Voice security verification method and apparatus
A security verification and voice technology, which is applied in the field of voice security verification, can solve problems such as low safety factor, complicated technical solutions, inconvenient use, etc., and achieve the effect of ensuring simplicity, reducing the probability of hacker attacks, and improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0047] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.
[0048] Such as figure 1 As shown, it is a schematic flowchart of the first embodiment of the voice security verification method of the present invention.
[0049] It should be emphasized that: figure 1 The flow chart shown is only a preferred embodiment, and those skilled in the art should know that any embodiment constructed around the idea of the present invention should not deviate from the scope covered by the following technical solutions:
[0050] When receiving the user's security verification instruction, obtain the voice data entered by the user; compare the voice data with the pre-stored standard voice data according to the preset voice algorithm to obtain the voice data and the pre-stored The similarity of the standard voice data; when the similarity is greater than a preset threshold, it is determined ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com