Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Voice-print authentication device and method of authenticating people presence

A technology for authentication equipment and authentication methods, applied in speech analysis, speech recognition, instruments, etc., to achieve the effect of low price, high equipment penetration rate, and improved security

Inactive Publication Date: 2006-07-26
覃文华
View PDF0 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, similar to other authentication methods based on biometric features, voiceprint recognition also has some shortcomings, for example, it is difficult to judge whether a voice is provided by the user himself at the scene or a high-fidelity counterfeit recording, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice-print authentication device and method of authenticating people presence
  • Voice-print authentication device and method of authenticating people presence
  • Voice-print authentication device and method of authenticating people presence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The above and other objects, features and advantages of the present invention will become apparent from the following description taken in conjunction with the accompanying drawings of the present invention.

[0019] Voice is the most basic and convenient way of communication and transaction for human beings. The voice information generated by users using the authentication system can contain both user identity information and user personal wishes information. The present invention makes full use of the advantages of the voiceprint authentication technology, especially the text-independent voiceprint authentication technology, and at the same time combines the method of confirming the pronunciation status of a real person present to improve the overall security of the authentication equipment, and confirm the authenticity through the interactive authentication process. The pronunciation is in a state of clear consciousness.

[0020] figure 1 is a schematic diagram of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosed sound-groove identification device to validate whether the actual person present comprises: a voice input device to receive the user voice, a sound-groove identification device to compare the input voice and the model and validate user ID, a field identification device to compare the input imitative voice and random prompt voice selected from the prepared voice set and determine the actual person pronounces in place, and a decision device to decide whether user presents according to said results. This invention rejects the personator effectively and improves the security of sound-groove identification.

Description

technical field [0001] The invention relates to a voiceprint authentication device and method, in particular to a voiceprint authentication device and an authentication method for verifying the presence of a real person. Background technique [0002] With the progress of social economy and the development of information technology, people have more and more demands and dependence on information security and identity authentication technology. Traditional identity authentication methods are mainly based on passwords, which have the advantages of simplicity and speed, but have obvious shortcomings, for example, they are easy to be forgotten, guessed or stolen, etc. Once this happens, it is very difficult May cause great trouble or loss to the user. [0003] The root of the deficiency of the password verification method is that it has no internal connection with the holder itself. If any other person obtains and tries to authenticate with the person's password, the system will...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G10L17/00G10L15/00G10L15/08
Inventor 覃文华宋战江张玉霞
Owner 覃文华
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products