Authentication method and device based on speech recognition

An authentication device and voice recognition technology, applied in the field of identity authentication, can solve the problems of stealing user's private information, counterfeiting, and low security of identity authentication methods, and achieve the effect of improving security

Inactive Publication Date: 2012-03-14
NEW H3C TECH CO LTD
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the security of the above identity authentication method is not high, because the authentication system cannot determine whether the sound received during identity authentication comes from the speaker himself or a pre-recorded sound sample; If the voice sample of the password is used, the user can be impersonated, and then the private information of the user can be stolen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device based on speech recognition
  • Authentication method and device based on speech recognition
  • Authentication method and device based on speech recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention proposes an authentication method based on speech recognition, such as figure 1 It is a flow chart of the voice recognition-based authentication method of the present invention, the method comprising:

[0023] Step 101: The authentication device saves multiple standard audio files corresponding to multiple passwords and multiple original audio files corresponding to the multiple passwords pre-recorded by the user;

[0024] Step 102: The authentication device receives the user's authentication request, randomly plays more than one standard audio file among the plurality of standard audio files, and requires the user to repeat the password corresponding to the played standard audio file;

[0025] Step 103: The authentication device receives the voice of the user repeating the password within a preset time and generates an authentication audio file, and judges whether the authentication audio file matches the original audio file corresponding to the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authentication method and device based on speech recognition. The method comprises steps as follows: an authentication device saves a plurality of standard audio files corresponding to a plurality of codes and a plurality of original audio files pre-recorded by a user corresponding to the codes; the authentication device receives an authentication request of the user, randomly plays more than one standard audio file in the standard audio files, and requires the user to repeat the codes corresponding to the played standard audio files; the authentication device receives the speech of the code repeated by the user within a preset time, generates an authentication audio file and judges whether the authentication audio file is matched with the original audio file of the corresponding code; and if so, the authentication of the user is successful. The invention can enhance the authentication security.

Description

technical field [0001] The invention relates to the technical field of identity authentication, in particular to an authentication method and equipment based on speech recognition. Background technique [0002] At present, there are already many ways of authenticating a user's identity, for example, authenticating a user's identity based on speech recognition. The main content of this authentication method is: pre-save the original audio file of reading the authentication password recorded by the user; when the user requests authentication, require the user to repeat the authentication password; receive the audio file of the user repeating the authentication password, and compare it with The pre-recorded original audio files are matched and verified, and if the two match successfully, the authentication of the user is passed. [0003] This authentication method can be applied in various fields, for example, in IP phones. Since the user of the IP phone can store some privat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04M7/00G10L15/00
Inventor 冯声威余昌刚马年磊罗光方新勇
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products