Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity recognition method, device and system

A technology for identification and identification results, which is applied in the fields of identification methods, devices and systems, and can solve the problems of low identification accuracy of identification methods, improve identification accuracy, solve low identification accuracy, and improve experience Effect

Active Publication Date: 2020-03-20
ALIBABA GRP HLDG LTD
View PDF12 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present application provides an identification method, device and system to at least solve the technical problem of low recognition accuracy of the identification method in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity recognition method, device and system
  • Identity recognition method, device and system
  • Identity recognition method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] According to an embodiment of the present application, an embodiment of an identification method is provided. It should be noted that the steps shown in the flowcharts of the drawings can be executed in a computer system such as a set of computer-executable instructions, and, although A logical order is shown in the flowcharts, but in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0035] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. figure 1 It shows a hardware structure block diagram of a computer terminal (or mobile device) for realizing the identification method. Such as figure 1 As shown, the computer terminal 10 (or mobile device 10) may include one or more (shown by 102a, 102b, ..., 102n in the figure) processor 102 (the processor 102 may include but not limited to a microproce...

Embodiment 2

[0088] According to the embodiment of the present application, an embodiment of an identification method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0089] Figure 4 It is a flowchart of an identification method according to Embodiment 2 of the present application. Such as Figure 4 As shown, the method may include the following steps:

[0090] Step S42, acquiring the voice signal of the target object and a first time stamp, wherein the first time stamp is used to represent the time when the voice signal is acquired.

[0091] Specifically, in the process of using a smart speaker at home, when a user (namely the above-mentioned target object) needs to c...

Embodiment 3

[0116] According to the embodiment of the present application, an embodiment of an identification method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0117] Figure 5 It is a flowchart of an identification method according to Embodiment 3 of the present application. Such as Figure 5 As shown, the method may include the following steps:

[0118] Step S52, acquiring voice information of the target object, wherein the voice information includes: voiceprint characteristics and a first time stamp when the voice information is acquired.

[0119] Specifically, in the process of using a smart speaker at home, when a user (namely the above-mentioned target obje...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity recognition method, device and system. The method comprises: acquiring voiceprint features and a first timestamp of a target object, wherein the first timestamp isused for representing the time when the voiceprint features are acquired; obtaining a pre-stored voiceprint feature successfully matched with the voiceprint feature and a second timestamp from a voiceprint library, the second timestamp being used for representing the time when the pre-stored voiceprint feature is obtained; determining a similarity threshold based on the first timestamp and the second timestamp; and obtaining a recognition result of the target object based on the similarity threshold and the similarity between the voiceprint features and the pre-stored voiceprint features. According to the invention, the technical problem of low identification accuracy of an identity identification method in the prior art is solved.

Description

technical field [0001] The present application relates to the field of voiceprint recognition, and in particular, to an identification method, device and system. Background technique [0002] A smart speaker is a tool for family members to surf the Internet through voice, such as ordering songs, shopping online, or understanding the weather forecast. It can also control smart home devices, such as opening curtains, setting the temperature of the refrigerator, and heating the water heater in advance. In order to improve the security of smart speakers and prevent non-family members from illegally controlling smart speakers, family members need to register with smart speakers and perform identity authentication before each control. [0003] However, the demand background: Due to the environmental information contained in the audio registered by the user, as well as the information of the speaker itself, as time goes by, subtle or large changes will occur, including environmenta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G10L17/00H04N21/439
CPCH04L9/3231H04L9/3297H04N21/4394G10L17/00
Inventor 赵情恩索宏彬刘刚卓著雷赟
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products