Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method and apparatus thereof

A technology of identity authentication and target text, applied in the field of biosafety dynamic authentication, which can solve problems such as loss of accuracy

Active Publication Date: 2017-09-29
ZTE CORP
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical applications, due to the influence of the environment, the distribution of the speaker's voiceprint matching score and the distribution of the text matching score are often different, and it is inaccurate to judge only by pre-set thresholds.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and apparatus thereof
  • Identity authentication method and apparatus thereof
  • Identity authentication method and apparatus thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0097] like image 3 shown, including the following steps:

[0098] Step 101, preprocessing: preprocessing the test speech input by the user according to the short-term energy and short-term zero-crossing rate, removing non-speech segments in the speech;

[0099] Step 102, feature parameter extraction: perform feature parameter extraction on the preprocessed test speech, the system can use 12-dimensional Mel Frequency Cepstrum Coefficient (Mel Frequency Cepstrum Coefficient, referred to as MFCC) and its first-order difference coefficient as feature parameters, A total of 24 dimensions;

[0100] Step 103, calculating the voiceprint matching score: matching the test speech features with the voiceprint model of the target speaker to obtain the voiceprint matching score;

[0101] Step 104: Initial segmentation of speech features: through initial segmentation of test speech features, initial segmentation units and the number of initial segmentation units are obtained.

[0102] I...

Embodiment 2

[0141] For the initial segmentation of speech features in step 104 in the first embodiment, the determination of the number of segmentation units in step 105, and the mandatory segmentation in step 106, the following methods are used in the present embodiment to perform segmentation and determination:

[0142] Step 201, voice signal initial segmentation;

[0143] In this embodiment, splitting is started according to the order of the length of the initial segmentation unit from large to small, and each initial segmentation unit is divided into two segments on average until the total number of segmentation units is equal to up to the number of the target text;

[0144] If the number of forced segmentation is greater than or equal to the second threshold, the forced segmentation ends; if the number of forced segmentation is less than the second threshold, each currently segmented unit is matched with each target text HMM for scoring , respectively select the target text HMM corr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An identity authentication method is disclosed. The method comprises the following steps of acquiring a voice characteristic of an input voice, and matching the voice characteristic with a pre-stored target voiceprint model to acquire a voiceprint matching score; according to the voice characteristic and target text models, cutting the input voice, acquiring initial cutting units and a number of initial voice cutting units, and if the number of the initial voice cutting units is greater than or equal to a first threshold, compulsively cutting the initial cutting units so that a total number of the cutting units is equal to a number of preset target texts; matching the voice characteristic of each cutting unit with all the target text models to acquire a cutting unit text matching score of each cutting unit and each target text model; and according to the cutting unit text matching score, a voiceprint matching score and a pre-trained probability nerve network PNN classifier, carrying out identity authentication. In the scheme, a purpose of carrying out dual authentication on a user is realized, and safety, reliability and accuracy of a system are increased.

Description

technical field [0001] This article involves but is not limited to the technical field of biosafety dynamic authentication, especially a method and device for identity authentication. Background technique [0002] With the continuous development of Internet information technology, online business, e-commerce, etc. are becoming more and more prosperous, people are more and more closely connected with computer networks, and various network security threats are also coming. Protecting users' personal information has become an urgent problem that people need to solve . The dynamic voiceprint password recognition technology combines speaker recognition and voice recognition double identity authentication technology, which can effectively prevent recording attacks and greatly enhance the security of the system. Usually, after receiving the user's voice containing the password, the system first calculates the scores for the voiceprint and the dynamic password separately, and then ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G10L17/24G10L15/14G10L15/02H04L9/32
CPCG10L15/02G10L15/142G10L17/24H04L9/3226H04L9/3231G10L15/04G10L17/00
Inventor 朱长宝李欢欢袁浩王金明
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products