Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity verifying method, server, client side and system

An authentication method and authentication technology, applied in the fields of authentication methods, clients and systems, and servers, can solve the problems of limited scope of application, low authentication efficiency, and low reliability of authentication, and achieve a wide range of applications, The effect of low configuration requirements and improved efficiency

Active Publication Date: 2014-11-26
TENCENT TECH (SHENZHEN) CO LTD
View PDF12 Cites 34 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For terminals that are not equipped with devices capable of fingerprint recognition or face recognition, the above methods cannot be used for identity verification. Therefore, the above methods of identity verification are limited in scope
In addition, for face recognition, because face recognition has relatively high environmental requirements, once the light is poor or the camera is not effective, it may not be possible to perform identity verification or the operation of identity verification through face recognition will fail, which will not only lead to Authentication is not reliable and authentication is not efficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verifying method, server, client side and system
  • Identity verifying method, server, client side and system
  • Identity verifying method, server, client side and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0047] Such as figure 1 , which shows a schematic diagram of the implementation environment involved in the identity verification method provided by the embodiment of the present invention. Such as figure 1 As shown, the implementation environment includes a server 101 and a client 102. Wherein, the server 101 and the client 102 are connected through a wireless network or a wired network.

[0048] When the current user operating a certain client 102 needs to perform identity verification, the method provided by the embodiment of the present invention supports the first voiceprint of the current user operating the client 102 and the second voice of the legal user operating the client 102. pattern matches to authenticate the current u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity verifying method, a server, a client side and a system. The method comprises the steps that a first preset text message is sent to the client side corresponding to a current user; first sound data input by the current user according to the first preset text message are received; a first vocal print is generated according to the first sound data; whether the first vocal print is matched with a second vocal print of a legal user or not is determined, wherein the second vocal print is generated according to reference sound data input by the legal user according to a second preset text message, and one of characters composing the first preset text message is at least one of characters in the second preset text message; if the first vocal print is matched with the second vocal print of the legal user, it is determined that the current user passes the identity verification. The identity verification is achieved by matching the first vocal print of the current user with the second vocal print of the legal user, the configuration requirement for the terminal where the client side is located is low, accordingly, the application range is wide, the identity verification is not affected by the environment where the client side is located, the identity verification is more reliable, and the identity verifying efficiency can be improved.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an identity verification method, server, client and system. Background technique [0002] With the rapid development of computer technology, in order to facilitate user operations, more and more clients related to user information are installed on the terminal side, such as clients of various social application software, clients of bank application software, and so on. Since each client includes a lot of data related to user information or user property, when running each client on a terminal, it is necessary to authenticate the user operating each client. [0003] The related technology usually adopts fingerprint recognition or face recognition method when performing identity verification. The specific identity verification process is: start the client, obtain the physical sign information of the user operating the client, and submit the physical sign information of the user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 孙骁吴宗倬龙强李玲岑丽芳张翔黄润佳王晖
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products