagram for illustrating the object identification information in verification processing according to an embodiment of the invention.
Fig. 4 is the flow chart for illustrating information processing method according to a preferred embodiment of the invention.
Fig. 5 is the functional block diagram for illustrating electronic equipment according to an embodiment of the invention.
Specific embodiment
To enable those skilled in the art to more fully understand technical scheme of the present invention, below in conjunction with the accompanying drawings specifically The information processing method of the bright present invention and the specific embodiment of electronic equipment.
【Information processing method】
The information processing method of the present invention is applied to electronic equipment, and electronic equipment for example can be tablet computer, notebook Any electronic equipment with data processing function such as computer, desktop computer, PDA, e-book, smart mobile phone.Certainly, this hair It is bright without being limited thereto, in the every other implementation that those of ordinary skill in the art are obtained without creative efforts Example, shall fall within the protection scope of the present invention.
In the following, carry out the information processing method that the present invention will be described in detail with reference to attached drawing.Fig. 1 is according to an embodiment of the invention The flow chart of information approach.As shown in Figure 1, this method includes the following steps:
It is first begin to acquire identification information (step S101) input by user.Identification information is preferably but not limited to voice messaging Either image information etc. has certain uncertain so as to need to be verified judging similarity degree according to sample Information.Voice messaging is for example acquired by the microphone of electronic equipment, can be the preset fixed sentence of user, Can also be a series of character strings shown on the display of electronic equipment that user reads according to prompting.When voice messaging is It is all shown on an electronic device during the latter, when can verify every time and shows identical character string, when can also be verified every time Dynamically generate different character strings.Image information is, for example, human face image information, for example, by the camera of electronic equipment into Row acquisition.
Next, with acquisition identification information concurrently, collected identification information is held as object identification information Row verification processing.Specifically, will collected identification information have been made from acquisition is started until performing the verification processing Verification processing is performed for object identification information.Verification processing includes the following steps:
First, the confidence level (step S102) of object identification information is obtained.So-called confidence level can believe Object identifying It is compared between the sample of the identification information of breath and the pre-stored user, is calculated according to its similarity degree.Specifically Ground, such as when identification information is voice data, confidence level is according to the sound ripple of the voice data and the pre-stored user Sound ripple sample between be compared and obtain.The similarity of two sound ripples is higher, and confidence level is higher, otherwise also So.The sample of the identification information of user can be stored in that in the remote server of electronic equipment independence, can also be stored in In electronic equipment.When being stored in server of sample of the identification information of user, electronic equipment is sent pair to server As identification information.The sample of server end identification information of the pre-stored user by object identification information and in the server Originally it is compared and calculates confidence level and feed back to electronic equipment.Electronic equipment receives the object identification information from server Confidence level.When the sample of the identification information of user is stored in electronic equipment, electronic equipment by object identification information and The sample of the identification information of the pre-stored user is compared and obtains putting for the object identification information in the electronic equipment Reliability.
Then, judge whether the confidence level is more than first threshold (step S103).It is defeated that first threshold is preferably arranged to object The sample for entering information and the identification information of pre-stored regulation user is closely similar, and the input object is can be assured that so as to reach The artificial value for meeting confidence level corresponding during the people of verification condition of identification information.In this way, when the confidence of object identification information When degree is more than first threshold (step S103, yes), illustrate can be assured that inputting the artificial of the object identification information meets verification item The people of part, thus can stop acquire identification information and by verify (step S105).When object identification information confidence level not During more than first threshold (step S103, no), then continue to judge whether confidence level is less than second threshold (step S104).Second threshold Value is preferably arranged to object input information and differs larger with the sample of the identification information of pre-stored regulation user, can be assured that Input the artificial value of the corresponding confidence level of the similarity degree of people for not meeting verification condition of the object identification information.In this way, work as When the confidence level of object identification information is less than second threshold (step S104, yes), illustrate can be assured that inputting the Object identifying believes The people of breath is not the people for meeting verification condition, therefore can stop acquiring identification information without by verifying (step S106).When When the confidence level of object identification information is not less than second threshold (step S104, no), illustrate confidence level in second threshold and first Between threshold value, it is impossible to which whether the people for firmly believing input object identification information meets the people of verification condition, therefore continues acquisition identification Information, and using until start time to the moment is acquired collected identification information continue as new object identification information Perform the verification processing.That is, it obtains confidence level again according to new object identification information and is judged, but second Include the object identification information that performs verification processing for the first time in the secondary object identification information for carrying out verification processing and the It is primary to perform the identification information acquired during verification processing.It will be appreciated by those skilled in the art that step S103 and step The sequence of S104 can be interchanged.Specifically, can first judge whether the confidence level of object identification information is less than the second threshold Be worth (step S104), and when object identification information confidence level be less than second threshold when (step S104, yes), stop acquisition know Other information is without by verifying (step S106).When the confidence level of object identification information is not less than second threshold (step S104, It is no), judge whether the confidence level is more than first threshold (step S103).When the confidence level of object identification information is more than first threshold When (step S103, yes), stop acquisition identification information and pass through verify (step S105).When object identification information confidence level not During more than first threshold (step S103, no), continue to acquire identification information, and will adopt until start time to the moment is acquired The identification information collected continues to execute the verification processing as new object identification information.Here, acquisition process is from starting to adopt Collect identification information (step S101) input by user to rise, (dotted box portion of Fig. 1) one is straight during entire verification processing The acquisition of row identification information, therefore may not need when confidence level is between second threshold and first threshold and user is waited for input knowledge Other information and be immediately performed secondary judgement, so as to ensure that the high efficiency of verification.
In order to more clearly describe the relationship between acquisition process and verification processing, underneath with Fig. 2 and Fig. 3 into advance one The illustration of step.Fig. 2 is for illustrating acquisition process P according to an embodiment of the invention1With verification processing P2Between relationship Sequence diagram.Fig. 3 is the schematic diagram for illustrating the object identification information in verification processing according to an embodiment of the invention.
As illustrated in fig. 2, it is assumed that in t0Moment starts to perform acquisition process P1(i.e. step S101), and in t1Moment will The acquired identification information arrived is as object identification information I1Perform verification processing P2.As shown in figure 3, at this time from acquisition process P1 Hand over to verification processing P2Object identification information I1It is acquisition process P1In t0To t1Between the identification information that acquires.As above It is described, as verification processing P2When middle judgement confidence level is between second threshold and first threshold (step S104, no), then continue Acquire identification information, and using until start time to the moment acquire collected identification information as new Object identifying letter It ceases and continues to execute the verification processing.Assuming that the time at this time is t2, then for the Object identifying letter of second of confidence level judgement Cease I2It is from t0To t2Between the identification information that acquires, as shown in Figure 3.Therefore, in verification processing P2Judge confidence level in the second threshold When between value and first threshold (step S104, no), object identification information I can be immediately obtained2And verification is performed again Processing, so as to fulfill efficient verification.It should be noted that above-described embodiment is only exemplary rather than restricted, Verification processing can be carried out using the identification information that the other times section in addition to the above-mentioned period acquires as object identification information.
Next verification processing P2In, object identification information I is obtained again2Confidence level and for the confidence level into Row is same to judge (i.e. step S103, S104).However, for object identification information I2Confidence level still second threshold with When between first threshold, acquisition identification information is also will continue to, and will the collected knowledge until start time to the moment is acquired Other information is as new object identification information I3(not shown) and continue to execute the verification processing.However, verification processing is multiple Repetition not only reduces the efficiency of verification, and great inconvenience is brought to user.Therefore, regardless of the result judged, Ke Yi Stop acquisition process as defined in satisfaction during condition without passing through verification.
In the following, illustrate a preferred embodiment of the information processing method of the present invention with reference to Fig. 4.Fig. 4 is for illustrating root According to the flow chart of the information processing method of a preferred embodiment of the present invention.In order to avoid repeated explanation, adopt in the following description Emphasis description is carried out with from Fig. 1 same labels and places only pair different with the embodiment of Fig. 1.
In the present embodiment, a counter is set and will be counted when starting to acquire identification information (the step S101) of user Number device, which resets, is set as 1.When judging confidence level between second threshold and first threshold in verification processing (step S104, It is no), judge whether the value of counter reaches third threshold value.When the value of counter reaches third threshold value, stop acquisition identification letter Breath is without passing through verification.Third threshold value is for example set as 3, that is, when having been carried out verification processing three times, stop identification information and Verification is not passed through.When the value of counter does not reach third threshold value, the numerical value of counter is added 1, continues to acquire identification information, And using until start time to the moment is acquired collected identification information continued to execute as new object identification information The verification processing.By above example, when the number reaches third threshold value, stop acquisition process and verification processing, so as to The number for repeating verification processing can be limited, user is avoided to need continuously to input identification information in for a long time, is carried The high convenience of user.
It is described above and avoids the repeated technical solution of verification processing by judging the number of verification processing.But Embodiments of the present invention are not limited thereto, for example, can also identification information input by user length or between more than the 4th threshold During value, stop acquisition identification information not by verification.In addition to this it is possible to stop key is set on an electronic device, and When user presses the stop key and forces to stop input identification information, stop acquisition identification information, not by verification.
Information processing method according to the present invention concurrently carries out verification processing while identification information is acquired, and Identification information according to being acquired is difficult to clearly decide whether in a certain range by verification, i.e., believes in the identification of input When the confidence level of breath is between first threshold and second threshold, it will can continue the information of acquisition immediately as object identification information It is verified, so as to be done dynamically high efficiency and accurately verify.
Multiple embodiments of the information processing method of the present invention are explained above.Obviously, those skilled in the art are not taking off From above-described embodiment can be made in the spirit and scope of the present invention it is various combination, modification or deformation.The common skill in this field Art personnel all other embodiments obtained without creative efforts belong to the model that the present invention protects It encloses.
【Electronic equipment】
In the following, carry out the electronic equipment that the present invention will be described in detail with reference to attached drawing.The electronic equipment of the present invention for example can be flat Any electronics with data processing function such as plate computer, laptop, desktop computer, PDA, e-book, smart mobile phone Equipment.Certainly, the present invention is not limited thereto, is obtained without creative efforts in those of ordinary skill in the art Every other embodiment, shall fall within the protection scope of the present invention.
Fig. 5 is the functional block diagram for illustrating electronic equipment according to an embodiment of the invention.As shown in figure 5, electronics is set Standby 500 include identification information acquisition module 501 and verification processing module 502.In the following, information acquisition module 501 is described in detail And the action of verification processing module 502.
First, identification information acquisition module 501 starts to acquire identification information input by user.Identification information is preferred but unlimited In voice messaging either image information etc. have it is certain it is uncertain so as to need according to sample judging similarity degree and The information verified.Voice messaging is for example acquired by the microphone of electronic equipment 500, can be that user presets Fixed sentence or user according to prompting read a series of words shown on the display of electronic equipment 500 Symbol string.It is all shown on electronic equipment 500 when voice messaging is the latter, when can verify every time and shows identical character string, Different character strings is dynamically generated when can also be verified every time.Image information is, for example, human face image information, such as logical The camera for crossing electronic equipment 500 is acquired.
Next, acquiring identification information concurrently with identification information acquisition module 501, verification processing module 502 will Collected identification information performs verification processing as object identification information.Specifically, it will be somebody's turn to do from acquisition is started until performing Collected identification information performs verification processing as object identification information until verification processing.Verification processing module 502 Perform following steps:
First, the confidence level of object identification information is obtained.So-called confidence level can be with depositing in advance by object identification information It is compared between the sample of the identification information of the user of storage, is calculated according to its similarity degree.Specifically, it such as identifies When information is voice data, confidence level is according to the sound ripple of the voice data and the sound ripple of the pre-stored user It is compared and obtains between sample.The similarity of two sound ripples is higher, and confidence level is higher, and vice versa.The knowledge of user The sample of other information can be stored in the remote server independent with electronic equipment 500, can also be stored in electronic equipment In 500.When being stored in server of sample of the identification information of user, electronic equipment 500 further include sending module and Receiving module (not shown).Sending module is to server sending object identification information.Server end by object identification information and The sample of the identification information of the pre-stored user is compared and calculates confidence level and feed back to electronics in the server Equipment 500.Receiving module receives the confidence level of the object identification information from server.When the sample storage of the identification information of user When in electronic equipment 500, electronic equipment 500 includes sample memory module (not shown), for storing the identification information of user Sample.By object identification information and in sample memory module, the sample of the identification information of the pre-stored user carries out Compare and obtain the confidence level of the object identification information.
Then, verification processing module 502 judges whether the confidence level is more than first threshold.First threshold is preferably arranged to pair As input information with it is pre-stored regulation user identification information sample it is closely similar, so as to reach can be assured that input this The artificial value for meeting confidence level corresponding during the people of verification condition of object identification information.In this way, when object identification information When confidence level is more than first threshold, illustrate to can be assured that the artificial people for meeting verification condition for inputting the object identification information, because This can stop acquiring identification information and passing through verification.When object identification information confidence level be not more than first threshold when, then after It is continuous to judge whether confidence level is less than second threshold.Second threshold is preferably arranged to object input information and is used with pre-stored regulation The sample difference of the identification information at family is larger, can be assured that the artificial people for not meeting verification condition for inputting the object identification information The corresponding confidence level of similarity degree value.In this way, when the confidence level of object identification information is less than second threshold, explanation can Firmly believe input the object identification information people be not the people for meeting verification condition, therefore can stop acquire identification information and it is obstructed Cross verification.When the confidence level of object identification information is not less than second threshold, illustrate confidence level in second threshold and first threshold Between, it is impossible to whether the people for firmly believing input object identification information meets the people of verification condition, therefore continues to acquire identification information, And using until start time to the moment is acquired collected identification information continued to execute as new object identification information The verification processing.That is, it obtains confidence level again according to new object identification information and carries out above-mentioned judgement, but second Include the object identification information that performs verification processing for the first time in the secondary object identification information for carrying out verification processing and the It is primary to perform the identification information acquired during verification processing.It will be appreciated by those skilled in the art that judge first threshold Step can be interchanged with sequence the step of judging second threshold.Specifically, it can first judge object identification information Whether confidence level is less than second threshold, and when the confidence level of object identification information is less than second threshold, stops acquisition identification Information is without passing through verification.When the confidence level of object identification information is not less than second threshold, judge whether the confidence level is more than First threshold.When the confidence level of object identification information is more than first threshold, stops acquisition identification information and pass through verification.When right When being not more than first threshold as the confidence level of identification information, continue to acquire identification information, and will be from when acquiring start time to this Collected identification information continues to execute the verification processing as new object identification information until quarter.Here, acquisition process From starting to acquire identification information input by user, the acquisition of information is identified always during entire verification processing, because This may not need when confidence level is between second threshold and first threshold waits for user to input identification information and is immediately performed the Secondary judgement, so as to ensure that the high efficiency of verification.
In order to more clearly describe the relationship acted between identification information acquisition module 501 and verification processing module 502, under Face is further illustrated using Fig. 2 and Fig. 3.Fig. 2 is for illustrating acquisition process according to an embodiment of the invention P1With verification processing P2Between relationship sequence diagram.Fig. 3 is for illustrating in verification processing according to an embodiment of the invention The schematic diagram of object identification information.
As illustrated in fig. 2, it is assumed that in t0Moment identification information acquisition module 501 starts to perform acquisition process P1, and in t1When Verification processing module 502 is carved using collected identification information as object identification information I1Perform verification processing P2.Such as Fig. 3 It is shown, the object identification information I of verification processing module 502 is handed over to from identification information acquisition module 501 at this time1It is identification information Acquisition module 501 is in t0To t1Between the identification information that acquires.As mentioned above, as verification processing P2Middle judgement confidence level exists When between second threshold and first threshold, then continue to acquire identification information, and will adopt until start time to the moment is acquired The identification information collected continues to execute the verification processing as new object identification information.Assuming that the time at this time is t2, then The object identification information I judged for second of confidence level2It is identification information acquisition module 501 in t0To t2Between the knowledge that acquires Other information, as shown in Figure 3.Therefore, in verification processing P2When judging confidence level between second threshold and first threshold, Ke Yili Obtain object identification information I2And verification processing is performed again, so as to fulfill efficient verification.It should be noted that above-mentioned reality It applies example to be only exemplary rather than restricted, the other times section in addition to the above-mentioned period can also be acquired Identification information carries out verification processing as object identification information.
Next verification processing P2In, object identification information I is obtained again2Confidence level and for the confidence level into Row is same to be judged.However, object identification information I2Confidence level still between second threshold and first threshold when, can also be after Continuous acquisition identification information, and using until start time to the moment is acquired collected identification information as new Object identifying Information I3(not shown) and continue to execute the verification processing.However, the multiplicating of verification processing not only reduces the effect of verification Rate brings user great inconvenience.Therefore, regardless of the result judged, can stop adopting in condition as defined in satisfaction Collection processing is without passing through verification.
In the following, illustrate a preferred embodiment of the electronic equipment 500 of the present invention.In order to avoid repeated explanation, following Emphasis description only is carried out to place different from the embodiment described above in explanation.
In the present embodiment, electronic equipment 500 further includes a counter (not shown) and in the knowledge for starting acquisition user Counter resets are set as 1 during other information.When judging confidence level between second threshold and first threshold in verification processing When, judge whether the value of counter reaches third threshold value.When the value of counter reaches third threshold value, stop acquisition identification information Without passing through verification.Third threshold value is for example set as 3, that is, when having been carried out verification processing three times, stop identification information without Pass through verification.When the value of counter does not reach third threshold value, the numerical value of counter is added 1, continues to acquire identification information, and Using until start time to the moment is acquired collected identification information continue to execute this as new object identification information Verification processing.By above example, when the number reaches third threshold value, stop acquisition process and verification processing, so as to Enough limitations repeat the number of verification processing, and user is avoided to need continuously to input identification information in for a long time, is improved The convenience of user.
It is described above and avoids the repeated technical solution of verification processing by judging the number of verification processing.But Embodiments of the present invention are not limited thereto, for example, can also identification information input by user length or between more than the 4th threshold During value, stop acquisition identification information not by verification.In addition to this it is possible to stop key is set on electronic equipment 500, and And when user presses the stop key and forces to stop input identification information, stop acquisition identification information, not by verification.
Electronic equipment according to the present invention, identification information acquisition module act simultaneously with verification processing module, and according to The identification information acquired is difficult to clearly decide whether in a certain range by verification, i.e., in the identification information of input When confidence level is between first threshold and second threshold, the information for continuing acquisition can be carried out as object identification information immediately Verification, so as to be done dynamically high efficiency and accurately verify.
Through the above description of the embodiments, those skilled in the art can be understood that the present invention can be by Software adds the mode of required hardware platform to realize, naturally it is also possible to all be implemented by hardware.Based on such understanding, Technical scheme of the present invention can be embodied in the form of software product in whole or in part to what background technology contributed, The computer software product can be stored in storage medium, such as ROM/RAM, magnetic disc, CD, including some instructions making Computer equipment (can be personal computer, server or the network equipment etc.) performs each embodiment of the present invention Or the method described in certain parts of embodiment.
Multiple embodiments of the electronic equipment of the present invention are explained above.Obviously, those skilled in the art are not departing from this Various combinations, modification or deformation can be made in the spirit and scope of invention to above-described embodiment.Ordinary skill people Member's all other embodiments obtained without creative efforts, shall fall within the protection scope of the present invention.

Claims (10)

1. a kind of information processing method, applied to electronic equipment, the electronic equipment includes identification information acquisition module, feature It is, the method includes:
Start to acquire identification information input by user;
With acquisition identification information concurrently, verification processing is performed using collected identification information as object identification information, The verification processing includes:
Obtain the confidence level of the object identification information;
When the confidence level is more than first threshold, stop acquisition identification information, and pass through verification;
When the confidence level is less than second threshold, stop acquisition identification information, not by verification;
When the confidence level is less than first threshold and is more than second threshold, continue to acquire identification information, and will open from acquisition The moment collected all identification informations that begin continue to execute the verification processing as object identification information.
2. information processing method as described in claim 1, wherein,
When the confidence level is less than first threshold and more than second threshold, and the number for performing the verification processing reaches third During threshold value, verification is not passed through.
3. information processing method as described in claim 1, wherein,
When the length of identification information input by user or time being more than four threshold values, stop acquisition identification information, and obstructed Cross verification.
4. information processing method as described in claim 1, wherein,
When user forces to stop input identification information, stop acquisition identification information, not by verification.
5. information processing method as described in claim 1, wherein,
The confidence level for obtaining the object identification information includes:
The object identification information is sent to server;
The confidence level of the object identification information is received from the server, the confidence level is by the server according to The object identification information and sample of the identification information of the pre-stored user is compared and obtains in the server .
6. information processing method as described in claim 1, wherein,
The confidence level for obtaining the object identification information includes:
The sample of the identification information of the pre-stored user according to the object identification information and in the electronic equipment Originally it is compared and obtains the confidence level.
7. information processing method as described in claim 1, the identification information includes voice messaging and/or image information, In,
When the identification information is voice data,
The confidence level according to the sound waves grain pattern sheet of the sound ripple of the voice data and the pre-stored user it Between be compared and obtain.
8. a kind of electronic equipment, which is characterized in that including:
Identification information acquisition module is configured to acquire identification information input by user;
Verification processing module, configuration come with the acquisition concurrently, using collected identification information as Object identifying to believe Breath performs verification processing, and the verification processing includes:Obtain the confidence level of the object identification information;When the confidence level is more than During first threshold, stop acquisition identification information, and pass through verification;When the confidence level is less than second threshold, stops acquisition and know Other information, not by verification;When the confidence level is less than first threshold and is more than second threshold, continue acquisition identification letter Breath, and will be continued to execute at the verification as object identification information from acquisition start time collected all identification informations Reason.
9. electronic equipment as claimed in claim 8, wherein
The verification processing module further includes:
Sending module, configuration to send the object identification information to server;
Receiving module, configuration to receive the confidence level of the object identification information from the server, and the confidence level passes through institute State the identification information of server pre-stored user according to the object identification information and in the server into Row relatively obtains.
10. electronic equipment as claimed in claim 8, wherein,
The verification processing module further includes:
The sample of the identification information to store user is configured in sample memory module;
The acquisition module is according to the object identification information and the pre-stored use in the sample memory module The sample of the identification information at family is compared and obtains the confidence level.
CN201410302781.XA 2014-06-27 2014-06-27 Information processing method and electronic equipment Active CN105205367B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410302781.XA CN105205367B (en) 2014-06-27 2014-06-27 Information processing method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410302781.XA CN105205367B (en) 2014-06-27 2014-06-27 Information processing method and electronic equipment

Publications (2)

Publication Number Publication Date
CN105205367A CN105205367A (en) 2015-12-30
CN105205367B true CN105205367B (en) 2018-07-06

Family

ID=54953043

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410302781.XA Active CN105205367B (en) 2014-06-27 2014-06-27 Information processing method and electronic equipment

Country Status (1)

Country Link
CN (1) CN105205367B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107704839B (en) * 2016-05-27 2021-04-23 Oppo广东移动通信有限公司 Fingerprint unlocking method and device, user terminal and medium product
CN106803058A (en) * 2016-11-30 2017-06-06 努比亚技术有限公司 A kind of terminal and fingerprint identification method
AU2017435697B2 (en) * 2017-10-11 2021-04-29 Mitsubishi Electric Corporation Air conditioning controller
CN108009295A (en) * 2017-12-26 2018-05-08 北京中关村科金技术有限公司 A kind of control method of data acquisition session, device and equipment
CN110348466A (en) * 2018-04-08 2019-10-18 北京京东尚科信息技术有限公司 The method and apparatus of identification
CN110443098A (en) * 2018-05-04 2019-11-12 北京京东尚科信息技术有限公司 Authentication system, method, apparatus and computer readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2151786A2 (en) * 2008-08-06 2010-02-10 Fujitsu Limited Identification method control device and identification method control method
CN101877616A (en) * 2009-04-29 2010-11-03 华为技术有限公司 Method and device for compensating polarization mode dispersion in optical communication
CN102270866A (en) * 2010-06-07 2011-12-07 李尔公司 Vehicle power management system
CN102521610A (en) * 2011-12-08 2012-06-27 北京新媒传信科技有限公司 Image filtering method and device
CN103472744A (en) * 2013-09-23 2013-12-25 天地融科技股份有限公司 Dynamic token working state control method and device and dynamic token
CN103841108A (en) * 2014-03-12 2014-06-04 北京天诚盛业科技有限公司 Authentication method and system of biological characteristics of user

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012018432A (en) * 2010-07-06 2012-01-26 Hitachi Omron Terminal Solutions Corp Biological authentication device and biological authentication method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2151786A2 (en) * 2008-08-06 2010-02-10 Fujitsu Limited Identification method control device and identification method control method
CN101877616A (en) * 2009-04-29 2010-11-03 华为技术有限公司 Method and device for compensating polarization mode dispersion in optical communication
CN102270866A (en) * 2010-06-07 2011-12-07 李尔公司 Vehicle power management system
CN102521610A (en) * 2011-12-08 2012-06-27 北京新媒传信科技有限公司 Image filtering method and device
CN103472744A (en) * 2013-09-23 2013-12-25 天地融科技股份有限公司 Dynamic token working state control method and device and dynamic token
CN103841108A (en) * 2014-03-12 2014-06-04 北京天诚盛业科技有限公司 Authentication method and system of biological characteristics of user

Also Published As

Publication number Publication date
CN105205367A (en) 2015-12-30

Similar Documents

Publication Publication Date Title
CN105205367B (en) Information processing method and electronic equipment
EP3451328B1 (en) Method and apparatus for verifying information
EP3256976B1 (en) Toggling biometric authentication
WO2020024398A1 (en) Biometrics-assisted payment method and apparatus, and computer device and storage medium
CN105100108B (en) A kind of login authentication method based on recognition of face, apparatus and system
CN107977776A (en) Information processing method, device, server and computer-readable recording medium
CN103366745B (en) Based on method and the terminal device thereof of speech recognition protection terminal device
CN108805071A (en) Identity verification method and device, electronic equipment, storage medium
US9596087B2 (en) Token authentication for touch sensitive display devices
CN110991249A (en) Face detection method, face detection device, electronic equipment and medium
CN110287318B (en) Service operation detection method and device, storage medium and electronic device
CN108280642A (en) Debit card Activiation method, equipment, system and computer readable storage medium
CN109389028A (en) Face identification method, device, equipment and storage medium based on motion analysis
US20210064854A1 (en) Object verification method, device and system
CN106357411A (en) Identity verification method and device
CN114331315A (en) Social security service processing method and device combining RPA and AI
CN106782567A (en) The method and apparatus for setting up sound-groove model
CN108961523A (en) Hospital register method, device and medical terminal
CN111882425A (en) Service data processing method and device and server
CN106056377A (en) Data processing method and smartwatch
CN107615299A (en) For assessing the method and system of fingerprint template
EP4163854A1 (en) Systems and methods for conducting remote user authentication
CN111008925A (en) Certificate watermark verification method, device, equipment and storage medium
US10891355B2 (en) Pharmacy authentication methods and systems
US10454914B2 (en) System and method for verifying user supplied items asserted about the user for searching

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant