Unlock instant, AI-driven research and patent intelligence for your innovation.

Generation method of Chinese voice verification code

A voice verification and verification code technology, which is applied in the computer field, can solve problems such as no help, and achieve the effects of easy popularization, good resistance to cracking, and difficult identity verification

Inactive Publication Date: 2010-03-03
ZHEJIANG UNIV
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] These voice verification codes can greatly facilitate the visually impaired to access the Internet, but whether they are foreign or domestic voice verification codes, their content contains English components, which are specially aimed at users from English-speaking countries. For the visually impaired among the majority of Chinese netizens, it doesn't really help

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation method of Chinese voice verification code
  • Generation method of Chinese voice verification code
  • Generation method of Chinese voice verification code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The method of the present invention is as follows: first generate the audio file containing the verification code information, add the background disturbance sound to the audio file containing the verification code information, and carry out tone shift (echo) processing on the audio file containing the verification code information added with the background sound so as to generate The final audio file, use this audio file as the Chinese voice verification code. see figure 1 , including the following steps:

[0027] 1. According to the text information of the verification code, the audio file is extracted from the verification code basic information database for synthesis, and an audio file containing the verification code information is generated.

[0028] In this step, the text information of the verification code refers to the information that the system requires the user to identify during verification, which may be a combination of the following M: Chinese phrases,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a generation method of Chinese voice verification code, which comprises the steps of: generating an audio file containing voice message of the verification code, adding background interference sound into the audio file containing voice message of the verification code, modifying the tone of the audio file containing voice message of the verification code and added with thebackground sound, (resounding) processing and generating the final audio file, and using the final audio file as the Chinese voice verification code. The invention also discloses a Chinese voice verification code generation and application device. By using the invention, anti-breaking capability of the Chinese voice verification code can be improved, and simultaneously, the problem of network authentication of the visually handicapped among wide range of network users in China is solved.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method and device for generating voice verification codes. Background technique [0002] In order to ensure network security and prevent network resources from being maliciously occupied, verification code technology emerges as the times require. Among the current verification code technologies, the image verification code technology is the most widely used. The picture verification code is a picture containing characters. The characters in these pictures are often distorted or added noise to a certain extent within the range that can be recognized by humans, thus ensuring the difficulty of automatic machine recognition. Therefore, when a website uses a picture verification code for identity verification, the user is often asked to answer what the characters described in the picture are. If the user can correctly enter the characters in the picture within the specified time, the syste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
Inventor 陈岭郭峰李卓豪陈根才
Owner ZHEJIANG UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More