CN108429619A - Identity identifying method and system - Google Patents

Identity identifying method and system Download PDF

Info

Publication number
CN108429619A
CN108429619A CN201810049723.9A CN201810049723A CN108429619A CN 108429619 A CN108429619 A CN 108429619A CN 201810049723 A CN201810049723 A CN 201810049723A CN 108429619 A CN108429619 A CN 108429619A
Authority
CN
China
Prior art keywords
user
voice signal
matrix
data
default
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810049723.9A
Other languages
Chinese (zh)
Inventor
李健
郑晓明
王富田
张连毅
武卫东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING INFOQUICK SINOVOICE SPEECH TECHNOLOGY CORP
Beijing Sinovoice Technology Co Ltd
Original Assignee
BEIJING INFOQUICK SINOVOICE SPEECH TECHNOLOGY CORP
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING INFOQUICK SINOVOICE SPEECH TECHNOLOGY CORP filed Critical BEIJING INFOQUICK SINOVOICE SPEECH TECHNOLOGY CORP
Priority to CN201810049723.9A priority Critical patent/CN108429619A/en
Publication of CN108429619A publication Critical patent/CN108429619A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention provides a kind of identity identifying method and system, this method includes:Acquire voice signal, fingerprint image data and the face image data of user;Spectrum signature is extracted to voice signal, obtains vocal print feature information;Vocal print feature information, fingerprint image data and face image data are respectively converted into the vocal print matrix, fingerprint image matrix and facial image matrix of default dimension;Above three matrix is spliced to obtain identity matrix data;Identity matrix data is input to default neural network model, obtains the first biological attribute data of user;Calculate the similarity between the first biological attribute data and the second biological attribute data of pre-registered user;Determine the corresponding target user of maximum similarity;If maximum similarity is more than default similarity threshold, returns and indicate verification result of the target user by authentication;If maximum similarity is less than or equal to default similarity threshold, returns and indicate target user not by the verification result of authentication.

Description

Identity identifying method and system
Technical field
The present invention relates to computer safety information technical fields, more particularly to a kind of identity identifying method and authentication System.
Background technology
Currently, the intelligent terminals such as computer and smart mobile phone have become the important aid of people's Working Life.Pass through user Equipment end done shopping, managed money matters, being filed, data storage etc. has been provided to the user and easily serviced very much, but the thing followed It is the safety problem of user data and user's property etc..So user equipment end needs to solve the Verify Your Identity questions of user.
There are prodigious security risks for traditional static password, although dynamic password can further ensure the information peace of user Entirely, but situations such as user equipment is by invasion or loss can not also be solved.With the development of various human body biological characteristics identification technologies, People can identify the biological characteristic of individual identity using vocal print, fingerprint, face etc., construct based on various living things feature recognition skills The identification confirmation system of art.But the development of artificial intelligence technology makes single creature characteristic identity is verified to be no longer able to Meet protection demand of the people to higher confidential information, includes the single capacity certification system of other biological feature identification technique guiding System.For example, bank account, electronic record etc. be related to personal or business property and information security need protected object.
It can be seen that identity verification scheme in the prior art is in the prevalence of the low problem of authentication degree of safety.
Invention content
The present invention provides a kind of identity identifying method and systems, are deposited with solving identity verification scheme in the prior art The low problem of authentication degree of safety.
To solve the above-mentioned problems, according to an aspect of the present invention, the invention discloses a kind of identity identifying method, packets It includes:
If receiving the ID authentication request of user, the voice signal, fingerprint image data and people of the user are acquired Face image data;
Spectrum signature is extracted to the voice signal, obtains vocal print feature information;
The vocal print feature information is converted to the vocal print matrix of default dimension;
The fingerprint image data is converted to the fingerprint image matrix of the default dimension;
The face image data is converted to the facial image matrix of the default dimension;
The vocal print matrix, the fingerprint image matrix and the facial image matrix are spliced into row matrix, obtain institute State the identity matrix data of user;
The identity matrix data of the user is input to default neural network model trained in advance to carry out Living things feature recognition obtains the first biological attribute data of the user;
At least one second biology for calculating first biological attribute data and pre-registered at least one user is special Levy the similarity between data;
Determine the corresponding target user of the maximum similarity;
If maximum similarity is more than default similarity threshold, returns and indicate target user's testing by authentication Demonstrate,prove result;
If the maximum similarity is less than or equal to the default similarity threshold, returns and indicate the target user not Pass through the verification result of authentication.
According to another aspect of the present invention, the invention also discloses a kind of identity authorization systems, including:
Acquisition module acquires voice signal, the fingerprint of the user if the ID authentication request for receiving user Image data and face image data;
Characteristic extracting module obtains vocal print feature information for extracting spectrum signature to the voice signal;
First conversion module, the vocal print matrix for the vocal print feature information to be converted to default dimension;
Second conversion module, the fingerprint image matrix for the fingerprint image data to be converted to the default dimension;
Third conversion module, the facial image matrix for the face image data to be converted to the default dimension;
Concatenation module, for the vocal print matrix, the fingerprint image matrix and the facial image matrix to be carried out square Battle array splicing, obtains the identity matrix data of the user;
Input module, for the identity matrix data of the user to be input to advance trained default nerve Network model carries out living things feature recognition, obtains the first biological attribute data of the user;
Computing module, at least one for calculating first biological attribute data and pre-registered at least one user Similarity between a second biological attribute data;
Determining module, for determining the corresponding target user of the maximum similarity;
First returns to module, if being more than default similarity threshold for maximum similarity, returns and indicates that the target is used The verification result that family passes through authentication;
Second returns to module, if being less than or equal to the default similarity threshold for the maximum similarity, returns Indicate the target user not by the verification result of authentication.
Compared with prior art, the present invention includes following advantages:
The present invention asks vocal print matrix, fingerprint image matrix and the facial image square of the user of authentication by acquisition Battle array, and these three matrixes are spliced into an identity matrix data, to realize the fusion of vocal print, three fingerprint, face features; And the identification of biological characteristic is carried out to the matrix data of fusion using an advance trained default neural network model, To judge the identity of the user using the biological attribute data of the biological attribute data and pre-registered user that recognize Whether by certification, the security intensity of authentication is improved, ensures the safety of information processing.
Description of the drawings
Fig. 1 is the work flow diagram of the identity authorization system of one embodiment of the invention;
Fig. 2 is the flow chart of the identity identifying method of one embodiment of the invention;
Fig. 3 is the structure diagram of the identity authorization system of one embodiment of the invention.
Specific implementation mode
For make the present invention above-mentioned purpose,
Feature and advantage can be more obvious and easy to understand, makees with reference to the accompanying drawings and detailed description to the present invention further Detailed description.
Referring to Fig.1, a kind of work flow diagram of identity authorization system of the embodiment of the present invention is shown.
The identity authorization system includes voiceprint processing module, finger print information processing module, face information processing module With comprehensive organism characteristic identity authentication module.
For the substantially workflow of the identity authorization system:
When user wants using operation system shown in FIG. 1, need to carry out authentication, user can be operable to Send the identity authorization system for using the ID authentication request of operation system to the embodiment of the present invention, then, the embodiment of the present invention Identity authorization system can to the ID authentication request carry out living things feature recognition, to according to registered in advance and preserve one The biological characteristic of a or multiple users and judge whether the user is the user of mistake registered in advance, and identity authentication result is sent To operation system, such operation system can be according to identity authentication result to determine whether the user is made to carry out partial function It uses, ensures the information security of operation system.
With reference to Fig. 2, the embodiment of the present invention additionally provides a kind of identity identifying method, can be applied to the authentication system System, the specific workflow of this method are as follows:
S1, identity authorization system can receive the ID authentication request of such as user A, then, the embodiment of the present invention Identity authorization system will prompt user's typing for verifying identity:Voice data, fingerprint image and facial image, to adopt Collect voice signal, fingerprint image data and the face image data of user A.
In practical applications, the mobile terminal which is applied can have recording Function, camera function and finger print collecting function, to acquire voice signal, fingerprint image data and the face figure of user A respectively As data.
Wherein, it when acquiring voice signal, can be realized in the way of any one by following:
Then mode 1 can obtain random voice letter by any random voice of user's typing from the random voice Number;
Wherein, the corresponding random voice of the random voice signal supports at least one of following three classes character:It is Arabic Number, English alphabet and simplified Hanzi.
The method of mode 2, the embodiment of the present invention can provide text data when prompting user's typing voice signal, use Family is by reading aloud this article notebook data come the voice data of typing oneself, so as to obtain voice signal from the voice data.
Wherein, the voice signal of collected user A can be stored in voiceprint processing module shown in FIG. 1;
And when acquiring fingerprint image data, then it can acquire the user A using the finger print collecting function of mobile terminal Finger print data, and the finger print data is generated as fingerprint image data;
Wherein, the fingerprint image data of collected user A can be stored in finger print information processing module shown in FIG. 1 In;
And when acquiring face image data, then the people of the user A can be acquired using the camera function of mobile terminal Face image carries out image taking, to obtain the face image data of user A;
Wherein, the face image data of collected user A can be stored in face information processing module shown in FIG. 1 In;
Wherein, the present invention for above-mentioned voice signal, fingerprint image data and face image data acquisition order not It limits.
Optionally, in one embodiment, in order to ensure the accuracy to living things feature recognition, to above-mentioned collected Before three classes data carry out characteristic processing, the method for the embodiment of the present invention can execute S2, to above-mentioned voice signal, fingerprint image One or more of data and face image data data carry out pretreatment operation respectively.
Wherein, it when carrying out pretreatment operation to voice signal, may include steps of:
Remove the noise information in the voice signal;
Sample quantization processing is carried out to the voice signal after removal noise information;
Wherein, sample quantization:Voice signal is usually digitized with 8kHz or higher sampling rates, and each sampling is at least used Family 8bit is indicated.
To sample quantization, treated that the voice signal carries out preemphasis processing;
Wherein, sound is converted into audio digital signals after the sampling of 8kHz or higher sampling rate, then passes through one A single order high-pass filter is handled to make preemphasis to highlight high frequency section.
To preemphasis, treated that the voice signal carries out that sound frame is taken to handle;
Wherein it is possible to which it is a sound frame (20ms) to take at 256 points, between sound frame and sound frame be overlapped 128 points (10ms), i.e., every time Take after 128 points of displacement again at 256 points as next sound frame, it in this way can be excessively violent to avoid the characteristic variations between sound frame.
Treated to taking sound frame, and the voice signal carries out windowing process;
Wherein, Hamming window is multiplied by eliminate the discontinuity at sound frame both ends for each sound frame, by preceding when avoiding analyzing The influence of sound frame afterwards.
In this way, the voice signal after above-mentioned pretreatment operation can carry in favor of subsequent audible spectrum feature extraction Rise the recognition accuracy of vocal print feature.
And when carrying out pretreatment operation to fingerprint image data, which refers to Noise and pseudo-characteristic Fingerprint image is pocessed using certain algorithm, keeps its streakline clear in structure, and characteristic information protrudes.The purpose is to improve fingerprint The quality of image improves the accuracy of feature extraction.In general, when being pre-processed to fingerprint image, main process includes returning One change, image segmentation, enhancing, binaryzation and refinement, but according to different application scenarios and actual demand, it can be to above-mentioned pre- place Reason operation is flexibly selected.
And when carrying out pretreatment operation to face image data, then grey scale can be carried out to the face image data The operations such as change, consequently facilitating the extraction for carrying out face characteristic to face image data identifies.
Wherein, priority of the present invention for the pretreatment operation of voice signal, fingerprint image data and face image data Sequence does not limit, and in specific execute, then it can be respectively by the voiceprint processing module in Fig. 1, finger print information processing Module and face information processing module carry out above-mentioned corresponding pretreatment operation.
In this way, voice signal, fingerprint image data and face image data after above-mentioned each pretreatment operation Vocal print feature, fingerprint characteristic and face characteristic are more notable, to improve the extraction to each feature and recognition accuracy.
S2 extracts spectrum signature to the voice signal of (that is, after windowing process) after pretreatment operation, obtains vocal print spy Reference ceases;And the vocal print feature information is converted to the vocal print matrix of default dimension;
Wherein it is possible to be extracted compared with subject to from pretreated voice signal by the voiceprint processing module in Fig. 1 True vocal print feature information, and convert the vocal print feature information in the matrix of 256*256 fixed sizes.Wherein, it is herein It is extracted the spectrum signature of audio (voice signal), wherein including the vocal print feature of user.
The fingerprint image data is converted to the fingerprint image matrix of the default dimension by S3;
Wherein it is possible to be converted pretreated fingerprint image data to by the finger print information processing module in Fig. 1 The fingerprint image matrix of 256*256 fixed sizes shows as the fingerprint gray-scale map of 256*256 pixels.
The face image data is converted to the facial image matrix of the default dimension by S4;
Wherein it is possible to be converted pretreated face image data to by the face information processing module in Fig. 1 The facial image matrix of 256*256 fixed sizes shows as the face gray-scale map of 256*256 pixels.
It should be noted that in other embodiments, which is not intended to be limited to 256*256, can also be other The square formation or line number of the dimension matrix different with columns, in the present embodiment, due to advance trained default nerve net Network model is when data are inputted using 768*256, that is, is directed to the matrix of 3 256*256, therefore, default dimension here For 256*256;But in other embodiments, if the number that trained default neural network model receives in advance According to the matrix that input is other dimensions, then default dimension herein can also be adjusted to other dimensions, also, vocal print matrix, refer to The dimension of print image matrix and facial image matrix can be identical or different.
Further, it should be noted that the present invention does not limit the execution sequence of S2~S4.
The vocal print matrix, the fingerprint image matrix and the facial image matrix are spliced into row matrix, are obtained by S5 The identity matrix data of the user;The identity matrix data of the user is input to advance trained default god Living things feature recognition is carried out through network model, obtains the first biological attribute data of the user;
Wherein, voiceprint processing module as shown in Figure 1, finger print information processing module and face information processing module point It is defeated that obtained 256*256 vocal prints matrix, 256*256 fingerprint images matrix and 256*256 facial image matrixes will not be handled respectively Go out to comprehensive organism characteristic identity authentication module, then, comprehensive organism characteristic identity authentication module by 256*256 vocal prints matrix, 256*256 fingerprint images matrix and 256*256 facial images matrix splice into row matrix, to obtain the body of a 768*256 Part matrix data, wherein since in the default neural network model of training, the dimension of identity matrix data used herein is 768*256, therefore, it is required that the dimension of spliced matrix is consistent with the data dimension when training when matrix splices here. But in other embodiments, if in the default neural network model of training, the dimension of identity matrix data used herein For 256*768, then this is in when splicing to three matrixes, then needs the identity matrix data for obtaining 256*768.Wherein, The comprehensive organism characteristic identity authentication module may include advance trained default neural network model, therefore, comprehensive life The identity matrix data of 768*256 by matrix splicing can be input to the default nerve net by object characteristic identity authentication module Network model (such as CNN, convolutional neural networks model) carries out living things feature recognition, obtains the first biological attribute data of user A;
It wherein, can be using the identity matrix data for the 768*256 that matrix splices as by instructing in specific implementation The input data of experienced CNN, successively pass through the CNN convolutional layer C1 (7*7 convolution, totally 128), pond layer P1 (adopt by 2*2 most values Sample), convolutional layer C2 (5*5 convolution, totally 128), pond layer P2 (2*2 is most worth sampling), convolutional layer C3* (5*5 convolution, totally 128 It is a), pond layer P3 (2*2 is most worth sampling), convolutional layer C4 (3*3 convolution, totally 128), pond layer P4 (2*2 is most worth sampling), volume Tanh layers of lamination C5 (3*3, totally 128), pond layer P5 (2*2 is most worth sampling), full articulamentum and activation primitive, obtain 128 dimensions Vector, i.e. the first biological attribute data of user A.
Further, it should be noted that in this example, the attended operation of three eigenmatrixes be not realized by the CNN, and In other embodiments, it can also be realized by CNN.
Further, it should be noted that the advance trained default neural network model of the embodiment of the present invention and unlimited In CNN, the neural network models such as RNN (Recognition with Recurrent Neural Network), DNN (deep neural network) are can also be.
Wherein, living things feature recognition, identification is comprehensive characteristics (including vocal print, fingerprint and face characteristic), and non-individual It identifies vocal print, fingerprint and face characteristic, then combines them, but Direct Recognition represents vocal print feature, fingerprint to one The comprehensive characteristics of feature and face characteristic, the identity of the identity user for uniqueness.
S6 calculates first biological attribute data and at least one second biology of pre-registered at least one user Similarity between characteristic;Determine the corresponding target user of the maximum similarity;If maximum similarity is more than default phase Like degree threshold value, then the verification result for indicating that the target user passes through authentication is returned;If the maximum similarity be less than or Equal to the default similarity threshold, then returns and indicate the target user not by the verification result of authentication.
Wherein, the user for carrying out authentication is firstly the need of the registration for carrying out identity information, the identity information registration of user Flow and above-mentioned flow for authenticating ID difference lies in receive be user identity registration request, to which CNN be identified To registration user biological attribute data (here with the second biological attribute data come distinguish over verification user biological characteristic Data), and second biological attribute data is stored in the present invention as the uniqueness identity identifier of registration user In the identity authorization system of embodiment, as to how obtaining second biological attribute data, it is referred to above-mentioned authentication stream Journey S1~S5, which is not described herein again.
Wherein, when the identity authorization system is applied to the mobile terminal of some personal use, such as when mobile phone, then the body Part Verification System generally only preserves the second biological attribute data of oneself of owner's registration, i.e., the second of user there are one preservation Biological attribute data, so that other users can not carry out business processing to the mobile terminal of owner;
And when the identity authorization system is applied to the terminal device of more personal uses, such as public computer or server When, then the identity authorization system can preserve the second biological attribute data of multiple users, and each user has unique the Two biological attribute datas to carry out the operation system on the terminal device for verifying personal identity to have permission Conditional business processing, guarantees data security.
Therefore, in step S6 when carrying out the calculating of similarity, if only registered with when identity authorization system is registered in advance The second biological attribute data of one user, that is, be suitable for personal use mobile terminal the case where, then when executing S6, it is only necessary to The pre-registered owner preserved in the first biological attribute data of the user A of computation requests authentication and identity authorization system The second biological attribute data between similarity, which is maximum similarity, and corresponding user is exactly owner;If The similarity is more than such as 98%, then it is exactly owner that explanation, which currently makes requests on the user A of authentication, returns and indicates user A By the verification result of authentication to operation system;On the contrary, it is not machine that then explanation, which currently makes requests on the user A of authentication, It is main, expression user A is returned not by the verification result of authentication to operation system, so that the user A can not be to business System carries out the operation that part is related to partial information safety.
In another embodiment, in S6 when carrying out the calculating of similarity, if identity authorization system is registered in advance, The case where registering with the second biological attribute data of multiple users, that is, being suitable for the terminal device of more personal uses, then executing When S6, then the first biological attribute data for calculating separately the user A of request authentication is needed to be preserved with identity authorization system Each of similarity between the second biological attribute data of each of pre-registered user, then obtain multiple similarities, then, It determines the corresponding registration user of maximum similarity being calculated, that is, indicates that the user A may be registration user;If this is most Big similarity is more than such as 98%, then it is exactly the registration user found that explanation, which currently makes requests on the user A of authentication, is returned Return indicate user A by the verification result of authentication to operation system (so that user A can carry out the operation system The operation of its permission having);On the contrary, the user A that then explanation currently makes requests on authentication is not registration user, table is returned Show user A not by the verification result of authentication to operation system so that the user A can not be to operation system carry out portion Divide the operation for being related to partial information safety.
By means of the above-mentioned technical proposal of the embodiment of the present invention, the present invention asks the sound of the user of authentication by acquisition Line matrix, fingerprint image matrix and facial image matrix, and matrix is spliced into an identity matrix data, to realize vocal print, The fusion of three fingerprint, face features;And using an advance trained default neural network model come the square to fusion Battle array data carry out the identification of biological characteristic, to special using the biology of the biological attribute data and pre-registered user recognized Identity of the data to judge the user is levied whether by certification, the security intensity of authentication is improved, ensures information processing Safety.
Optionally, in one embodiment, before executing above-mentioned flow for authenticating ID, side according to the ... of the embodiment of the present invention Method can also include the step preset the living things feature recognition of neural network model to this and trained.
Specifically, can be using the training sample of multiple users (such as 100,000 users) come to the default nerve net Network model (such as CNN) carries out living things feature recognition training, after CNN convergences, so that it may trained described pre- to obtain If neural network model;
Wherein, the training sample of each user includes positive sample and negative sample, wherein positive sample includes same Voice signal, fingerprint image data and the face image data of user, negative sample include the voice signal of different user, fingerprint image As data and face image data.
For example, it is carried out by taking the training sample of some user M in the training sample of above-mentioned 100,000 users as an example Illustrate, user M can be acquired to same section of content of text at three sections of three different time sections (such as the morning, noon and evening) Recording data, i.e. user M have three sections of recording for the same text;It can also be to the same finger typing of the user M 10 fingerprints obtain 10 fingerprint images for the same finger (such as right hand index finger);The user M can also be acquired not 10 captured by under same shooting condition (such as the different shooting conditions such as different light, different background, different hair styles, different dressings) Open facial image.In this way, when generating positive sample to user M, so that it may to choose any one recording from three sections of recording datas Data arbitrarily choose a fingerprint image from 10 fingerprint images, then choose any one face from 10 facial images Image, a positive sample as the user M.And this three category information can be combined arbitrarily, so as to obtain 300 combinations, So that the positive sample of the user M there are 300, the data of any one type in 300 positive samples are then replaced with it again The data of the corresponding types of his user, such as the recording data in one group of positive sample of user M is replaced with to the recording number of user C According to, then one group of negative sample of the user M can be obtained, and so on, and multigroup negative sample of user M can be obtained.
Then, the CNN models are distinguished using each sample in the multiple positive samples and multiple negative samples of the user M Multiple living things feature recognition training is carried out, until the biological attribute data that the CNN models export and this for training the CNN Error between the biological attribute data that vocal print, fingerprint and the face characteristic of the training sample of user M merge is less than default error Threshold value, such as 0.002%, so that it may to illustrate that the CNN models are restrained to a certain extent;Similarly recycle the positive sample of other users This and negative sample further train CNN models so that the CNN models all receive the recognition result of all training samples It holds back, so that it may to obtain above-mentioned trained neural network model in advance.
Optionally, in one embodiment, it if the maximum similarity is more than default similarity threshold, returns and indicates institute After stating the verification result that target user passes through authentication, can also include according to the method for the embodiment of the present invention:
Using first biological attribute data to the second biological characteristic number of the pre-registered target user According to being updated and be updated to the default similarity threshold using the maximum similarity.
I.e., it is possible to using the biological attribute data of the user A by authentication come to registered in advance and preservation to the body The biological attribute data of the user A of part Verification System is updated, to ensure the user A's locally preserved in identity people's system Biological attribute data (i.e. the second biological attribute data) is highest with the practical biometric matches degree of user A.In addition, example Such as, which is 98%, and default similarity threshold is 97%, then after the authentication of the user A passes through, is Accuracy of the lifting system to biological characteristic (fusion of vocal print, fingerprint and face characteristic) certification, can also be with the similarity 98% is updated default similarity threshold (97%).Certainly, similarity threshold update here pertains only to positive update, It is not related to negative sense update (being updated to lower value from higher value).
To sum up, the present invention integrates multinomial human body biological characteristics, including vocal print, fingerprint and face characteristic, realizes a set of base In the synthesis identity authorization system solution of human body biological characteristics identification;The voiceprint of user, fingerprint are believed in the present invention Breath, face characteristic information are merged, and realize the comprehensive organism feature recognition of triplicity, have evaded the knowledge of single creature feature Potentially identify and practise fraud in not the risk brought.The multi-biological characteristic integrates three biologies in identity authorization system solution Feature is uniformly treated, and is realized by CNN algorithms, Holistic modeling, and whole identity verification scheme is constituted, and it is more next can to meet user Higher security requirement.In addition the data acquisition equipment of the identity verification scheme requires relatively low, current overwhelming majority intelligence The terminals such as mobile phone, pad can complete the acquisition of required human body biological characteristics data, be answered convenient for the business in intelligent terminal field With.
In addition, the identity authorization system of the comprehensive organism feature based on vocal print, fingerprint and face of the present invention, comprehensive organism Characteristic identity authentication module can check three kinds of biological characteristics of human body, by unified model layer, return to final identity and recognize Card as a result, can with open an account with the bank, security are opened an account etc., and securities rank requires in high, the true complete business of data information, For maintaining secrecy and other are needed in the trouble free service of authentication, it is clear that in conjunction with the authentication system of three-type-person's body biological characteristic System, robustness is stronger, safety higher, more worth user trust.
It should be noted that for embodiment of the method, for simple description, therefore it is all expressed as a series of action group It closes, but those skilled in the art should understand that, the embodiment of the present invention is not limited by the described action sequence, because according to According to the embodiment of the present invention, certain steps can be performed in other orders or simultaneously.Secondly, those skilled in the art also should Know, embodiment described in this description belongs to preferred embodiment, and the involved action not necessarily present invention is implemented Necessary to example.
It is corresponding with the method that the embodiments of the present invention are provided, with reference to Fig. 3, show a kind of authentication of the present invention The structure diagram of system embodiment, can specifically include following module:
Acquisition module 31 acquires the voice signal of the user, refers to if the ID authentication request for receiving user Print image data and face image data;
Characteristic extracting module 32 obtains vocal print feature information for extracting spectrum signature to the voice signal;
First conversion module 33, the vocal print matrix for the vocal print feature information to be converted to default dimension;
Second conversion module 34, the fingerprint image square for the fingerprint image data to be converted to the default dimension Battle array;
Third conversion module 35, the facial image square for the face image data to be converted to the default dimension Battle array;
Concatenation module 36, for carrying out the vocal print matrix, the fingerprint image matrix and the facial image matrix Matrix splices, and obtains the identity matrix data of the user;
Input module 37, for the identity matrix data of the user to be input to advance trained default god Living things feature recognition is carried out through network model, obtains the first biological attribute data of the user;
Computing module 38, for calculating first biological attribute data and pre-registered at least one user at least Similarity between one the second biological attribute data;
Determining module 39, for determining the corresponding target user of the maximum similarity;
First returns to module 40, if being more than default similarity threshold for maximum similarity, returns and indicates the target The verification result that user passes through authentication;
Second returns to module 41, if being less than or equal to the default similarity threshold for the maximum similarity, returns It returns and indicates that the target user does not pass through the verification result of authentication.
Optionally, the system also includes:
Module is removed, for removing the noise information in the voice signal;
First processing module, for carrying out sample quantization processing to the voice signal after removal noise information;
Second processing module, for treated that the voice signal carries out preemphasis processing to sample quantization;
Third processing module, for treated that the voice signal carries out that sound frame is taken to handle to preemphasis;
Fourth processing module, for treated to taking sound frame, the voice signal carries out windowing process;
The characteristic extracting module 32 includes:
Feature extraction submodule obtains vocal print spy for extracting spectrum signature to the voice signal after windowing process Reference ceases.
Optionally, the system also includes:
Training module carries out biological characteristic for the training sample using multiple users to the default neural network model Recognition training obtains the trained default neural network model;
The training sample includes positive sample and negative sample, wherein positive sample includes the voice signal of the same user, refers to Print image data and face image data;Negative sample includes the voice signal, fingerprint image data and facial image of different user Data.
Optionally, the system also includes:
Update module, for using first biological attribute data to the pre-registered target user described the Two biological attribute datas are updated, and are updated to the default similarity threshold using the maximum similarity.
For system embodiments, since it is basically similar to the method embodiment, so fairly simple, the correlation of description Place illustrates referring to the part of embodiment of the method.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with The difference of other embodiment, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present invention can be provided as method, apparatus or calculate Machine program product.Therefore, the embodiment of the present invention can be used complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.Moreover, the embodiment of the present invention can be used one or more wherein include computer can With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code The form of the computer program product of implementation.
The embodiment of the present invention be with reference to according to the method for the embodiment of the present invention, terminal device (system) and computer program The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions In each flow and/or block and flowchart and/or the block diagram in flow and/or box combination.These can be provided Computer program instructions are set to all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals Standby processor is to generate a machine so that is held by the processor of computer or other programmable data processing terminal equipments Capable instruction generates for realizing in one flow of flow chart or multiple flows and/or one box of block diagram or multiple boxes The device of specified function.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing terminal equipments In computer-readable memory operate in a specific manner so that instruction stored in the computer readable memory generates packet The manufacture of command device is included, which realizes in one flow of flow chart or multiple flows and/or one side of block diagram The function of being specified in frame or multiple boxes.
These computer program instructions can be also loaded into computer or other programmable data processing terminal equipments so that Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus The instruction executed on computer or other programmable terminal equipments is provided for realizing in one flow of flow chart or multiple flows And/or in one box of block diagram or multiple boxes specify function the step of.
Although the preferred embodiment of the embodiment of the present invention has been described, once a person skilled in the art knows bases This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as Including preferred embodiment and fall into all change and modification of range of embodiment of the invention.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap Those elements are included, but also include other elements that are not explicitly listed, or further include for this process, method, article Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device including the element.
Above to a kind of identity identifying method provided by the present invention and a kind of identity authorization system, detailed Jie has been carried out It continues, principle and implementation of the present invention are described for specific case used herein, and the explanation of above example is only It is the method and its core concept for being used to help understand the present invention;Meanwhile for those of ordinary skill in the art, according to this hair Bright thought, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not manage Solution is limitation of the present invention.

Claims (8)

1. a kind of identity identifying method, which is characterized in that including:
If receiving the ID authentication request of user, the voice signal, fingerprint image data and face figure of the user are acquired As data;
Spectrum signature is extracted to the voice signal, obtains vocal print feature information;
The vocal print feature information is converted to the vocal print matrix of default dimension;
The fingerprint image data is converted to the fingerprint image matrix of the default dimension;
The face image data is converted to the facial image matrix of the default dimension;
The vocal print matrix, the fingerprint image matrix and the facial image matrix are spliced into row matrix, obtain the use The identity matrix data at family;
The identity matrix data of the user is input to default neural network model trained in advance and carries out biology Feature recognition obtains the first biological attribute data of the user;
Calculate first biological attribute data and at least one second biological characteristic number of pre-registered at least one user Similarity between;
Determine the corresponding target user of the maximum similarity;
If maximum similarity is more than default similarity threshold, the verification knot for indicating that the target user passes through authentication is returned Fruit;
If the maximum similarity is less than or equal to the default similarity threshold, returns and indicate that the target user does not pass through The verification result of authentication.
2. according to the method described in claim 1, it is characterized in that,
Described to extract spectrum signature to the voice signal, before obtaining vocal print feature information, the method further includes:
Remove the noise information in the voice signal;
Sample quantization processing is carried out to the voice signal after removal noise information;
To sample quantization, treated that the voice signal carries out preemphasis processing;
To preemphasis, treated that the voice signal carries out that sound frame is taken to handle;
Treated to taking sound frame, and the voice signal carries out windowing process;
It is described that spectrum signature is extracted to the voice signal, vocal print feature information is obtained, including:
Spectrum signature is extracted to the voice signal after windowing process, obtains vocal print feature information.
3. according to the method described in claim 1, it is characterized in that, before the ID authentication request for receiving the user, institute The method of stating further includes:
Living things feature recognition training is carried out to the default neural network model using the training sample of multiple users, obtain by The trained default neural network model;
The training sample includes positive sample and negative sample, wherein positive sample includes the voice signal of the same user, fingerprint image As data and face image data;Negative sample includes the voice signal, fingerprint image data and face image data of different user.
4. according to the method described in claim 1, it is characterized in that, if the maximum similarity is more than default similarity threshold, After then returning to the verification result that the expression target user passes through authentication, the method further includes:
Using first biological attribute data to second biological attribute data of the pre-registered target user into Row update, and the default similarity threshold is updated using the maximum similarity.
5. a kind of identity authorization system, which is characterized in that including:
Acquisition module acquires voice signal, the fingerprint image of the user if the ID authentication request for receiving user Data and face image data;
Characteristic extracting module obtains vocal print feature information for extracting spectrum signature to the voice signal;
First conversion module, the vocal print matrix for the vocal print feature information to be converted to default dimension;
Second conversion module, the fingerprint image matrix for the fingerprint image data to be converted to the default dimension;
Third conversion module, the facial image matrix for the face image data to be converted to the default dimension;
Concatenation module, for spelling the vocal print matrix, the fingerprint image matrix and the facial image matrix into row matrix It connects, obtains the identity matrix data of the user;
Input module, for the identity matrix data of the user to be input to advance trained default neural network Model carries out living things feature recognition, obtains the first biological attribute data of the user;
Computing module, at least one for calculating first biological attribute data and pre-registered at least one user Similarity between two biological attribute datas;
Determining module, for determining the corresponding target user of the maximum similarity;
First returns to module, if being more than default similarity threshold for maximum similarity, returns and indicates that the target user is logical Cross the verification result of authentication;
Second returns to module, if being less than or equal to the default similarity threshold for the maximum similarity, returns to expression The target user does not pass through the verification result of authentication.
6. system according to claim 5, which is characterized in that the system also includes:
Module is removed, for removing the noise information in the voice signal;
First processing module, for carrying out sample quantization processing to the voice signal after removal noise information;
Second processing module, for treated that the voice signal carries out preemphasis processing to sample quantization;
Third processing module, for treated that the voice signal carries out that sound frame is taken to handle to preemphasis;
Fourth processing module, for treated to taking sound frame, the voice signal carries out windowing process;
The characteristic extracting module includes:
Feature extraction submodule obtains vocal print feature letter for extracting spectrum signature to the voice signal after windowing process Breath.
7. system according to claim 5, which is characterized in that the system also includes:
Training module carries out living things feature recognition for the training sample using multiple users to the default neural network model Training, obtains the trained default neural network model;
The training sample includes positive sample and negative sample, wherein positive sample includes the voice signal of the same user, fingerprint image As data and face image data;Negative sample includes the voice signal, fingerprint image data and face image data of different user.
8. system according to claim 5, which is characterized in that the system also includes:
Update module, for second life using first biological attribute data to the pre-registered target user Object characteristic is updated, and is updated to the default similarity threshold using the maximum similarity.
CN201810049723.9A 2018-01-18 2018-01-18 Identity identifying method and system Pending CN108429619A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810049723.9A CN108429619A (en) 2018-01-18 2018-01-18 Identity identifying method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810049723.9A CN108429619A (en) 2018-01-18 2018-01-18 Identity identifying method and system

Publications (1)

Publication Number Publication Date
CN108429619A true CN108429619A (en) 2018-08-21

Family

ID=63156031

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810049723.9A Pending CN108429619A (en) 2018-01-18 2018-01-18 Identity identifying method and system

Country Status (1)

Country Link
CN (1) CN108429619A (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109299594A (en) * 2018-09-04 2019-02-01 阿里巴巴集团控股有限公司 Auth method and device
CN109583387A (en) * 2018-11-30 2019-04-05 龙马智芯(珠海横琴)科技有限公司 Identity identifying method and device
CN109584886A (en) * 2018-12-04 2019-04-05 科大讯飞股份有限公司 Identity identifying method, device, equipment and storage medium based on Application on Voiceprint Recognition
CN109614844A (en) * 2018-10-16 2019-04-12 阿里巴巴集团控股有限公司 A kind of link verification method, device and equipment
CN109858366A (en) * 2018-12-28 2019-06-07 龙马智芯(珠海横琴)科技有限公司 Identity identifying method and device
CN109977639A (en) * 2018-10-26 2019-07-05 招商银行股份有限公司 Identity identifying method, device and computer readable storage medium
CN110516435A (en) * 2019-09-02 2019-11-29 国网电子商务有限公司 Private key management method and device based on biological characteristics
CN110827453A (en) * 2019-11-18 2020-02-21 成都启英泰伦科技有限公司 Fingerprint and voiceprint double authentication method and authentication system
CN110866234A (en) * 2019-09-29 2020-03-06 南京大学 Identity verification system based on multiple biological characteristics
CN110875037A (en) * 2019-11-19 2020-03-10 腾讯科技(深圳)有限公司 Voice data processing method and device and electronic equipment
CN111104658A (en) * 2018-10-25 2020-05-05 北京嘀嘀无限科技发展有限公司 Registration method and device, authentication method and device
CN111464541A (en) * 2020-04-01 2020-07-28 重庆德信建信息技术有限公司 Electronic government affair multifunctional intelligent hardware terminal based on biological recognition and working method
CN112232255A (en) * 2020-10-26 2021-01-15 上海鹰瞳医疗科技有限公司 Identity authentication method and equipment based on multi-mode data
CN112637209A (en) * 2020-12-23 2021-04-09 四川虹微技术有限公司 Security authentication method and device, security registration method and device, and storage medium
CN112669511A (en) * 2020-12-18 2021-04-16 中用科技有限公司 User registration and authentication method, system and equipment based on face voiceprint
CN112669966A (en) * 2020-12-14 2021-04-16 北京易华录信息技术股份有限公司 Behavior analysis system based on monitoring data
CN112990943A (en) * 2021-03-16 2021-06-18 上海万向区块链股份公司 Method and system for realizing block chain prediction machine based on image information identification of biological assets
CN113505824A (en) * 2019-01-23 2021-10-15 北京影谱科技股份有限公司 Judgment updating method and device and face card punching system
CN113538771A (en) * 2021-07-16 2021-10-22 中国银行股份有限公司 Identity authentication method and device
CN115022030A (en) * 2022-05-31 2022-09-06 中国银行股份有限公司 Bank business handling request processing method and device based on block chain
CN116110159A (en) * 2023-04-13 2023-05-12 新兴际华集团财务有限公司 User authentication method, device and medium based on CFCA authentication standard

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101339607A (en) * 2008-08-15 2009-01-07 北京中星微电子有限公司 Human face recognition method and system, human face recognition model training method and system
CN101483652A (en) * 2009-01-10 2009-07-15 五邑大学 Living creature characteristic recognition system
CN103679158A (en) * 2013-12-31 2014-03-26 北京天诚盛业科技有限公司 Face authentication method and device
CN104899579A (en) * 2015-06-29 2015-09-09 小米科技有限责任公司 Face recognition method and face recognition device
CN105184238A (en) * 2015-08-26 2015-12-23 广西小草信息产业有限责任公司 Human face recognition method and system
CN106228045A (en) * 2016-07-06 2016-12-14 吴本刚 A kind of identification system
CN106339702A (en) * 2016-11-03 2017-01-18 北京星宇联合投资管理有限公司 Multi-feature fusion based face identification method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101339607A (en) * 2008-08-15 2009-01-07 北京中星微电子有限公司 Human face recognition method and system, human face recognition model training method and system
CN101483652A (en) * 2009-01-10 2009-07-15 五邑大学 Living creature characteristic recognition system
CN103679158A (en) * 2013-12-31 2014-03-26 北京天诚盛业科技有限公司 Face authentication method and device
CN104899579A (en) * 2015-06-29 2015-09-09 小米科技有限责任公司 Face recognition method and face recognition device
CN105184238A (en) * 2015-08-26 2015-12-23 广西小草信息产业有限责任公司 Human face recognition method and system
CN106228045A (en) * 2016-07-06 2016-12-14 吴本刚 A kind of identification system
CN106339702A (en) * 2016-11-03 2017-01-18 北京星宇联合投资管理有限公司 Multi-feature fusion based face identification method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
XIAO-YUAN JING等: "Face and palmprint pixel level fusion and Kernel DCV-RBF classifier forsmall sample biometric recognition", 《PATTERN RECOGNITION》 *
胡航: "《语音信号处理》", 31 July 2009, 哈尔滨工业出版社 *
陈敏: "《认知计算导论》", 31 May 2017, 华中科技大学出版社 *

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109299594A (en) * 2018-09-04 2019-02-01 阿里巴巴集团控股有限公司 Auth method and device
CN109614844A (en) * 2018-10-16 2019-04-12 阿里巴巴集团控股有限公司 A kind of link verification method, device and equipment
CN109614844B (en) * 2018-10-16 2023-01-24 创新先进技术有限公司 Link verification method, device and equipment
CN111104658A (en) * 2018-10-25 2020-05-05 北京嘀嘀无限科技发展有限公司 Registration method and device, authentication method and device
CN109977639A (en) * 2018-10-26 2019-07-05 招商银行股份有限公司 Identity identifying method, device and computer readable storage medium
CN109583387A (en) * 2018-11-30 2019-04-05 龙马智芯(珠海横琴)科技有限公司 Identity identifying method and device
CN109584886A (en) * 2018-12-04 2019-04-05 科大讯飞股份有限公司 Identity identifying method, device, equipment and storage medium based on Application on Voiceprint Recognition
CN109858366A (en) * 2018-12-28 2019-06-07 龙马智芯(珠海横琴)科技有限公司 Identity identifying method and device
CN113505824B (en) * 2019-01-23 2024-01-09 北京影谱科技股份有限公司 Judgment updating method and device and face card punching system
CN113505824A (en) * 2019-01-23 2021-10-15 北京影谱科技股份有限公司 Judgment updating method and device and face card punching system
CN110516435A (en) * 2019-09-02 2019-11-29 国网电子商务有限公司 Private key management method and device based on biological characteristics
CN110866234A (en) * 2019-09-29 2020-03-06 南京大学 Identity verification system based on multiple biological characteristics
CN110866234B (en) * 2019-09-29 2022-06-07 南京大学 Identity verification system based on multiple biological characteristics
CN110827453A (en) * 2019-11-18 2020-02-21 成都启英泰伦科技有限公司 Fingerprint and voiceprint double authentication method and authentication system
CN110875037A (en) * 2019-11-19 2020-03-10 腾讯科技(深圳)有限公司 Voice data processing method and device and electronic equipment
CN111464541A (en) * 2020-04-01 2020-07-28 重庆德信建信息技术有限公司 Electronic government affair multifunctional intelligent hardware terminal based on biological recognition and working method
CN112232255A (en) * 2020-10-26 2021-01-15 上海鹰瞳医疗科技有限公司 Identity authentication method and equipment based on multi-mode data
CN112669966A (en) * 2020-12-14 2021-04-16 北京易华录信息技术股份有限公司 Behavior analysis system based on monitoring data
CN112669511A (en) * 2020-12-18 2021-04-16 中用科技有限公司 User registration and authentication method, system and equipment based on face voiceprint
CN112637209A (en) * 2020-12-23 2021-04-09 四川虹微技术有限公司 Security authentication method and device, security registration method and device, and storage medium
CN112990943A (en) * 2021-03-16 2021-06-18 上海万向区块链股份公司 Method and system for realizing block chain prediction machine based on image information identification of biological assets
CN112990943B (en) * 2021-03-16 2023-04-07 上海万向区块链股份公司 Method and system for realizing block chain prediction machine based on image information identification of biological assets
CN113538771A (en) * 2021-07-16 2021-10-22 中国银行股份有限公司 Identity authentication method and device
CN115022030A (en) * 2022-05-31 2022-09-06 中国银行股份有限公司 Bank business handling request processing method and device based on block chain
CN115022030B (en) * 2022-05-31 2024-04-19 中国银行股份有限公司 Bank business handling request processing method and device based on blockchain
CN116110159A (en) * 2023-04-13 2023-05-12 新兴际华集团财务有限公司 User authentication method, device and medium based on CFCA authentication standard

Similar Documents

Publication Publication Date Title
CN108429619A (en) Identity identifying method and system
Ali et al. Edge-centric multimodal authentication system using encrypted biometric templates
US20210141896A1 (en) Systems and methods for private authentication with helper networks
JP2022532677A (en) Identity verification and management system
CN112651841B (en) Online business handling method, online business handling device, server and computer readable storage medium
CN109120605A (en) Authentication and account information variation and device
JP7412496B2 (en) Living body (liveness) detection verification method, living body detection verification system, recording medium, and training method for living body detection verification system
CN107731234A (en) A kind of method and device of authentication
CN106878344A (en) A kind of biological characteristic authentication, register method and device
CN108510290A (en) Customer information amending method, device, computer equipment and storage medium in call
CN110796054A (en) Certificate authenticity verifying method and device
CN111160928A (en) Identity verification method and device
CN113886792A (en) Application method and system of print control instrument combining voiceprint recognition and face recognition
CN110136726A (en) A kind of estimation method, device, system and the storage medium of voice gender
CN110298240A (en) A kind of user vehicle recognition methods, device, system and storage medium
CN110324314A (en) User registering method and device, storage medium, electronic equipment
CN112351047A (en) Double-engine based voiceprint identity authentication method, device, equipment and storage medium
EP3767872A1 (en) Method for generating a private key from biometric characteristics
CN111914769A (en) User validity judging method, device, computer readable storage medium and equipment
CN113362852A (en) User attribute identification method and device
KR20210018586A (en) Method and apparatus for identifying video content using biometric features of characters
Saleema et al. Voice biometrics: the promising future of authentication in the internet of things
CN115906028A (en) User identity verification method and device and self-service terminal
JP5279007B2 (en) Verification system, verification method, program, and recording medium
US11418502B2 (en) Input entry based on user identity validation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180821

RJ01 Rejection of invention patent application after publication