Speech input authentication method and device

A voice input and voice technology, applied in voice analysis, security devices, voice recognition, etc., can solve the problems of high error probability and high misoperation

Inactive Publication Date: 2012-12-19
HANGZHOU MIPU TECH CO LTD
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 3. Most of the mobile terminal devices use screen touch input. In the process of input throu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Speech input authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described below in conjunction with accompanying drawing.

[0024] The voice input verification device of the present invention includes: a verification code display module 1 , a voice recording module 2 , a voice analysis and recognition module 3 , and a verification code verification module 4 . The verification code display module 1 is used to display pictures or videos with verification codes. The pictures or videos can be advertisement pictures or advertisement videos; speech; the speech analysis and recognition module 3, carries out the analysis and recognition operation through relevant algorithms, and obtains specific results, such as Arabic numerals, English letters, special symbols or Chinese characters, and the relevant algorithms can adopt the software sdk provided by the android system or iflytek The algorithm in the verification code verification module 4, compares the currently displayed verification code information a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a speech input authentication device, which comprises an authentication code display module (1), a speech recording module (2), a speech analysis and recognition module (3) and an authentication code authentication module (4). The device is characterized in that the authentication code display module (1) is used for displaying a picture or video with an authentication code; the speech recording module (2) is used for recording a speech made by a user according to the authentication code seen in the picture or video; the speech analysis and recognition module (3) performs analytical and recognition operation according to related algorithms to obtain a speech recognition result; and the authentication code authentication module (4) carries out comparison according to currently displayed authentication code information and speech recognition result, and if the authentication code information is consistent with the speech recognition result, the authentication succeeds, otherwise, the authentication is failed. The invention also discloses a speech input authentication method. By adopting the speech input authentication device and method provided by the invention, authentication code authentication can be performed conveniently and quickly, and various disadvantages of manual input are overcome.

Description

technical field [0001] The invention relates to a device and method for input verification, in particular to a device and method for voice input verification. The invention relates to technologies such as picture verification codes, video verification codes, voice analysis and recognition, and belongs to the fields of computer network security, multimedia, voice intelligent recognition and the like. Background technique [0002] Verification code technology is used to prevent malicious cracking of passwords, swiping tickets, and flooding forums. It can effectively prevent a hacker from making continuous login attempts to a specific registered user with a specific program brute force cracking method. With the rapid development of the mobile Internet today, verification codes It plays a huge role in various e-commerce systems, but the verification code technology currently has the following problems on mobile Internet terminal devices: [0003] 1. Since the mobile Internet te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06G10L15/22
Inventor 王家锋
Owner HANGZHOU MIPU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products