Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method fusing user multi-source sound production characteristics, storage medium and equipment

An identity authentication and user technology, applied in the field of radio frequency identification and voice authentication, can solve problems such as voice command replay attack, privacy leakage, fingerprint authentication infection risk, etc., to reduce storage and, high reliability, ensure daily use fluency effect

Active Publication Date: 2020-12-22
XI AN JIAOTONG UNIV
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the face of some special application scenarios, especially contagious public health events, fingerprint authentication will directly lead to the risk of infection; face authentication will affect the accuracy of authentication due to the user wearing a mask to cover the face, and there is still a problem of privacy leakage; although voice authentication can Avoid the above-mentioned similar problems, but when the user speaks, the voice command is easily recorded by the attacker and initiates a replay attack, and the cost of implementing a voice replay attack is low, and does not require highly specialized equipment and technical requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method fusing user multi-source sound production characteristics, storage medium and equipment
  • Identity authentication method fusing user multi-source sound production characteristics, storage medium and equipment
  • Identity authentication method fusing user multi-source sound production characteristics, storage medium and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041]The present invention provides an identity authentication method, storage medium and equipment that integrates the user's multi-source vocalization characteristics, comprehensively considers the advantages and disadvantages and characteristics of common authentication technologies, and uses radio frequency identification (RFID) signal physical layer information to perceive the user's mouth when uttering Motion features (first source, perceptual information source), use microphones to receive voice commands from users (second source, voice information source), and by designing a dual-branch neural network, the identity features are extracted from the multi-source information of the user’s voice at the same time. Achieve fusion authentication; by designing a dynamic random noise loading and recovery mechanism at the RF transceiver end, the security risk of RF sensing signals being replayed together with voice signals by attackers is eliminated. It not only has the availability i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method fusing user multi-source sound production characteristics, a storage medium and equipment. The method comprises the following steps: constructing a sensing terminal; designing a transceiving protection mechanism, adding dynamic random noise during signal transmission in a label communication process of an RFID reader-writer and the sensingterminal, eliminating the noise and recovering a label EPC during signal receiving, and judging whether a sensing signal is true or false; identifying a user voice command, and if the user voice command contains a keyword, determining to enter a next step or reject the request and end according to whether the sensing terminal tag EPC can be correctly recovered; performing noise reduction and voiced part detection on the voice signal, converting the voice signal into a time-frequency spectrogram, extracting radio frequency signal phase information and preprocessing the radio frequency signal phase information; and simultaneously inputting the processed voice and radio frequency sensing data into a neural network through two branches, and carrying out user identity authentication. Based on the realization of voice and radio frequency technologies, the system can be ensured to be safe and credible, and relatively high application value, social significance and development potential are achieved.

Description

Technical field[0001]The invention belongs to the technical field of radio frequency identification (RFID) and voice authentication, and in particular relates to an identity authentication method, storage medium and equipment that integrates the multi-source voice features of users.Background technique[0002]In real life, most access control systems use radio frequency identification cards to authenticate users. However, radio frequency identification is a non-user binding authentication method, and the card itself and the radio frequency signal face security risks such as loss, theft, tampering and duplication (replay). In recent years, fingerprint, face, and voice authentication technologies have been continuously developed and mature, and relying on better convenience and security, they have been adopted by more access control systems.[0003]However, in the face of certain special application scenarios, especially infectious public health events, fingerprint authentication will dir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G07C9/25G10L17/00G10L17/02G10L17/18G06N3/04G06N3/08G06K7/10
CPCG07C9/257G10L17/02G10L17/18G06N3/084G06K7/10029G06N3/045
Inventor 赵衰李镇江丁菡惠维王鸽赵季中
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products