Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Identity authentication method, storage medium and device integrating user's multi-source voice characteristics

An identity authentication and user technology, applied in the field of radio frequency identification and voice authentication, can solve the problems of fingerprint authentication infection risk, voice command replay attack, affecting authentication accuracy, etc., achieve strong practicability and feasibility, resist illegal access, Highly Confidential Effects

Active Publication Date: 2021-07-13
XI AN JIAOTONG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the face of some special application scenarios, especially contagious public health events, fingerprint authentication will directly lead to the risk of infection; face authentication will affect the accuracy of authentication due to the user wearing a mask to cover the face, and there is still a problem of privacy leakage; although voice authentication can Avoid the above-mentioned similar problems, but when the user speaks, the voice command is easily recorded by the attacker and initiates a replay attack, and the cost of implementing a voice replay attack is low, and does not require highly specialized equipment and technical requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, storage medium and device integrating user's multi-source voice characteristics
  • Identity authentication method, storage medium and device integrating user's multi-source voice characteristics
  • Identity authentication method, storage medium and device integrating user's multi-source voice characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention provides an identity authentication method, storage medium and equipment that integrates the user's multi-source vocalization characteristics, comprehensively considers the advantages and disadvantages and characteristics of common authentication technologies, and utilizes radio frequency identification (RFID) signal physical layer information to sense the user's mouth when vocalizing Motion features (the first source, the source of perceptual information), use the microphone to receive the voice commands issued by the user (the second source, the source of voice information), and design a double-branch neural network to extract identity features from the multi-source information of the user's voice at the same time. Realize integrated authentication; by designing a dynamic random noise loading and recovery mechanism at the RF transceiver end, it eliminates the security risk that the RF sensing signal is replayed together with the voice signal by an ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method, storage medium and equipment that integrates the user's multi-source voice characteristics, and constructs a sensing end; designs a sending and receiving protection mechanism, and adds it when the signal is transmitted during the tag communication process between an RFID reader-writer and the sensing end. Dynamic random noise, eliminate the noise and restore the label EPC when receiving the signal, and judge the authenticity of the perceived signal; recognize the user's voice command, if it contains keywords, determine whether to enter the next step or reject the request and end according to whether the sensory end label EPC can be restored correctly ; Perform noise reduction and vocal part detection on the voice signal, convert it into a time-spectrogram and extract the phase information of the RF signal and preprocess it; input the processed voice and RF sensing data into the neural network through two branches at the same time for user authentication . The realization of the present invention based on voice and radio frequency technology can not only ensure the safety and reliability of the system, but also has strong application value, social significance and development potential.

Description

technical field [0001] The invention belongs to the technical field of radio frequency identification (RFID) and voice authentication, and in particular relates to an identity authentication method, a storage medium and a device that integrate user multi-source voice characteristics. Background technique [0002] In real life, most access control systems use radio frequency identification cards to authenticate users. However, as radio frequency identification is a non-user-binding authentication method, the card itself and the radio frequency signal face security risks such as loss, theft, tampering and copying (replay). In recent years, fingerprint, face and voice authentication technologies have been developed and matured, and have been adopted by more access control systems relying on better convenience and security. [0003] However, in the face of some special application scenarios, especially contagious public health events, fingerprint authentication will directly le...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G10L17/00
CPCG07C9/257G10L17/02G10L17/18G06N3/084G06K7/10029G06N3/045
Inventor 赵衰李镇江丁菡惠维王鸽赵季中
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products