Check patentability & draft patents in minutes with Patsnap Eureka AI!

Verification method and system using voice input

A voice input and user verification technology, applied in the field of user identity verification, can solve the problems of limited security, easy identification of digital verification codes, loss of meaning of verification, etc., to ensure authenticity and security, avoid malicious or The effect of abnormal access and security protection

Inactive Publication Date: 2017-09-08
吴平
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the digital password is relatively easy to be cracked or leaked, and the digital verification code in the picture is also easy to be recognized, thus losing its verification meaning
With the continuous development of artificial intelligence, even if other characters such as letters and / or Chinese characters are used as passwords or verification codes, their security is still limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and system using voice input
  • Verification method and system using voice input

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Specific embodiments of the present invention will be explained in detail below in conjunction with the accompanying drawings.

[0020] Hereinafter, character-type codes used for verification such as passwords or verification codes may be collectively referred to as verification codes or codes.

[0021] figure 1 is a schematic diagram illustrating a system for authentication using voice input according to an embodiment of the present invention.

[0022] Such as figure 1 As shown in , the system 100 using voice input for verification according to the present invention includes: a voice input device 101 , a voice recognition device 102 , a voice feature judging device 103 , a code judging device 104 and a verification device 105 .

[0023] When running some applications or accessing some services, the corresponding applications or services may require the user to authenticate. For example, when we make a payment through a payment application on a desktop computer or a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a verification method and system (100) using voice input. When a verification request is submitted, a voice input device (101) causes a user to input an obtained code for verification through voice. A voice identification device (102) identifies the input voice and extracts the identified voice features and the identified code. A voice feature judging device (103) judges whether the identified voice features are consistent with predetermined voice features. A code judging device (104) judges whether the identified code is consistent with a preset verification code. A verification device (105) outputs a verification pass instruction in the case that the judgment results of the two judging devices are "consistent". By adoption of the verification method and system provided by the invention, the unsecure situation that the others personate the user identity to input a password or the verification code is avoided. Meanwhile, the security means of voice identification is added to further improve the security of applications and services.

Description

technical field [0001] The present invention relates to user identity verification, and more particularly to methods and systems for verification using speech input. Background technique [0002] With the increasing number of applications and services installed on computers or mobile devices, the security issues of these applications and services have attracted people's attention. One of the security issues is to determine the identity of users using applications and services, especially in some applications and services involving finance, payment, personal privacy or other strict security requirements, user identity determination is a very important link. [0003] Existing applications and services generally use verification codes to authenticate users. Specifically, it may be fixed password verification or random password verification. For example, as a step of random password verification, the random password is generally sent to a device designated by the user, such as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32G10L17/24
CPCG10L17/24H04L9/3226H04L9/3231
Inventor 刘光明
Owner 吴平
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More