Unlock instant, AI-driven research and patent intelligence for your innovation.

Recognition method and system based on dual voice signal verification, terminal and medium

A voice signal and recognition method technology, applied in the field of network security, can solve the problems of the speech recognition verification success rate needs to be further improved, the loss of voice recognition verification success, etc., to achieve the effect of security monitoring and enhancement of the success rate

Pending Publication Date: 2022-05-27
CHONGQING UNIVERSITY OF SCIENCE AND TECHNOLOGY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the above speech recognition verification method still has the following defects: on the one hand, it is affected by the interference of the verifier's pronunciation ability, which leads to further improvement in the success rate of speech recognition verification; on the other hand, there are various ways to pass the verification. After the third party understands the relevant information of any of the other verification methods, it can still complete the verification directly when the voice recognition verification fails, and after the data is updated in the registration database in the way of verification failure, it is easy to cause the original valid voice verification. The party and the verifier after eliminating the interference factors lose the possibility of successful speech recognition verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Recognition method and system based on dual voice signal verification, terminal and medium
  • Recognition method and system based on dual voice signal verification, terminal and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] Embodiment 1: Identification method based on double voice signal verification, such as figure 1 shown, including the following steps:

[0040]S1: Match and analyze the real-time voice data after preprocessing with the registered voice data in the registration database; if the similarity between the real-time voice data and the registered voice data is not less than the set threshold, the first-time matching verification is successful; if the real-time voice data is not less than the set threshold If the similarity with the registered voice data is less than the set threshold, then generate an information window for the user to input information;

[0041] S2: Obtain at least one influence factor information of the user's subjective cognition through the information window, and retrieve the corresponding trained voice characteristic correction parameters from the training database according to all the influence factor information;

[0042] S3: correcting the voice charac...

Embodiment 2

[0051] Embodiment 2: Recognition system based on double voice signal verification, such as figure 2 As shown, the system is used to implement the method described in Embodiment 1, and includes a first verification module, a parameter retrieval module, a data correction module, a second verification module and a non-voice verification module.

[0052] Among them, the first verification module is used for matching and analyzing the real-time voice data after preprocessing with the registered voice data in the registered database; if the similarity between the real-time voice data and the registered voice data is not less than the set threshold, then a matching The verification is successful; if the similarity between the real-time voice data and the registered voice data is less than the set threshold, an information window for the user to input information is generated. The parameter retrieval module is used to obtain at least one influence factor information of the user's sub...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a recognition method and system based on dual voice signal verification, a terminal and a medium, and relates to the technical field of network security, and the key points of the technical scheme are as follows: real-time voice data are preprocessed and then matched and analyzed with registered voice data in a registered database; if the similarity is smaller than a set threshold value, influence factor information is acquired through an information window, and corresponding trained voice characteristic correction parameters are called; performing correction processing on voice characteristics in the real-time voice data according to the voice characteristic correction parameter to obtain verification voice data; performing secondary matching verification on the verification voice data and the registered voice data; if the similarity is smaller than a set threshold value, randomly forming a non-voice verification mode by taking the similarity of the verification voice data as a random number; and performing final verification in a non-voice verification mode. According to the invention, the success rate of voice recognition verification can be effectively enhanced, and the verification passing rate after a third party obtains a non-voice verification mode is reduced.

Description

technical field [0001] The present invention relates to the technical field of network security, and more particularly, to an identification method, system, terminal and medium based on dual voice signal verification. Background technique [0002] With the continuous development of intelligent technology and network technology, the security of network information has always been the focus of attention. For the security of network information transmission, encryption algorithms or anti-interference technology are generally used to ensure the security of information transmission. The security of information in network nodes, such as smart device terminals, is generally granted to users by means of network security verification. On the one hand, the scope of use of shared terminal equipment can be managed to prevent misoperations; , which can effectively prevent the leakage of network information. [0003] For the purpose, the network verification of the smart device terminal ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G10L17/08G10L17/02G10L17/18H04L9/40G06F16/215
CPCG10L17/08G10L17/02G10L17/18H04L63/083H04L63/0838H04L63/0861H04L63/0876G06F16/215H04L2463/082
Inventor 赖军辉陈国荣何兰
Owner CHONGQING UNIVERSITY OF SCIENCE AND TECHNOLOGY