User verification method and device

A user authentication and user technology, applied in the field of cloud computing, can solve problems such as potential safety hazards, achieve reliable authentication and improve security

Inactive Publication Date: 2013-07-17
DAWNING INFORMATION IND BEIJING
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the problem of potential safety hazards in identity verification methods in related technologies, the present invention proposes a user verification method and device, which can quickly and reliably verify people's identities, thereby improving system security in the login process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User verification method and device
  • User verification method and device
  • User verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0040] According to an embodiment of the present invention, a user verification method is provided.

[0041] Such as figure 1 As shown, the user verification method according to the embodiment of the present invention includes:

[0042] Step S101, obtaining a feature vector according to the speech feature parameters extracted from the user's speech signal, wherein the speech feature parameters include linear predictive cepstral coefficients, pitch periods, differential linear predictive ceps...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user verification method and device. The method comprises the following steps of: acquiring characteristic vectors from voice characteristic parameters extracted from voice signals of a user, wherein the voice characteristic parameters comprise linear prediction cepstrum coefficients, pitch periods, differential linear prediction cepstrum coefficients and/or differential pitch periods; calculating an average quantization error according to a pre-stored codebook quantization characteristic vector corresponding to the user; and determining whether the user passes voice verification according to the difference between the average quantization error and the pre-stored average quantization error corresponding to the user. The method provided by the invention can determine whether the user passes voice verification so as to quickly and reliably verify the identity of the user by processing the voice characteristic parameters extracted from the voice signals of the user and comparing the processed information with the pre-stored information, thereby improving system security in a login step.

Description

technical field [0001] The present invention relates to the field of cloud computing, and in particular, to a user authentication method and system. Background technique [0002] With the vigorous development of cloud computing, it has brought convenience to all walks of life, but many industry sectors use cloud computing less due to the consideration of the environmental security of cloud computing, especially some financial institutions that have extremely high requirements for information security. mechanism. However, verifying the user's identity during the login link can ensure the security of the cloud computing environment. Therefore, how to control the security of the cloud computing environment during the login link has become the focus of attention. Commonly used identification methods in the login link include passwords, fingerprint identification, etc. However, the use of human voice for identification has attracted more and more attention because of its unique ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G10L17/00G10L15/00
Inventor 杨莉曹振南范玉峰张海忠高崎姜海旺高增许辉马庆怀
Owner DAWNING INFORMATION IND BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products