Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

33 results about "Random text" patented technology

Method for improving rejection capability of speech recognition system

ActiveCN103077708AEffective denialImprove the effect of rejectionSpeech recognitionFeature vectorFeature extraction
The invention relates to a method for improving rejection capability of a speech recognition system. The method comprises the following steps of collecting various types of noise data; classifying according to the noise types; for different types of noise, respectively training GMMs (Gauss mixed model); assembling various types of GMMs into an integral absorption model; training a statistic language model by various types of relatively random texts, and then establishing a recognition network by WFST (weighted finite state transducer) technique, which is called as an absorption network; connecting the absorption network, the absorption model and an original decoding network in parallel to form a new decoding network; enabling the input original audio frequency to pass endpoint detection and a feature extraction module, so as to generate feature vectors; and competing the feature vectors in the three parts of the decoding network according to an Viterbi algorithm, so as to generate a final recognition result, and effectively reject the noise and an out-of-vocabulary condition. The method has the advantage that on the premise of balancing the recognition efficiency, the effect of rejecting the out-of-vocabulary condition and the invalid input is well realized.
Owner:讯飞医疗科技股份有限公司

Document encrypting method and document decrypting method on basis of voice print

The invention relates to a document encrypting method on the basis of a voice print, which comprises the following steps that: (1) a user remembers a key; (2) the user says a sentence by voice randomly, and a key is extracted from characteristic parameters of the voice print of the voice as an encrypted key; (3) a symmetric encryption algorithm is selected, the key extracted in the step (2) is used to encrypt a document, an intermediate document is generated, a random text string in the step (2) and the intermediate document are packed together to generate a novel document; and (4) the key remembered by the user is used to encrypt the document in the step (3) to form an encrypted document. A voice print document decrypting method comprises the following steps that: (1) the selected symmetric encryption algorithm and the key remembered by the user are used to generate a temporary document; (2) a text string correlative with the encrypted key of the document is separated out from the temporary document and the user says the text string by voice and extracts a key from the characteristic parameters of the voice print of the voice; and (3) the temporary document is decrypted by the key extracted in the step (2) and the selected symmetric encryption algorithm to complete decrypting the document. The document encrypting method and the voice print document decrypting method provided by the invention are convenient to use and have high safety.
Owner:HANGZHOU DIANZI UNIV

Image identifying code achievement method based on text adhesion and visual compensation

InactiveCN105787340AResolve identifiabilitySolve problems that are easily recognized by machinesCharacter and pattern recognitionDigital data authenticationAlgorithmComputer vision
The invention relates to an image identifying code achievement method based on text adhesion and visual compensation.The image identifying code achievement method comprises the steps of identifying code and candidate code generation, identifying code input and identifying code identification.The step of identifying code and candidate code generation comprises the sub-steps that a server side generates candidate characters and correspondingly generates serial numbers S0; identifying characters are selected form the candidate characters, and the serial numbers S0 are correspondingly set; the identifying characters are randomly arranged, and the output positions of the identifying characters are set; the character sizes, character fonts, colors, shapes and image backgrounds and interference backgrounds of the identifying characters are set; image identifying codes for random text adhesion are formed by combining with the identifying characters, the image backgrounds and the interference backgrounds, each candidate code correspondingly generates an independent character image, and the character images are directly output to a web page to be identified and are combined with the identifying codes to serve as web page candidate codes.By the adoption of the image identifying code achievement method, the problem that identifying codes are not easily identified and cracked by machines automatically but are easily identified and input by users is solved.
Owner:XIAMEN UNIV TAN KAH KEE COLLEGE

Secure login method and apparatus

The present invention discloses a secure login method. The method comprises: obtaining first voice data generated by a user by reading a preset feature text, and determining a voiceprint feature of the first voice data; obtaining second voice data generated by a user by reading a random text, and determining the voiceprint feature of the second voice data; and determining the matching degree of the voiceprint feature of the first voice data with the voiceprint feature of the second voice data, and when he matching degree is greater than the preset matching degree threshold, allowing the user to login. The present invention also discloses a secure login apparatus.
Owner:ZTE CORP

Apparatus and method for inspecting speech recognition

ActiveUS20200013388A1Addressing failurePrecise and broad verificationSpeech recognitionSpeech synthesisSpoken languageSpeech recognition performance
Disclosed are a speech recognition verification device and a speech recognition verification method, which verify speech recognition results by executing artificial intelligence (AI) algorithms and / or machine learning algorithms in a 5G environment connected for Internet-of-Things. According to an embodiment, the speech recognition verification method includes converting a verification target text item to a verification target spoken utterance by applying a preset utterance condition, analyzing the verification target spoken utterance and outputting a recognition result text item corresponding to an analysis result, and verifying speech recognition performance through comparison between the verification target text item and the recognition result text item. According to the present disclosure, the speech recognition result may be verified objectively by using a spoken utterance generated with random text and various utterance conditions as input of speech recognition.
Owner:LG ELECTRONICS INC

Using finite state grammars to vary output generated by a text-to-speech system

InactiveUS20080312929A1Speech synthesisFinite state grammarText string
The present invention discloses a text-to-speech system that provides output variability. The system can include a finite state grammar, a variability engine and a text-to-speech engine. The finite state grammar can contain a phrase role consisting of one or more phrase elements. The phrase rule can deterministically generate a variable text phrase based upon at least one random number. The phrase rule can include a definition for each of the phrase elements. Each definition can be associated with at least one defined text string. The variability engine can construct a random text phrase responsive to receiving an action command, wherein said finite state grammar is used to create the text phrase. The variability engine can also rely on user-specified weights to adjust the output probabilities. The speech-to-text engine can convert the text phrase generated by the variability engine into speech output.
Owner:NUANCE COMM INC

Validating compressed archive keys

An apparatus and a method for validating compressed encrypted archive keys is described. In one embodiment, a pseudo-stream is generated for an archive. The pseudo-stream is made of a small amount of random text. The pseudo-stream is attached to a stream of the archive. The pseudo-stream and stream are compressed using the compression algorithm that includes validation data. The compressed pseudo-stream is then enciphered with an archive key.
Owner:RED HAT

Method for improving rejection capability of speech recognition system

ActiveCN103077708BImprove the effect of rejectionSolve the problem of denialSpeech recognitionFeature vectorFeature extraction
The invention relates to a method for improving rejection capability of a speech recognition system. The method comprises the following steps of collecting various types of noise data; classifying according to the noise types; for different types of noise, respectively training GMMs (Gauss mixed model); assembling various types of GMMs into an integral absorption model; training a statistic language model by various types of relatively random texts, and then establishing a recognition network by WFST (weighted finite state transducer) technique, which is called as an absorption network; connecting the absorption network, the absorption model and an original decoding network in parallel to form a new decoding network; enabling the input original audio frequency to pass endpoint detection and a feature extraction module, so as to generate feature vectors; and competing the feature vectors in the three parts of the decoding network according to an Viterbi algorithm, so as to generate a final recognition result, and effectively reject the noise and an out-of-vocabulary condition. The method has the advantage that on the premise of balancing the recognition efficiency, the effect of rejecting the out-of-vocabulary condition and the invalid input is well realized.
Owner:讯飞医疗科技股份有限公司

Document encrypting method and document decrypting method on basis of voice print

The invention relates to a document encrypting method on the basis of a voice print, which comprises the following steps that: (1) a user remembers a key; (2) the user says a sentence by voice randomly, and a key is extracted from characteristic parameters of the voice print of the voice as an encrypted key; (3) a symmetric encryption algorithm is selected, the key extracted in the step (2) is used to encrypt a document, an intermediate document is generated, a random text string in the step (2) and the intermediate document are packed together to generate a novel document; and (4) the key remembered by the user is used to encrypt the document in the step (3) to form an encrypted document. A voice print document decrypting method comprises the following steps that: (1) the selected symmetric encryption algorithm and the key remembered by the user are used to generate a temporary document; (2) a text string correlative with the encrypted key of the document is separated out from the temporary document and the user says the text string by voice and extracts a key from the characteristic parameters of the voice print of the voice; and (3) the temporary document is decrypted by the key extracted in the step (2) and the selected symmetric encryption algorithm to complete decrypting the document. The document encrypting method and the voice print document decrypting method provided by the invention are convenient to use and have high safety.
Owner:HANGZHOU DIANZI UNIV

Addressing random encryption method and system

The invention discloses an addressing random encryption method and system. The addressing random encryption method comprises the following steps: by an addressing terminal, acquiring equipment name information, geographic position longitude and latitude information, geographic position description information and annotation information of equipment; dividing the equipment name information, the geographic position longitude and latitude information, the geographic position description information and the annotation information into N groups of information, inserting random characters or numbersinto each group of information, splicing the respective groups of information, and encoding the spliced information; transmitting the edcoded information to a target node; and by the target node, decoding the received information, eliminating the random characters according to position where the random characters or the numbers are inserted, and restoring and splicing the equipment name information, the geographic position longitude and latitude information, the geographic position description information and the annotation information. The method has the beneficial effects that the name information, the geographic position longitude and latitude information, the geographic position description information and the annotation information are randomly encrypted before information transmission, so that the information leakage probability is reduced.
Owner:广东志远科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products