Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Voiceprint authentication method and system for privacy protection and mobile terminal

A privacy protection and authentication system technology, applied in the field of mobile terminals, privacy protection voiceprint authentication methods and systems, can solve the problems of user privacy leakage, unencrypted voiceprint models, ill-considered, etc., to improve privacy and security. security, data leakage prevention, and low leakage loss

Active Publication Date: 2019-05-24
陕西嵩远明瑞信息技术有限公司
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the lack of consideration of the designer in this method, there is a problem that the voiceprint model is not encrypted, and the privacy of user data is not protected.
Once the voiceprint model is stolen, not only the user's privacy will be leaked, but the attacker can also pretend to be the user for authentication, which will cause great harm
[0003] To sum up, the problems existing in the existing technology are: the existing voiceprint authentication method cannot balance authentication accuracy with communication overhead and time overhead, and user data is not encrypted; in the application, user privacy will be leaked, and it is easy to be compromised. Forged voiceprint attacks and high error rate or high communication overhead
[0004] The difficulty and significance of solving the above technical problems: the traditional voiceprint authentication technology does not have an encryption module. Once the system is attacked, it is easy to leak user privacy. At the same time, the attacker can also pretend to be the user for authentication, which greatly increases the system risk.
However, homomorphic encryption technology will bring large communication overhead and calculation time, and the technology used cannot meet the requirements of voiceprint authentication. High accuracy requires fast authentication.
Therefore, there is a need for a new encryption method with high efficiency and privacy protection for voiceprint authentication, which can realize the protection of user privacy data without affecting the efficiency and accuracy of voiceprint authentication, even if the data is stolen, it cannot be used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voiceprint authentication method and system for privacy protection and mobile terminal
  • Voiceprint authentication method and system for privacy protection and mobile terminal
  • Voiceprint authentication method and system for privacy protection and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0068] The invention realizes the privacy protection of the data resources; encrypts the data before transmission, and maintains the encrypted state during the data processing, greatly improves the privacy and security of the data, prevents the data leakage of the server, and reduces the leakage loss. drop to lowest.

[0069] The application principle of the present invention will be described in detail below with reference to the accompanying drawings.

[0070] like figure 1 As shown, the voiceprint authentication system for privacy protection provided by the embodiment of the present invention includes:

[007...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of information security, and discloses a voiceprint authentication method and system for privacy protection and mobile terminal. During registration, the client collects user voice information and identity information, extracts a voiceprint feature vector, combines the encrypted feature vector and the identity information into a registered user template, and sends the registered user template to the server; The server stores the registered user template to complete registration; During login authentication, a client collects user voice information and identity information, and authentication i-is adopted; an authentication i- vector encryption algorithm is adopted to encrypt the feature vector, combines the encrypted feature vector and the identity information into an authentication user template, and sends the authentication user template to the server. And the server compares and calculates the authenticated user template and the registered user template to obtain an authentication result and returns the authentication result to the client. According to the invention, user data privacy protection in voiceprint authentication is realized under the condition that the voiceprint authentication efficiency is not influenced, and the method can be used for providing a privacy-efficient voiceprint login authentication system for a user inactual life.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a voiceprint authentication method and system for privacy protection, and a mobile terminal. Background technique [0002] At present, the commonly used existing technologies in the industry are as follows: At present, the commonly used existing technologies in the industry are as follows: With the increasing development of information technology and artificial intelligence, biometric-based identity authentication is the main development of identity authentication now and in the future direction. Due to its advantages of low cost, non-contact, remote and easy implementation, voiceprint authentication has an increasing status in identity authentication. However, there are many security threats to the voiceprint authentication system. In particular: once the attacker obtains the voiceprint template data of the users stored in the database by the service p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08G10L17/02
Inventor 朱辉李祁李晖寇笑语徐奇董健
Owner 陕西嵩远明瑞信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products