Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for verifying user identity based on the combination of digital password and voiceprint

A user identity, digital technology, applied in the field of identity verification, can solve the problems of short length of verification voice, no use, rejection of recognition, etc., to achieve the effect of ensuring verification accuracy, short recording time, and ensuring security

Active Publication Date: 2017-08-29
北京华控智加科技有限公司
View PDF9 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main defect of this invention is: (1) in practical application, the user verification speech length is short, the environment is complex, and the text structure information of the verification code cannot be used by the text-independent speech verification algorithm, and it is difficult to achieve an accurate verification effect; (2) in the verification When using voiceprint and text content verification step by step, it may be rejected due to minor errors in text content recognition.
However, the main defects of this technology are: (1) Although the text-related voiceprint recognition technology is mentioned in the invention, when the user registration and verification process is described in detail, the known text structure information in the user's voice is not used ; (2) The invention only considers the voiceprint information of the user's voice, but does not consider the content of the verification text, and criminals may steal the user's recording to deceive the verification system
[0027] In addition, Chinese Patent Publication No. CN105069872A (disclosure date 2015.11.18) and Chinese Patent Publication No. CN104392353A (disclosure date 2015.03.04) both involve the use of user voice for voiceprint and dynamic verification codes for content verification, but both The specific technical method used is not specified, and it does not have enough reference for other implementers who try to use voice technology for identity verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for verifying user identity based on the combination of digital password and voiceprint
  • Method for verifying user identity based on the combination of digital password and voiceprint
  • Method for verifying user identity based on the combination of digital password and voiceprint

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] A user identity verification method based on digital password and voiceprint joint confirmation proposed by the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0065] A user identity verification method based on digital password and voiceprint joint confirmation proposed by the present invention, the digital password is a digital string composed of ten numbers from 0 to 9, the length of the digital string is 6 to 24 digits, and the length is as required security level selection.

[0066] A user identity verification method based on digital password and voiceprint joint confirmation proposed by the present invention is divided into three stages: initialization stage, registration stage and verification stage. The overall process is as follows: figure 1 shown, including the following steps:

[0067] 1) Initialization phase; the process is as follows figure 2 As shown, it specifically ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention proposes a method for verifying user identity based on the combination of digital password and voiceprint. The method belongs to the technical field of user identity identification and comprises of an initializing stage: obtaining an initialized training audio and creating a text-related general background model; of a registering stage: recording the user registered information and creating a text-related user model; of a verifying stage: recording user identification audio by the user according to the server designated order; and according to the short-time spectrum characteristics of the user identification audio and the text-related user model as well as the text-related general background model, verifying whether the voiceprint of the user identification audio belongs to a targeted user or not and whether the contents are consistent with the right numerical string text or not; obtaining the voiceprint verifying score and the text verifying score; summing the two scores according to their weights to obtain a final verifying score; and when the final verifying score exceeds the threshold value, completing the verification. According to the method of the invention, based on the verification using traditional password, the digital password and the voiceprint are combined to confirm so as to increase the security for identity verification.

Description

technical field [0001] The invention belongs to the technical field of identity verification, and in particular relates to a user identity verification method based on digital password and voiceprint joint confirmation. Background technique [0002] Traditional password-based authentication methods often use passwords or dynamic verification codes. Passwords are widely used in all aspects of production and life. However, a single password may be stolen. Once the password is lost, it will pose a great threat to account security. With the popularity of electronic technology and mobile communication tools, dynamic verification codes have also become popular. When logging in to an account on a service terminal, webpage or mobile client, users are often required to enter the SMS verification code received by the mobile phone; when using online banking for transactions, an electronic password card (also known as e-token) can be used to randomly generate dynamic digital verifica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32G10L15/06G10L15/26G10L17/04G10L17/14
CPCG10L15/063G10L15/26G10L17/04G10L17/14H04L9/3215H04L9/3228H04L9/3231
Inventor 刘艺何亮田垚陈仙红刘加
Owner 北京华控智加科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products