WO2020006886A1 - Procédé et dispositif d'identification pour système de contrôle d'accès, système de contrôle d'accès et support d'informations - Google Patents
Procédé et dispositif d'identification pour système de contrôle d'accès, système de contrôle d'accès et support d'informations Download PDFInfo
- Publication number
- WO2020006886A1 WO2020006886A1 PCT/CN2018/106772 CN2018106772W WO2020006886A1 WO 2020006886 A1 WO2020006886 A1 WO 2020006886A1 CN 2018106772 W CN2018106772 W CN 2018106772W WO 2020006886 A1 WO2020006886 A1 WO 2020006886A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- voiceprint
- voiceprint information
- access control
- control system
- random code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/06—Decision making techniques; Pattern matching strategies
- G10L17/08—Use of distortion metrics or a particular distance between probe pattern and reference templates
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/06—Decision making techniques; Pattern matching strategies
- G10L17/14—Use of phonemic categorisation or speech recognition prior to speaker recognition or verification
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/22—Interactive procedures; Man-machine interfaces
Definitions
- the present application relates to the field of voiceprint recognition, and in particular, to a method, a device, an access control system, and a computer-readable storage medium for identifying an access control system.
- the main purpose of this application is to provide an identification method, device, access control system, and computer-readable storage medium for an access control system, which aims to solve the problem of inconvenient access identification of the current access control system.
- an identification device for an access control system including:
- a judging module configured to judge whether the mapped random code is consistent with the random code displayed by the access control system
- a comparison module configured to perform a voiceprint comparison between the voiceprint information and the found voiceprint template to determine whether the user and the owner of the voiceprint template are consistent;
- the present application also provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the identification method of the access control system as described above is implemented. A step of.
- This application obtains the voiceprint information sent by the user, and then converts the voiceprint information into corresponding text data including a mapping random code and a mapping fixed code; after excluding the voiceprint information sent by the user as the machine voice by mapping the random code , Use the mapping fixed code to find a single or a few voiceprint templates in the preset mapping data to determine whether the user is consistent with the owner of one of the voiceprint templates; when the user is consistent with the owner of one of the voiceprint templates To confirm that the access control system has been identified. Therefore, the entry and exit recognition control of the access control system is realized by the entry of voiceprint information, and the operation is convenient.
- mapping random code is consistent with the random code displayed by the access control system, it can prevent criminals from using the recorded machine voice to identify the access control system; it also finds the corresponding correspondence from the preset mapping data by mapping the fixed code.
- the few or single voiceprint templates also reduce the scope of voiceprint comparison and speed up the speed and accuracy of the access control system recognition.
- FIG. 1 is a schematic structural diagram of an access control system according to an embodiment of the present application.
- step S50 is a detailed flowchart of step S50 in the second embodiment of the identification method of the access control system of the present application.
- FIG. 5 is a schematic flowchart of a fourth embodiment of a method for identifying an access control system of this application.
- FIG. 6 is a functional module diagram of the identification device of the access control system of the present application.
- FIG. 1 is a schematic diagram of a hardware structure of an access control system provided by the present application.
- the access control system may include components such as a display module 10, a memory 20, and a processor 30.
- the processor 30 is connected to the memory 20 and the display module 10, respectively.
- a computer program is stored in the memory 20, and the computer program is executed by the processor 30 at the same time.
- the display module 10 is a display component of the access control system, and may be a capacitive screen component or a resistive screen component and the like.
- the display module 10 may extract data from the memory 20 and display the data as an image or a character string.
- the character string may be a random code or a prompt character for pass / fail recognition by the access control system.
- the character string may be composed of letters, Numbers and / or Chinese characters.
- Memory 20 which can be used to store software programs and various data, can be an SD card (Secure Digital Memory Card, secure digital card), memory modules, and more.
- the memory 20 may mainly include a storage program area and a storage data area, where the storage program area may store an operating system, at least one application required by a function (such as obtaining voiceprint information), and the like; the storage data area may include a database to store data Zones can store data or information created based on the use of the access control system.
- the memory 20 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
- the processor 30 is the control center of the access control system. It uses various interfaces and lines to connect various parts of the entire access control system, and runs or executes software programs and / or modules stored in the memory 20 and calls the Data, perform various functions of the access control system and process data, so as to monitor the access control system as a whole.
- the processor 30 may include one or more processing units; optionally, the processor 30 may integrate an application processor and a modem processor, wherein the application processor mainly processes an operating system, a user interface, and an application program, etc.
- the tuning processor mainly handles wireless communication. It can be understood that the aforementioned modem processor may not be integrated into the processor 30.
- the above access control system may further include a circuit control module for connecting to a power source to ensure normal work of other components.
- the above access control system may further include a communication module.
- the communication module may not be turned on during the normal use of the access control system. Only when the administrator permission of the access control system is turned on, the voice database of the local criminal can be updated and new voices recorded. Pattern template and / or firmware upgrade; the communication module may also start and send early warning information to when the similarity between the voiceprint information and any special voiceprint template in the voiceprint database of the local criminal is greater than a first preset threshold Supervisor terminal.
- the above access control system may further include a microphone array, and the microphone array may be disposed near the display module and used to receive voice information entered by a user.
- the method includes:
- Step S10 Acquire voiceprint information issued by the user
- the acquisition of voiceprint information is the premise of voiceprint recognition. After obtaining the voice information from the user through the microphone array, it uses electroacoustic instruments to extract the sound wave spectrum carrying speech information from the voice information as voiceprint information. .
- step S10 It is detected by infrared whether there is a user in the area where the access control system is located; and when the infrared detects that a user is present in the area where the access control system is located, step S10 is performed.
- infrared human body sensing technology is used, which can use an infrared sensor to emit an infrared beam. When the infrared beam is blocked due to the passage of a person, it can be determined that someone is in front of the access control detection system.
- an infrared thermal imaging sensor can also be used to determine a person near the access control detection system when a person passes by and generates a specific infrared band signal due to human thermal radiation.
- the infrared array detects the presence of a user in the area of the access control system and triggers the microphone array of the access control system to acquire voiceprint information, which can reduce the working time of the microphone array and reduce the loss of the voiceprint recognition device of the access control system.
- Step S20 converting the voiceprint information into corresponding text data including a mapping random code and a mapping fixed code
- the processor of the access control system is mainly through ASR (Automatic Speech Recognition (automatic speech recognition technology) converts voiceprint information into text data, where the text data includes a mapping random code and a mapping fixed code. If the text data corresponding to the voiceprint information entered by the user includes only a mapping fixed code or a mapping random code, the identification of the access control system fails.
- ASR Automatic Speech Recognition
- the process of obtaining text data based on ASR technology is: converting the voiceprint information from the original non-stationary state to a stationary short-term voice signal, that is, frame, where each short-term voice signal period is called a frame; The short-term speech signal is then transformed into a multi-dimensional vector to form a feature vector sequence.
- text data is obtained through analysis and transformation of phonemes and states based on a preset model.
- the preset model can be a hidden Markov model and an artificial neural network. Wait.
- voiceprint information can also be pre-processed, such as mute cutting of voiceprint information at the end and end to reduce interference to subsequent steps. It should also be noted that the formation of feature vector sequences by extracting feature parameters needs to accurately and clearly express the information carried by the voiceprint, such as channel characteristics and auditory characteristics; feature parameters need to be independent and easy to calculate.
- the usage scenario of the access control system may be that the user walks into the infrared-detectable range, the microphone array starts to detect the user's sound, and the display module will randomly display a random code.
- the random code is a two-digit number as an example.
- the user will read the two digits displayed by the display module and say a fixed code that can confirm the identity of the user.
- the processor extracts the voiceprint information in the voice information, and then converts the voiceprint information into text data including mapped random codes and mapped fixed codes based on ASR technology.
- the fixed code is set based on the area to which different users actually belong, or is set based on different users.
- the fixed code corresponding to user A is AABB
- the fixed code corresponding to user B is ABCD
- the fixed code corresponding to user C is ABAB
- the fixed code corresponding to user D may be AABB. That is to say, the fixed code set based on different users can also be in a one-to-one or one-to-many relationship with the user, and can be set by referring to the remaining memory capacity of the memory or the requirements of the administrator.
- Step S30 Determine whether the mapped random code is consistent with the random code displayed by the access control system; if so, perform step S40;
- the mapped random code is converted by the user based on the voiceprint information displayed by the random code displayed on the display module, if the mapped random code is consistent with the random code displayed by the access control system at that time, it means that the user is not a machine voice, and the fixed code is indeed Read by the user according to the displayed random code.
- the setting of fixed code reading and comparison rules is mainly due to criminals recording and playing the user's voice information to wait for the opportunity to pass the access control system based on voiceprint recognition, and it is precisely because of the timeliness of random codes that they can It is guaranteed that the random code entered by the criminals in advance is not consistent with the random code displayed by the display module when waiting for the opportunity to pass through the access control system, reducing the entry of criminals, thereby improving the security of the access control system.
- time interval at which the display module of the access control system updates the random code can be set according to actual needs, for example, it is updated every 5 seconds.
- step S30 When the determination result of step S30 is "No", the access control system recognizes an error, and may send an error reminder to the user through the display module, and may also remind the user to re-enter the sound. Further, when the number of errors reaches a certain limit, the fixed code spoken by the user can be frozen, and the communication module can be triggered to seek further confirmation from the administrator.
- Step S40 using the mapping fixed code as a keyword, searching for a voiceprint template corresponding to the mapping fixed code from preset mapping data between the fixed code and the voiceprint template;
- the determination process is to preset the preset mapping data between the fixed code and the voiceprint template in the memory, and find the voiceprint template corresponding to the mapping fixed code in the preset mapping data by mapping the fixed code. It can be understood that, according to the setting of the corresponding relationship between different fixed codes and users, a voiceprint template corresponding to one mapped fixed code may be a few or one.
- Step S50 Perform a voiceprint comparison between the voiceprint information and the found voiceprint template to determine whether the user and the owner of the voiceprint template are consistent; if so, perform step S60;
- step S60 it is determined that the identification of the access control system passes.
- the similarity between the voiceprint information and the found voiceprint template may be calculated, and then it is determined whether the similarity is greater than a first preset threshold. If the similarity is greater than the first preset threshold, It is considered that the user corresponds to the owner corresponding to the found voiceprint template.
- voiceprint information sent by a user is obtained; the voiceprint information is converted into corresponding text data including a mapping random code and a mapping fixed code; and whether the mapped random code and the random code displayed by the access control system are determined. Consistent; when the mapped random code is consistent with the random code, using the mapped fixed code as a key, from the preset mapping data between the fixed code and the voiceprint template, find the sound corresponding to the mapped fixed code Compare the voiceprint information with the found voiceprint template to determine whether the user is the same as the owner of the voiceprint template; when the user is the owner of the voiceprint template When they are consistent, it is determined that the identification of the access control system passes.
- mapping random code is consistent with the random code displayed by the access control system, it can prevent criminals from using the recorded machine voice to identify the access control system; it also finds the corresponding correspondence from the preset mapping data by mapping the fixed code.
- the few or single voiceprint templates reduce the range of voiceprint comparison and speed up the speed and accuracy of the access control system recognition.
- the mapping relationship data is set in the memory of the access control system in advance, and fast voiceprint comparison can be performed without networking, which further improves the recognition speed.
- the step S50 when the voiceprint template found is greater than When equal to two, the step S50 includes:
- Step S51 Calculate the similarity between each voiceprint template and the voiceprint information
- mapping fixed code corresponds to multiple voiceprint templates
- the similarity between the voiceprint information and the voiceprint information needs to be calculated one by one to determine which of the multiple voiceprint templates is related to the user's Voiceprint information has the highest similarity.
- Step S52 Select the voiceprint template with the highest similarity to the voiceprint information from all the voiceprint templates as a reference voiceprint template;
- Step S53 Determine whether the similarity between the reference voiceprint template and the voiceprint information is greater than a first preset threshold, and when the similarity between the reference voiceprint template and the voiceprint information is greater than the When the first preset threshold value is determined, the user is consistent with the owner of the reference voiceprint template.
- the most similar voiceprint template and the similarity between the voiceprint template and the voiceprint information may be individually extracted as a reference, and the similarity between the reference voiceprint template and the voiceprint information may be compared with a first preset threshold, Only when the similarity is greater than the first preset threshold, it is determined that the user is consistent with the owner of the reference voiceprint template.
- the voiceprint information of some users has high similarity, but the users corresponding to the voiceprint information are not the same person. Therefore, it is necessary to set a first preset threshold to exclude users from corresponding to the reference voiceprint template.
- the voiceprint information between the attributors has a high degree of similarity, but the user and the attributor are not the same person.
- This solution provides an optional implementation of how to determine whether the user's identity is successfully identified based on multiple voiceprint templates corresponding to the mapping fixed code, which increases the utilization of the mapping fixed code and ensures the accuracy of the access control system identification.
- the method further includes:
- Step S71 intercept the first voiceprint information corresponding to the mapping random code and the second voiceprint information corresponding to the mapping fixed code from the voiceprint information;
- the identification by the access control system is opportunistic, and the voiceprint information sent by the user can be intercepted.
- the first voiceprint information corresponding to the random code and the second voiceprint information corresponding to the fixed code are mapped, and the similarity between the first voiceprint information and the second voiceprint information is compared.
- Step S72 calculating a similarity between the first voiceprint information and the second voiceprint information
- step S73 it is determined whether the similarity between the first voiceprint information and the second voiceprint information is greater than a second preset threshold; if yes, step S30 is performed; if not, step S80 is performed;
- the similarity between the first voiceprint information corresponding to the mapped random code and the second voiceprint information corresponding to the fixed mapping code is issued, only when the similarity between the first voiceprint information and the second voiceprint information is greater than a second preset threshold At this time, it can be determined that the user who sends the first voiceprint message and the user who sends the second voiceprint message are the same person.
- the second preset threshold may be the same as the first preset threshold, or may be higher than the first preset threshold.
- step S80 it is determined that the identification of the access control system is incorrect.
- the access control recognition fails, and the access control system can issue an error reminder through the display module.
- Step S91 Determine, based on the voiceprint information, an interval between the user sending the first voiceprint information corresponding to the mapping random code and sending the second voiceprint information corresponding to the mapping fixed code;
- an interval time between the first voiceprint information and the second voiceprint information is obtained.
- the interval time refers to a time difference between a time point when the first voiceprint information ends and a time point when the second voiceprint information is sent out.
- Step S92 it is determined whether the interval time is less than a preset interval threshold; if yes, step S30 is performed; if not, step S80 is performed;
- step S80 it is determined that the identification of the access control system is incorrect.
- the preset interval threshold is compared with the interval time to improve the recognition speed of the access control system.
- the scheme of comparing the similarity between the first voiceprint information and the second voiceprint information in the third embodiment with the second preset threshold may also be compared with the interval time and the preset interval threshold in this embodiment.
- the combination of the solutions ensures the security of the identification of the access control system and improves the identification speed.
- a voiceprint database for local criminals may also be provided, in which special voiceprint templates are stored, and each special voiceprint template may correspond to an illegal criminal.
- the voiceprint information is compared with all the special voiceprint templates in the voiceprint database of the local criminal, as long as the voiceprint issued by the user If the similarity between the information and any one of the special voiceprint templates is greater than the first preset threshold, the communication module can be triggered to network and send an early warning message to the manager.
- step S20 may be continued.
- the communication module is triggered only for criminals to conduct network operations, which reduces the interference of other communication equipment on the access control system through the communication module and ensures the smooth operation of the access control system.
- the present application further provides an identification device for an access control system.
- the device may be a processor for access control identification or an access control device.
- the device includes:
- An acquisition module 10 configured to acquire voiceprint information issued by a user
- a conversion module 20 configured to convert the voiceprint information into corresponding text data including a mapping random code and a mapping fixed code
- a determining module 30, configured to determine whether the mapped random code is consistent with a random code displayed by the access control system
- a searching module 40 configured to: when the mapped random code is consistent with the random code, use the mapped fixed code as a keyword, and search for the fixed mapping from preset mapping data between the fixed code and the voiceprint template; The corresponding voiceprint template;
- a comparison module 50 configured to perform a voiceprint comparison between the voiceprint information and the found voiceprint template to determine whether the user and the owner of the voiceprint template are consistent;
- a determining module 60 is configured to determine that the identification of the access control system passes when the user is consistent with an owner of the voiceprint template.
- the comparison module when the number of voiceprint templates found is greater than or equal to two, the comparison module includes:
- a computing unit configured to separately calculate the similarity between each voiceprint template and the voiceprint information
- a selecting unit configured to select, from all voiceprint templates, the voiceprint template with the highest similarity to the voiceprint information as a reference voiceprint template
- a determining unit configured to determine that the user is consistent with the owner of the reference voiceprint template when the similarity between the reference voiceprint template and the voiceprint information is greater than the first preset threshold.
- the device further includes an interception module and a calculation module.
- an interception module and a calculation module.
- the intercepting module is configured to intercept the first voiceprint information corresponding to the mapping random code and the second voiceprint information corresponding to the mapping fixed code from the voiceprint information;
- the calculation module is configured to calculate a similarity between the first voiceprint information and the second voiceprint information
- the determining module is further configured to determine whether a similarity between the first voiceprint information and the second voiceprint information is greater than a second preset threshold; and when the first voiceprint information and the second voiceprint information When the similarity between the voiceprint information is greater than a second preset threshold, the step of determining whether the mapped random code is consistent with the random code displayed by the access control system is continued; when the first voiceprint information and the second When the similarity between the voiceprint information is less than or equal to a second preset threshold, the determining module is triggered to execute a step of determining that the access control system recognizes an error.
- the determining module is further configured to determine, according to the voiceprint information, that the user sends the first voiceprint information corresponding to the mapping random code to the second voiceprint corresponding to the mapping fixed code. Interval between voiceprint messages;
- the judging module is further configured to judge whether the interval time is less than a preset interval threshold; and when the interval time is less than a preset interval threshold, perform a judgment whether the mapped random code is consistent with a random code displayed by the access control system When the interval time is greater than or equal to a preset interval threshold, triggering the determining module to execute a step of determining that the access control system recognizes an error.
- the transformation module includes:
- a preprocessing unit configured to preprocess the voiceprint information
- An extraction unit configured to extract feature parameters from the pre-processed voiceprint information, and generate a feature vector sequence according to all the feature parameters
- a recognition unit is configured to extract and identify the feature vector sequence based on a preset model to obtain text data including a mapping random code and a mapping fixed code.
- the apparatus further includes a sending module; in the apparatus,
- the comparison module is further configured to compare the voiceprint information with a special voiceprint template stored in a voiceprint database of a local criminal;
- the sending module is configured to send an early warning message to a manager when the similarity between the voiceprint information and any special voiceprint template in the voiceprint database of the local criminal is greater than a first preset threshold.
- the apparatus further includes:
- a detection module for detecting whether a user appears in the area where the access control system is located by infrared; and when the infrared detects that a user is present in the area where the access control system is located, triggering the acquisition module to execute the sound generated by the user Grain information steps.
- the present application also proposes a computer-readable storage medium on which a computer program is stored.
- the computer-readable storage medium may be the memory 20 in the access control system 100 of FIG. 1, or may be a ROM (Read-Only Memory (Read Only Memory) / RAM (Random Access Memory, at least one of a random access memory, a magnetic disk, and an optical disk.
- the computer-readable storage medium includes several instructions to enable a terminal device (such as a mobile phone, computer, server, and access control system) with a processor , Or network equipment, etc.) perform the methods described in the embodiments of the present application.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Acoustics & Sound (AREA)
- Human Computer Interaction (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Business, Economics & Management (AREA)
- Game Theory and Decision Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Telephonic Communication Services (AREA)
- Collating Specific Patterns (AREA)
Abstract
L'invention porte sur un procédé et un dispositif d'identification pour un système de contrôle d'accès, sur un système de contrôle d'accès et sur un support d'informations. Le procédé comprend les étapes consistant : à acquérir des informations d'empreinte vocale envoyées par un utilisateur ; à convertir les informations d'empreinte vocale en données de texte correspondantes qui comprennent un code aléatoire de mappage et un code fixe de mappage ; à déterminer si le code aléatoire de mappage est cohérent avec un code aléatoire affiché par un système de contrôle d'accès ; lorsque le code aléatoire de mappage est cohérent avec le code aléatoire, à rechercher un modèle d'empreinte vocale correspondant au code fixe de mappage à partir de données de mappage préétablies entre le code fixe et le modèle d'empreinte vocale en utilisant le code fixe de mappage comme mot-clé ; à effectuer une comparaison d'empreinte vocale sur les informations d'empreinte vocale et le modèle d'empreinte vocale recherché de façon à déterminer si l'utilisateur correspond à un propriétaire du modèle d'empreinte vocale ; lorsque l'utilisateur correspond au propriétaire du modèle d'empreinte vocale, à déterminer que l'identification du système de contrôle d'accès est réussie.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810737583.4 | 2018-07-06 | ||
| CN201810737583.4A CN109727342A (zh) | 2018-07-06 | 2018-07-06 | 门禁系统的识别方法、装置、门禁系统及存储介质 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2020006886A1 true WO2020006886A1 (fr) | 2020-01-09 |
Family
ID=66293885
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2018/106772 Ceased WO2020006886A1 (fr) | 2018-07-06 | 2018-09-20 | Procédé et dispositif d'identification pour système de contrôle d'accès, système de contrôle d'accès et support d'informations |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN109727342A (fr) |
| WO (1) | WO2020006886A1 (fr) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110232760A (zh) * | 2019-06-13 | 2019-09-13 | 珠海格力电器股份有限公司 | 智能音箱、智能门锁、服务器、开锁系统及其开锁方法 |
| CN112309060A (zh) * | 2019-08-02 | 2021-02-02 | 广东美的制冷设备有限公司 | 安防设备及其室内监控方法、控制装置和可读存储介质 |
| CN111597531A (zh) * | 2020-04-07 | 2020-08-28 | 北京捷通华声科技股份有限公司 | 一种身份认证方法、装置、电子设备及可读存储介质 |
| CN112863025A (zh) * | 2021-01-11 | 2021-05-28 | 宁波大学 | 一种基于音频密钥识别的门禁控制方法及系统 |
| CN114582346A (zh) * | 2022-03-07 | 2022-06-03 | 云知声智能科技股份有限公司 | 一种识别的方法、装置、终端及存储介质 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104202486A (zh) * | 2014-09-26 | 2014-12-10 | 上海华勤通讯技术有限公司 | 移动终端及其屏幕解锁方法 |
| CN104765996A (zh) * | 2014-01-06 | 2015-07-08 | 讯飞智元信息科技有限公司 | 声纹密码认证方法及系统 |
| CN106340298A (zh) * | 2015-07-06 | 2017-01-18 | 南京理工大学 | 融合内容识别和话者识别的声纹解锁方法 |
Family Cites Families (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102869008A (zh) * | 2011-07-07 | 2013-01-09 | 上海先先信息科技有限公司 | 一种应用声纹验证作为移动应用安全密码的技术 |
| JP5704013B2 (ja) * | 2011-08-02 | 2015-04-22 | ソニー株式会社 | ユーザ認証方法、ユーザ認証装置、およびプログラム |
| CN103390305B (zh) * | 2013-07-15 | 2015-09-02 | 厦门大学 | 文本提示型声纹门禁系统 |
| CN104168270B (zh) * | 2014-07-31 | 2016-01-13 | 腾讯科技(深圳)有限公司 | 身份验证方法、服务器、客户端及系统 |
| CN105701887A (zh) * | 2014-11-26 | 2016-06-22 | 常州峰成科技有限公司 | 一种声纹锁及其开锁方法 |
| CN204496911U (zh) * | 2015-04-14 | 2015-07-22 | 时代亿宝(北京)科技有限公司 | 一种基于动态口令的声纹打卡装置 |
| CN105096432A (zh) * | 2015-09-14 | 2015-11-25 | 山东山大鸥玛软件有限公司 | 一种声纹密码锁控制系统 |
| CN106920303A (zh) * | 2017-01-21 | 2017-07-04 | 云丁网络技术(北京)有限公司 | 一种基于语音识别的开锁方法及其智能门锁系统 |
| CN107977557A (zh) * | 2017-11-30 | 2018-05-01 | 广州势必可赢网络科技有限公司 | 一种基于声纹识别的电子合同签署服务认证协议及服务器 |
| CN108417216B (zh) * | 2018-03-15 | 2021-01-08 | 深圳市声扬科技有限公司 | 语音验证方法、装置、计算机设备和存储介质 |
-
2018
- 2018-07-06 CN CN201810737583.4A patent/CN109727342A/zh active Pending
- 2018-09-20 WO PCT/CN2018/106772 patent/WO2020006886A1/fr not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104765996A (zh) * | 2014-01-06 | 2015-07-08 | 讯飞智元信息科技有限公司 | 声纹密码认证方法及系统 |
| CN104202486A (zh) * | 2014-09-26 | 2014-12-10 | 上海华勤通讯技术有限公司 | 移动终端及其屏幕解锁方法 |
| CN106340298A (zh) * | 2015-07-06 | 2017-01-18 | 南京理工大学 | 融合内容识别和话者识别的声纹解锁方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN109727342A (zh) | 2019-05-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2020006886A1 (fr) | Procédé et dispositif d'identification pour système de contrôle d'accès, système de contrôle d'accès et support d'informations | |
| WO2020034526A1 (fr) | Procédé d'inspection de qualité, appareil, dispositif et support de stockage informatique pour l'enregistrement d'une assurance | |
| WO2020207035A1 (fr) | Procédé, appareil et dispositif d'interception de canular téléphonique, et support d'informations | |
| WO2019144738A1 (fr) | Procédé de vérification de service financier, appareil et dispositif, et support d'informations informatique | |
| WO2018070780A1 (fr) | Dispositif électronique et son procédé de commande | |
| WO2020042463A1 (fr) | Procédé, appareil, dispositif et support de déverrouillage de contrôle d'accès basé sur la reconnaissance biométrique | |
| WO2016129930A1 (fr) | Procédé de fonctionnement pour une fonction vocale et dispositif électronique le prenant en charge | |
| WO2019143022A1 (fr) | Procédé et dispositif électronique d'authentification d'utilisateur par commande vocale | |
| WO2013125910A1 (fr) | Procédé et système d'authentification d'utilisateur d'un dispositif mobile par l'intermédiaire d'informations biométriques hybrides | |
| WO2018072567A1 (fr) | Procédé et système d'appel à l'aide d'urgence basés sur une identification par empreinte digitale pour un terminal mobile, et terminal mobile | |
| WO2020122653A1 (fr) | Appareil électronique et procédé de commande de celui-ci | |
| WO2020000637A1 (fr) | Procédé, appareil et dispositif de commande d'équipement à base de son, et support d'informations | |
| EP3500947A1 (fr) | Dispositif et procédé de traduction de langue | |
| WO2020253131A1 (fr) | Procédé, appareil et dispositif de paiement par carte bancaire, et support de stockage informatique | |
| WO2020087704A1 (fr) | Procédé, appareil et dispositif de gestion d'informations de crédit et support d'enregistrement | |
| WO2020207038A1 (fr) | Procédé, appareil et dispositif de comptage de personnes basés sur la reconnaissance faciale, et support d'informations | |
| WO2019112145A1 (fr) | Procédé, dispositif et système de partage de photographies d'après une reconnaissance vocale | |
| WO2023128342A1 (fr) | Procédé et système d'identification d'un individu à l'aide d'une voix chiffrée de manière homomorphe | |
| WO2020073494A1 (fr) | Procédé de détection de porte arrière de page web, dispositif, support d'informations et appareil | |
| WO2018223520A1 (fr) | Procédé et dispositif d'apprentissage orienté vers les enfants, et support de stockage | |
| US10997976B2 (en) | Authentication system, authentication method, and, non-transitory computer-readable information recording medium for recording program | |
| WO2021251539A1 (fr) | Procédé permettant de mettre en œuvre un message interactif en utilisant un réseau neuronal artificiel et dispositif associé | |
| WO2020155773A1 (fr) | Procédé de surveillance d'entrée de texte suspecte, dispositif, appareil informatique et support de sockage | |
| WO2023128345A1 (fr) | Procédé et système d'identification personnelle utilisant une image chiffrée de manière homomorphe | |
| CN111462754A (zh) | 一种电力系统调度控制语音识别模型建立方法 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18925549 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 16.04.2021) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 18925549 Country of ref document: EP Kind code of ref document: A1 |