Remote voice identification authentication system and method

An identity authentication and authentication system technology, applied in the field of identity authentication methods, can solve problems such as low user acceptance and increase user operation burden, and achieve the effect of improving security and high user acceptance

Inactive Publication Date: 2009-07-29
ZINGLABS BEIJING
View PDF0 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in doing so, the technical characteristics of voice recognition technology itself, such as ease of use and accurate recognition, will be lost.
Moreover, users need to perform different identity authentication operations, which increases the user's operational burden
Therefore, the user acceptance of this authentication system supplemented by other means of identity authentication is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Remote voice identification authentication system and method
  • Remote voice identification authentication system and method
  • Remote voice identification authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0063] As shown in Figure 3, the random speech recognition module includes a random speech generator and a speech recognition module. The random speech generator is used to generate a random speech signal that requires the user to repeat. The speech recognition module is a module that uses speech recognition technology to recognize the speech signal that the user responds to. By comparing the user response voice signal recognized by the voice recognition module with the random voice signal generated by the random voice generator, it is judged whether the user has passed the voice authentication.

[0064] Here, there are many specific implementation forms that can be used as a random speech generator. In this embodiment, an IVR system (Interactive Voice Response, interactive voice response system) is used for implementation.

Embodiment 2

[0066] like Figure 4 As shown, the random speech recognition module is realized by the artificial speech server. The so-called artificial voice server is to manually provide identity authentication services to users who apply for identity authentication. The service personnel of the artificial voice server can ask random questions to the user applying for identity authentication, and judge the authenticity of the user according to the answer made by the user. Moreover, during the conversation between the user and the service personnel, the voice information sent by the user can be simultaneously authenticated by the voiceprint recognition module. In this way, the user can complete the identity authentication without knowing it, which improves the acceptance of the user.

[0067] Here, although the artificial voice server is used for voice recognition, certain human resource costs will be increased. However, this method, as a solution with high user acceptance, is also an i...

Embodiment 3

[0069] As shown in Figure 5, the random speech recognition module includes a random speech generator, a speech recognition module and an artificial speech server. Among them, the random speech generator, the speech recognition module and the artificial speech server have been introduced in Embodiment 1 and Embodiment 2, and will not be repeated here.

[0070] In this embodiment, the artificial voice server serves as a supplement to the random voice generator and the voice recognition module. When the user fails to authenticate through the random voice generator and the voice recognition module, he can choose to authenticate through the artificial voice server. In this way, on the one hand, a large amount of human resource costs caused by the artificial voice server can be saved, and on the other hand, remedial measures are provided for authentication failures of the random voice generator and the voice recognition module.

[0071] The authentication method of this remote voic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authentication system by remote voice, which is characterized by comprising a user remote calling end and an authentication server; the authentication server comprises a voiceprint identification module and a random voice identification module; the voiceprint identification module is used for judging the user identity by the voice information of the user; the random voice identification module is used for generating a random voice signal and requiring the user to response the random voice signal; and the random voice identification module judges whether the voice information responded by the user is consistent with the random voice signal. The authentication system by remote voice adds the random voice identification module on the basis of the existing voice authentication system, judges whether the voice source of the user is reliable by leading the user to repeat the voice information generated by the module randomly, improves the safety of the system and has higher acceptance degree by the user.

Description

technical field [0001] The invention relates to a remote voice identity authentication system and method thereof, in particular to a system for real-time identity authentication through dual technologies of voiceprint recognition technology and voice recognition technology, and an identity authentication method of the system, belonging to the field of identity recognition technology. Background technique [0002] Voice recognition technology is a technology for identifying people through the special features of human voice. It and fingerprint identification technology, palmprint identification technology, eye iris identification technology, etc. are all technologies for identification through the biological characteristics of the human body itself. This kind of identification technology, which utilizes the biological characteristics of the human body to identify, is favored by users for its convenient use, accurate identification and high security. [0003] The structure of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32G10L15/00
Inventor 邴炜杨永胜周诚
Owner ZINGLABS BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products