Voice unlocking system and method

A voice unlocking and unlocking technology, applied in voice analysis, voice recognition, instruments, etc., can solve the problems of inconvenient operation, poor safety and convenience of unlocking operation, questioning of safety of unlocking operation, etc. The effect of convenience

Inactive Publication Date: 2014-03-26
INVENTEC PUDONG TECH CORPOARTION +1
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in this way, it is impossible to prevent others from deceiving the verification mechanism with photos, which makes the security of the unlocking operation questionable, and the angle of the face shooting will also affect the correctness of the verification, so it is still not convenient enough in operation
In addition, some people propose to unlock by inputting a password, but this method cannot avoid the leakage of the p

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice unlocking system and method
  • Voice unlocking system and method
  • Voice unlocking system and method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0038] The implementation of the present invention will be described in detail below with reference to the accompanying drawings and embodiments, so that the implementation process of how the present invention applies technical means to solve technical problems and achieve technical effects can be fully understood and implemented accordingly.

[0039] Before describing the voice unlocking system and method disclosed in the present invention, the self-defined terms of the present invention will be explained. The voice features and recording features in the present invention refer to the features extracted after analyzing the voice signal. Such as: volume, pitch, timbre, etc., among which the voice features are pre-stored in the device, and the voice features of different users can also be stored; the recording features are generated by parsing the recorded voice, and how the features are generated The same way as the voice feature is generated, the user's identity can be identified...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a voice unlocking system and a voice unlocking method. The voice unlocking method comprises the following steps: receiving recorded voice, analyzing the recorded voice to generate recording characteristics, comparing the recording characteristics with the voice characteristics, analyzing the recorded voice to obtain an unlocking command when the recording characteristics is fit for the voice characteristics, and executing the unlocking operation corresponding to the unlocking command. Therefore, the voice unlocking system and the voice unlocking method can improve the security and the convenience of the unlocking operation.

Description

technical field [0001] The present invention relates to a voice unlocking system and a method thereof, in particular to a voice unlocking system and a method for unlocking a device by using a comparison voice. Background technique [0002] In recent years, with the popularity and vigorous development of mobile devices, applications related to mobile devices have sprung up like mushrooms after rain, among which the unlocking function has attracted the most attention. [0003] Generally speaking, the unlocking operation is traditionally realized by pressing a button or sliding a finger, for example, pressing two buttons at the same time or sliding a finger on a touch screen to unlock a locked screen, document or application. However, since the identity of the operator cannot be confirmed, there are security concerns. In other words, the above methods all have the problem of being unable to verify the identity of the operator. [0004] In view of this, some manufacturers have ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G10L15/26G10L15/02
Inventor 谢天
Owner INVENTEC PUDONG TECH CORPOARTION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products