Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

33 results about "Random text" patented technology

Method for improving rejection capability of speech recognition system

ActiveCN103077708AEffective denialImprove the effect of rejectionSpeech recognitionFeature vectorFeature extraction
The invention relates to a method for improving rejection capability of a speech recognition system. The method comprises the following steps of collecting various types of noise data; classifying according to the noise types; for different types of noise, respectively training GMMs (Gauss mixed model); assembling various types of GMMs into an integral absorption model; training a statistic language model by various types of relatively random texts, and then establishing a recognition network by WFST (weighted finite state transducer) technique, which is called as an absorption network; connecting the absorption network, the absorption model and an original decoding network in parallel to form a new decoding network; enabling the input original audio frequency to pass endpoint detection and a feature extraction module, so as to generate feature vectors; and competing the feature vectors in the three parts of the decoding network according to an Viterbi algorithm, so as to generate a final recognition result, and effectively reject the noise and an out-of-vocabulary condition. The method has the advantage that on the premise of balancing the recognition efficiency, the effect of rejecting the out-of-vocabulary condition and the invalid input is well realized.
Owner:讯飞医疗科技股份有限公司

Document encrypting method and document decrypting method on basis of voice print

The invention relates to a document encrypting method on the basis of a voice print, which comprises the following steps that: (1) a user remembers a key; (2) the user says a sentence by voice randomly, and a key is extracted from characteristic parameters of the voice print of the voice as an encrypted key; (3) a symmetric encryption algorithm is selected, the key extracted in the step (2) is used to encrypt a document, an intermediate document is generated, a random text string in the step (2) and the intermediate document are packed together to generate a novel document; and (4) the key remembered by the user is used to encrypt the document in the step (3) to form an encrypted document. A voice print document decrypting method comprises the following steps that: (1) the selected symmetric encryption algorithm and the key remembered by the user are used to generate a temporary document; (2) a text string correlative with the encrypted key of the document is separated out from the temporary document and the user says the text string by voice and extracts a key from the characteristic parameters of the voice print of the voice; and (3) the temporary document is decrypted by the key extracted in the step (2) and the selected symmetric encryption algorithm to complete decrypting the document. The document encrypting method and the voice print document decrypting method provided by the invention are convenient to use and have high safety.
Owner:HANGZHOU DIANZI UNIV

Image identifying code achievement method based on text adhesion and visual compensation

InactiveCN105787340AResolve identifiabilitySolve problems that are easily recognized by machinesCharacter and pattern recognitionDigital data authenticationAlgorithmComputer vision
The invention relates to an image identifying code achievement method based on text adhesion and visual compensation.The image identifying code achievement method comprises the steps of identifying code and candidate code generation, identifying code input and identifying code identification.The step of identifying code and candidate code generation comprises the sub-steps that a server side generates candidate characters and correspondingly generates serial numbers S0; identifying characters are selected form the candidate characters, and the serial numbers S0 are correspondingly set; the identifying characters are randomly arranged, and the output positions of the identifying characters are set; the character sizes, character fonts, colors, shapes and image backgrounds and interference backgrounds of the identifying characters are set; image identifying codes for random text adhesion are formed by combining with the identifying characters, the image backgrounds and the interference backgrounds, each candidate code correspondingly generates an independent character image, and the character images are directly output to a web page to be identified and are combined with the identifying codes to serve as web page candidate codes.By the adoption of the image identifying code achievement method, the problem that identifying codes are not easily identified and cracked by machines automatically but are easily identified and input by users is solved.
Owner:XIAMEN UNIV TAN KAH KEE COLLEGE

Method for improving rejection capability of speech recognition system

ActiveCN103077708BImprove the effect of rejectionSolve the problem of denialSpeech recognitionFeature vectorFeature extraction
The invention relates to a method for improving rejection capability of a speech recognition system. The method comprises the following steps of collecting various types of noise data; classifying according to the noise types; for different types of noise, respectively training GMMs (Gauss mixed model); assembling various types of GMMs into an integral absorption model; training a statistic language model by various types of relatively random texts, and then establishing a recognition network by WFST (weighted finite state transducer) technique, which is called as an absorption network; connecting the absorption network, the absorption model and an original decoding network in parallel to form a new decoding network; enabling the input original audio frequency to pass endpoint detection and a feature extraction module, so as to generate feature vectors; and competing the feature vectors in the three parts of the decoding network according to an Viterbi algorithm, so as to generate a final recognition result, and effectively reject the noise and an out-of-vocabulary condition. The method has the advantage that on the premise of balancing the recognition efficiency, the effect of rejecting the out-of-vocabulary condition and the invalid input is well realized.
Owner:讯飞医疗科技股份有限公司

Document encrypting method and document decrypting method on basis of voice print

The invention relates to a document encrypting method on the basis of a voice print, which comprises the following steps that: (1) a user remembers a key; (2) the user says a sentence by voice randomly, and a key is extracted from characteristic parameters of the voice print of the voice as an encrypted key; (3) a symmetric encryption algorithm is selected, the key extracted in the step (2) is used to encrypt a document, an intermediate document is generated, a random text string in the step (2) and the intermediate document are packed together to generate a novel document; and (4) the key remembered by the user is used to encrypt the document in the step (3) to form an encrypted document. A voice print document decrypting method comprises the following steps that: (1) the selected symmetric encryption algorithm and the key remembered by the user are used to generate a temporary document; (2) a text string correlative with the encrypted key of the document is separated out from the temporary document and the user says the text string by voice and extracts a key from the characteristic parameters of the voice print of the voice; and (3) the temporary document is decrypted by the key extracted in the step (2) and the selected symmetric encryption algorithm to complete decrypting the document. The document encrypting method and the voice print document decrypting method provided by the invention are convenient to use and have high safety.
Owner:HANGZHOU DIANZI UNIV

Addressing random encryption method and system

The invention discloses an addressing random encryption method and system. The addressing random encryption method comprises the following steps: by an addressing terminal, acquiring equipment name information, geographic position longitude and latitude information, geographic position description information and annotation information of equipment; dividing the equipment name information, the geographic position longitude and latitude information, the geographic position description information and the annotation information into N groups of information, inserting random characters or numbersinto each group of information, splicing the respective groups of information, and encoding the spliced information; transmitting the edcoded information to a target node; and by the target node, decoding the received information, eliminating the random characters according to position where the random characters or the numbers are inserted, and restoring and splicing the equipment name information, the geographic position longitude and latitude information, the geographic position description information and the annotation information. The method has the beneficial effects that the name information, the geographic position longitude and latitude information, the geographic position description information and the annotation information are randomly encrypted before information transmission, so that the information leakage probability is reduced.
Owner:广东志远科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products