Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for identity authentication

A technology of identity authentication and target text, applied in the field of biosafety dynamic authentication, can solve problems such as inaccuracy

Active Publication Date: 2019-11-08
ZTE CORP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical applications, due to the influence of the environment, the distribution of the speaker's voiceprint matching score and the distribution of the text matching score are often different, and it is inaccurate to judge only by pre-set thresholds.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identity authentication
  • Method and device for identity authentication
  • Method and device for identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0097] Such as image 3 shown, including the following steps:

[0098] Step 101, preprocessing: preprocessing the test speech input by the user according to the short-term energy and short-term zero-crossing rate, removing non-speech segments in the speech;

[0099] Step 102, feature parameter extraction: perform feature parameter extraction on the preprocessed test speech, the system can use 12-dimensional Mel Frequency Cepstrum Coefficient (Mel Frequency Cepstrum Coefficient, referred to as MFCC) and its first-order difference coefficient as feature parameters , a total of 24 dimensions;

[0100] Step 103, calculating the voiceprint matching score: matching the test speech features with the voiceprint model of the target speaker to obtain the voiceprint matching score;

[0101] Step 104: Initial segmentation of speech features: through initial segmentation of test speech features, initial segmentation units and the number of initial segmentation units are obtained.

[010...

Embodiment 2

[0141] For the initial segmentation of speech features in step 104 in the first embodiment, the determination of the number of segmentation units in step 105, and the mandatory segmentation in step 106, the following methods are used in the present embodiment to perform segmentation and determination:

[0142] Step 201, voice signal initial segmentation;

[0143] In this embodiment, splitting is started according to the order of the length of the initial segmentation unit from large to small, and each initial segmentation unit is divided into two segments on average until the total number of segmentation units is equal to up to the number of the target text;

[0144] If the number of forced segmentation is greater than or equal to the second threshold, the forced segmentation ends; if the number of forced segmentation is less than the second threshold, each currently segmented unit is matched with each target text HMM for scoring , respectively select the target text HMM corr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An identity authentication method, comprising: acquiring a voice characteristic of an input voice, and matching the voice characteristic to a pre-stored target voiceprint model, obtaining a voiceprint match score (11); segmenting the input voice according to the voice characteristic and a target text model, and acquiring a number of initial segmentation units and initial voice segmentation units (12) - if the number of initial voice segmentation units is greater than or equal to a first threshold, performing forced segmentation on the initial segmentation units, causing the total number of segmentation units to be equal to the number in a preset target text; matching the voice characteristic of each segmentation unit with every target text model, obtaining a segmentation unit text match score for each segmentation unit and each target text model (13); performing identity authentication according to the segmentation unit text match scores, voiceprint match scores and a pre-trained probabilistic neural network (PNN) classifier (14). The present method realizes the goal of two-factor authentication of a user, increasing system security.

Description

technical field [0001] This article involves but is not limited to the technical field of biosafety dynamic authentication, especially a method and device for identity authentication. Background technique [0002] With the continuous development of Internet information technology, online business, e-commerce, etc. are becoming more and more prosperous, people are more and more closely connected with computer networks, and various network security threats are also coming. Protecting users' personal information has become an urgent problem that people need to solve . The dynamic voiceprint password recognition technology combines speaker recognition and voice recognition double identity authentication technology, which can effectively prevent recording attacks and greatly enhance the security of the system. Usually, after receiving the user's voice containing the password, the system first calculates the scores for the voiceprint and the dynamic password separately, and then ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G10L17/24G10L15/14G10L15/02H04L9/32
CPCG10L15/02G10L15/142G10L17/24H04L9/3226H04L9/3231G10L15/04G10L17/00
Inventor 朱长宝李欢欢袁浩王金明
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products