CN108650266A - Server, the method for voice print verification and storage medium - Google Patents

Server, the method for voice print verification and storage medium Download PDF

Info

Publication number
CN108650266A
CN108650266A CN201810457267.1A CN201810457267A CN108650266A CN 108650266 A CN108650266 A CN 108650266A CN 201810457267 A CN201810457267 A CN 201810457267A CN 108650266 A CN108650266 A CN 108650266A
Authority
CN
China
Prior art keywords
voice
vocal print
graphic code
secret key
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810457267.1A
Other languages
Chinese (zh)
Other versions
CN108650266B (en
Inventor
程序
彭俊清
王健宗
肖京
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201810457267.1A priority Critical patent/CN108650266B/en
Priority to PCT/CN2018/102049 priority patent/WO2019218512A1/en
Publication of CN108650266A publication Critical patent/CN108650266A/en
Application granted granted Critical
Publication of CN108650266B publication Critical patent/CN108650266B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/22Interactive procedures; Man-machine interfaces
    • G10L17/24Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Power Engineering (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present invention relates to a kind of server, the method for voice print verification and storage medium, this method to include:After receiving authentication request, the graphic code parameter of graphic code corresponding with the User Identity is generated, and is sent to the client computer;After handheld terminal parses graphic code, receives handheld terminal and asked by the voice print verification for carrying random secret key that voice print database acquisition link address is sent, and whether analyze two random secret keys consistent;If so, establishing the data under voice channel with the handheld terminal, and the current voice print verification voice data of the user acquired from the handheld terminal is obtained based on the channel;Corresponding current vocal print discriminant vectors are built, the corresponding standard vocal print discriminant vectors of the User Identity is determined, calculates the distance between current vocal print discriminant vectors and standard vocal print discriminant vectors, the distance based on calculating generates authentication result.The present invention can improve the flexibility of voice print verification, avoid the occurrence of sound abduction.

Description

Server, the method for voice print verification and storage medium
Technical field
The present invention relates to a kind of field of communication technology more particularly to server, the method for voice print verification and storage mediums.
Background technology
Currently, using voice print verification technology realize user identity verification have become each large power consumers company (for example, Bank, insurance company, game company etc.) important verification means.Traditional realizes that user identity is tested using voice print verification technology The operational program of card is:Using the interface of voice print verification server, corresponding client-side program exploitation is individually carried out, exploitation is passed through Client-side program the voice of user is acquired and pre-processing, the voice print database after pre-processing is then transmitted to vocal print Authentication server carries out authentication verification and operation processing for voice print verification server to being transmitted through the voice print database come.
However, the defect of this traditional voice print verification scheme is:User needs to pass through developed client-side program The voice of user is acquired, in practical operation, using flexible is low, is easy by artificial sound intervention, and uses client meter It is easy to be kidnapped by sound when calculation machine acquires sound, the authenticity of voice print verification can not accurately be controlled, safety obtains Less than guarantee.
Invention content
The purpose of the present invention is to provide a kind of server, the method for voice print verification and storage mediums, it is intended to improve vocal print The flexibility of verification avoids the occurrence of sound abduction.
To achieve the above object, the present invention provides a kind of server, the server include memory and with the storage The processor of device connection, is stored with the processing system that can be run on the processor, the processing system in the memory Following steps are realized when being executed by the processor:
Generation step, after receiving the authentication request of carrying User Identity of client computer transmission, The graphic code parameter of graphic code corresponding with the User Identity is generated, and the graphic code parameter is sent to the client meter Calculation machine generates for the client computer and shows that graphic code corresponding with the graphic code parameter, the graphic code parameter include Random secret key and voice print database acquisition link address;
Analytical procedure connects after handheld terminal parsing graphic code obtains random secret key and voice print database acquisition link address It receives handheld terminal to ask by the voice print verification for carrying random secret key that voice print database acquisition link address is sent, and analyzes hair Whether give random secret key in the graphic code parameter of the client computer consistent with the random secret key that is received from handheld terminal;
Obtaining step if so, establishing the data under voice channel with the handheld terminal, and is adopted based on the voice data Collection channel obtains the current voice print verification voice data of the user acquired from the handheld terminal;
Verification step builds the corresponding current vocal print discriminant vectors of the current voice print verification voice data, according to scheduled The mapping relations of User Identity and standard vocal print discriminant vectors determine that the corresponding standard vocal print of the User Identity differentiates Vector calculates the distance between current vocal print discriminant vectors and standard vocal print discriminant vectors, and the distance based on calculating generates identity Verification result, and the authentication result is sent to the client computer.
Preferably, the analytical procedure, specifically includes:
The server receives handheld terminal and carries random secret key by what voice print database acquisition link address was sent Voice print verification is asked, and whether the number that analysis receives the random secret key is more than preset times;
If being less than or equal to the preset times, analysis is sent to random secret in the graphic code parameter of the client computer Whether key and the random secret key received from handheld terminal are consistent.
Preferably, the graphic code parameter further includes the effective time of graphic code, and the analytical procedure specifically includes:
The server receives handheld terminal and carries random secret key by what voice print database acquisition link address was sent Voice print verification is asked, and whether the time that analysis receives the random secret key is within the scope of the effective time of the graphic code;
If within the scope of the effective time in the graphic code, whether the number that analysis receives the random secret key is more than in advance If number;
If being less than or equal to the preset times, analysis is sent to random secret in the graphic code parameter of the client computer Whether key and the random secret key received from handheld terminal are consistent.
Preferably, the step of described structure current voice print verification voice data corresponding current vocal print discriminant vectors, tool Body includes:
Current voice print verification voice data is handled, to extract preset kind vocal print feature, and based on the default class Type vocal print feature builds corresponding vocal print feature vector;
In the background channel model that vocal print feature vector input is trained in advance, to build the current voice print verification voice The corresponding current vocal print discriminant vectors of data;
It is described to calculate the distance between current vocal print discriminant vectors and standard vocal print discriminant vectors, the distance life based on calculating Include at the step of authentication result:
Calculate the COS distance between the current vocal print discriminant vectors and standard vocal print discriminant vectors: For the standard vocal print discriminant vectors,For current vocal print discriminant vectors;
If the COS distance is less than or equal to preset distance threshold, the information being verified is generated;
If the COS distance be more than preset distance threshold, generate verification not by information.
To achieve the above object, the present invention also provides a kind of method of voice print verification, the method for the voice print verification includes:
S1, after receiving the authentication request of carrying User Identity of client computer transmission, server The graphic code parameter of graphic code corresponding with the User Identity is generated, and the graphic code parameter is sent to the client meter Calculation machine generates for the client computer and shows that graphic code corresponding with the graphic code parameter, the graphic code parameter include Random secret key and voice print database acquisition link address;
S2, after handheld terminal parsing graphic code obtains random secret key and voice print database acquisition link address, the service Device receives handheld terminal and is asked by the voice print verification for carrying random secret key that voice print database acquisition link address is sent, and point Whether analyse the random secret key that is sent in the graphic code parameter of the client computer and the random secret key received from handheld terminal Unanimously;
S3 if so, the server establishes the data under voice channel with the handheld terminal, and is based on the voice number The current voice print verification voice data of the user acquired from the handheld terminal is obtained according to acquisition channel;
S4 builds the corresponding current vocal print discriminant vectors of the current voice print verification voice data, according to scheduled user's body The mapping relations of part mark and standard vocal print discriminant vectors, determine the corresponding standard vocal print discriminant vectors of the User Identity, The distance between current vocal print discriminant vectors and standard vocal print discriminant vectors are calculated, the distance based on calculating generates authentication knot Fruit, and the authentication result is sent to the client computer.
Preferably, the step S2, specifically includes:
The server receives handheld terminal and carries random secret key by what voice print database acquisition link address was sent Voice print verification is asked, and whether the number that analysis receives the random secret key is more than preset times;
If being less than or equal to the preset times, analysis is sent to random secret in the graphic code parameter of the client computer Whether key and the random secret key received from handheld terminal are consistent.
Preferably, the graphic code parameter further includes the effective time of graphic code, and the step S2 is specifically included:
The server receives handheld terminal and carries random secret key by what voice print database acquisition link address was sent Voice print verification is asked, and whether the time that analysis receives the random secret key is within the scope of the effective time of the graphic code;
If within the scope of the effective time in the graphic code, whether the number that analysis receives the random secret key is more than in advance If number;
If being less than or equal to the preset times, analysis is sent to random secret in the graphic code parameter of the client computer Whether key and the random secret key received from handheld terminal are consistent.
Preferably, the step of described structure current voice print verification voice data corresponding current vocal print discriminant vectors, tool Body includes:
Current voice print verification voice data is handled, to extract preset kind vocal print feature, and based on the default class Type vocal print feature builds corresponding vocal print feature vector;
In the background channel model that vocal print feature vector input is trained in advance, to build the current voice print verification voice The corresponding current vocal print discriminant vectors of data;
It is described to calculate the distance between current vocal print discriminant vectors and standard vocal print discriminant vectors, the distance life based on calculating Include at the step of authentication result:
Calculate the COS distance between the current vocal print discriminant vectors and standard vocal print discriminant vectors: For the standard vocal print discriminant vectors,For current vocal print discriminant vectors;
If the COS distance is less than or equal to preset distance threshold, the information being verified is generated;
If the COS distance be more than preset distance threshold, generate verification not by information.
Preferably, described that current voice print verification voice data is handled, to extract preset kind vocal print feature, and base The step of corresponding vocal print feature vector is built in the preset kind vocal print feature, is specifically included:
Preemphasis, framing and windowing process are carried out to the current voice print verification voice data, each adding window is carried out Fourier transform obtains corresponding frequency spectrum, and the frequency spectrum is inputted Meier filter to export to obtain Meier frequency spectrum;
Cepstral analysis is carried out on Meier frequency spectrum to obtain mel-frequency cepstrum coefficient MFCC, is fallen based on the mel-frequency Spectral coefficient MFCC forms corresponding vocal print feature vector.
The present invention also provides a kind of computer readable storage medium, processing is stored on the computer readable storage medium The step of system, the processing system realizes the method for above-mentioned voice print verification when being executed by processor.
The beneficial effects of the invention are as follows:The present invention uses client computer, server and hand when carrying out voice print verification The framework of terminal composition is held, client computer carries User Identity and made requests on to server, and server is generated and used Identity corresponding graphic code parameter in family is simultaneously sent to client computer, and the corresponding figure of display graphic code parameter is carried out for it Shape code, user are tested by chained address transmission random code to server using after the handheld terminal scanning figure shape code of carrying Card, channel can be established with server by being verified, and obtain the voice data of the user of handheld terminal acquisition, carry out vocal print Verification, the present invention do not need the voice data of developed client-side program acquisition user, and carrying out vocal print using handheld terminal tests Card flexibility is high and is not easy to be disturbed, and binds server and client computer using User Identity, recycles random Code again binds client computer, server and handheld terminal, avoids the occurrence of the case where sound is kidnapped, and improves vocal print and tests The authenticity of card and safety.
Description of the drawings
Fig. 1 is each one optional application environment schematic diagram of embodiment of the present invention;
Fig. 2 is the flow diagram of one embodiment of method of voice print verification of the present invention.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work The every other embodiment obtained is put, shall fall within the protection scope of the present invention.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is used for description purposes only, and cannot It is interpreted as indicating or implying its relative importance or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " the One ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodiment Art scheme can be combined with each other, but must can be implemented as basis with those of ordinary skill in the art, when technical solution Will be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not the present invention claims Protection domain within.
As shown in fig.1, being the application environment schematic diagram of the preferred embodiment of the method for voice print verification of the present invention.The application Environment schematic includes 1, client computer 2 and handheld terminal 3 on server.1 can be led to by network, near field on server The suitable technology such as letter technology carries out data interaction with client computer 2 and handheld terminal 3.
The client computer 2 include, but are not limited to any type can with user by keyboard, mouse, remote controler, The modes such as touch tablet or voice-operated device carry out the electronic product of human-computer interaction, for example, personal computer, tablet computer, intelligence Mobile phone, personal digital assistant (Personal Digital Assistant, PDA), game machine, Interactive Internet TV The removable of (Internet Protocol Television, IPTV), intellectual Wearable, navigation device etc. sets It is standby, or such as number TV, desktop computer, notebook, server etc. fixed terminal.The handheld terminal 3 can be Tablet computer, smart mobile phone etc..
On the server 1 be it is a kind of can according to the instruction for being previously set or storing, it is automatic carry out numerical computations and/ Or the equipment of information processing.On the server 1 can be single network server, multiple network servers composition server The group either cloud being made of a large amount of hosts or network server based on cloud computing, wherein cloud computing is the one of Distributed Calculation Kind, a super virtual computer being made of the computer collection of a group loose couplings.
In the present embodiment, it 1 may include on server, but be not limited only to, connection can be in communication with each other by system bus Memory 11, processor 12, network interface 13, memory 11 are stored with the processing system that can be run on the processor 12.It needs , it is noted that Fig. 1 is illustrated only 1 on the server with component 11-13, it should be understood that being not required for implementing all The component shown, the implementation that can be substituted is more or less component.
Wherein, memory 11 includes memory and the readable storage medium storing program for executing of at least one type.Inside save as on server 1 fortune Row provides caching;Readable storage medium storing program for executing can be if flash memory, hard disk, multimedia card, card-type memory are (for example, SD or DX memories Deng), random access storage device (RAM), static random-access memory (SRAM), read-only memory (ROM), electric erasable can compile Journey read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc. it is non-volatile Storage medium.In some embodiments, readable storage medium storing program for executing can be on server 1 internal storage unit, such as the service 1 hard disk on device;In further embodiments, which can also be that on server 1 external storage is set It is standby, for example, 1 on server on the plug-in type hard disk that is equipped with, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) blocks, flash card (Flash Card) etc..In the present embodiment, the readable storage medium storing program for executing of memory 11 It is installed in 1 operating system and types of applications software on server, such as storage one embodiment of the invention commonly used in storage Processing system program code etc..It has exported or will export in addition, memory 11 can be also used for temporarily storing Various types of data.
The processor 12 can be in some embodiments central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor or other data processing chips.The processor 12 is commonly used in the control clothes 1 overall operation on business device, such as execute and carry out data interaction with the client computer 2, handheld terminal 3 or communicate phase Control and processing of pass etc..In the present embodiment, the processor 12 is for running the program code stored in the memory 11 Or processing data, such as operation processing system etc..
The network interface 13 may include radio network interface or wired network interface, which is commonly used in Communication connection is established on the server between 1 and other electronic equipments.In the present embodiment, network interface 13 is mainly used for take 1 is connected with client computer 2, handheld terminal 3 on business device, on the server between 1 and client computer 2, handheld terminal 3 Establish data transmission channel and communication connection.
The processing system is stored in memory 11, including it is at least one be stored in it is computer-readable in memory 11 Instruction, at least one computer-readable instruction can be executed by processor device 12, the method to realize each embodiment of the application;With And the function that at least one computer-readable instruction is realized according to its each section is different, can be divided into different logic moulds Block.
In one embodiment, following steps are realized when above-mentioned processing system is executed by the processor 12:
Generation step, after receiving the authentication request of carrying User Identity of client computer transmission, The graphic code parameter of graphic code corresponding with the User Identity is generated, and the graphic code parameter is sent to the client meter Calculation machine generates for the client computer and shows graphic code corresponding with the graphic code parameter;
Wherein, User Identity is the mark of the identity for unique mark user, it is preferable that User Identity is Identification card number.Graphic code is preferably Quick Response Code, however, not limited to this, such as can also be bar code.Graphic code parameter is used for Corresponding graphic code is generated, such as Quick Response Code parameter generates corresponding Quick Response Code, bar code parameters generate corresponding bar code.Figure Shape code parameter includes random secret key and voice print database acquisition link address, can also further comprise effective time, the figure of graphic code The details of shape code, scene value ID of graphic code etc., random secret key can be random number word string or random string etc..
The authentication request for the carrying User Identity that client computer is sent to server, server receive After the authentication request, generate corresponding with User Identity random secret key, the server voice print database acquisition link It is grounded location and the effective time of graphic code, the details of graphic code, the graphic codes parameter such as scene value ID of graphic code, by this Graphic code parameter is sent to the client computer, after client computer receives graphic code parameter, according to graphic code parameter Corresponding graphic code is generated, and is shown, is scanned for handheld terminal.
Analytical procedure connects after handheld terminal parsing graphic code obtains random secret key and voice print database acquisition link address It receives handheld terminal to ask by the voice print verification for carrying random secret key that voice print database acquisition link address is sent, and analyzes hair Whether give random secret key in the graphic code parameter of the client computer consistent with the random secret key that is received from handheld terminal;
Handheld terminal carries out graphic code using the function module for parsing graphic code of itself after scanning figure shape code Parsing obtains corresponding random secret key, the effective time of the voice print database acquisition link address of the server and graphic code, figure Graphic codes parameter, the handheld terminals such as the details of shape code, the scene value ID of graphic code pass through voice print database acquisition link address The voice print verification that transmission carries random secret key is asked into server.
After server receives voice print verification request, analysis is sent in the graphic code parameter of the client computer Whether random secret key and the random secret key received from handheld terminal are consistent, other handheld terminals usurp the random of this in order to prevent Voice print verification is carried out with server after secret key, improves the accuracy of voice print verification, in one embodiment, server receives hand-held whole The voice print verification request for carrying random secret key that end is sent by voice print database acquisition link address, first analysis receive this Whether the number of random secret key is more than preset times;If the number for receiving the random secret key is more than preset times, it is greater than 1 Secondary, then the server refusal respond voice print verification is asked, and can the relevant information of the handheld terminal be sent to server, for clothes The reference frame whether business device is subsequently spoofed as voice print verification, if being less than or equal to the preset times, for example, 1 time, then again Execute the random secret key that is sent in the graphic code parameter of the client computer of analysis with received from handheld terminal it is random secret The whether consistent operation of key.
Other handheld terminals are usurped and carry out voice print verification with server after this random secret key in order to prevent, further carry The accuracy of high voice print verification, in another embodiment, server receive handheld terminal and pass through voice print database acquisition link address Whether the time that the voice print verification request for carrying random secret key sent, first analysis receive the random secret key is in the figure Within the scope of the effective time of shape code, such as the effective time of the graphic code is 2018.03.01-2018.03.10, and server receives The time of the random secret key of handheld terminal is 2018.03.08, then is within the scope of the effective time of the graphic code.If in should Within the scope of the effective time of graphic code, then the number for receiving the random secret key is analyzed again whether more than preset times, for example, point Whether the number that analysis receives the random secret key is more than 1 time;If the number for receiving the random secret key is more than preset times, take Device refusal respond of being engaged in voice print verification request, and the relevant information of the handheld terminal can be sent to server, after server The continuous reference frame whether being spoofed as voice print verification.It is last to execute analysis transmission again if being less than or equal to the preset times It is whether consistent to the random secret key in the graphic code parameter of the client computer and the random secret key from handheld terminal reception Operation.
Obtaining step if so, establishing the data under voice channel with the handheld terminal, and is adopted based on the voice data Collection channel obtains the current voice print verification voice data of the user acquired from the handheld terminal;
If the random secret key being sent in the graphic code parameter of the client computer and received from handheld terminal with Machine secret key is consistent, then establishes the data under voice channel with the handheld terminal.Handheld terminal passes through the voice collectings such as microphone Equipment collects the current voice print verification voice data of user in real time.When acquiring current voice print verification voice data, should use up Amount prevents the interference of ambient noise and handheld terminal.Handheld terminal keeps suitable distance with user, and does not have to be distorted big as possible Handheld terminal, it is preferable to use alternating currents for power supply, and electric current is kept to stablize;Sensor should be used when being recorded.In framing and adopt Before sample, noise treatment can be carried out to current voice print verification voice data, to be further reduced interference.In order to extract The vocal print feature of current voice print verification voice data is obtained, the current voice print verification voice data acquired is preset data length Voice data, or be the voice data more than preset data length.
Verification step builds the corresponding current vocal print discriminant vectors of the current voice print verification voice data, according to scheduled The mapping relations of User Identity and standard vocal print discriminant vectors determine that the corresponding standard vocal print of the User Identity differentiates Vector calculates the distance between current vocal print discriminant vectors and standard vocal print discriminant vectors, and the distance based on calculating generates identity Verification result, and the authentication result is sent to the client computer.
In order to effectively reduce the calculation amount of Application on Voiceprint Recognition, the speed of Application on Voiceprint Recognition is improved, in one embodiment, above-mentioned structure It the step of current voice print verification voice data corresponding current vocal print discriminant vectors, specifically includes:To current voice print verification language Sound data are handled, and to extract preset kind vocal print feature, and build corresponding vocal print based on the preset kind vocal print feature Feature vector;In the background channel model that vocal print feature vector input is trained in advance, to build the current voice print verification language The corresponding current vocal print discriminant vectors of sound data.
Wherein, vocal print feature includes multiple types, such as broadband vocal print, narrowband vocal print, amplitude vocal print etc., and the present embodiment is pre- If type vocal print feature is preferably mel-frequency cepstrum coefficient (the Mel Frequency of current voice print verification voice data Cepstrum Coefficient, MFCC), Predetermined filter is Meier filter.When building corresponding vocal print feature vector, By the vocal print feature composition characteristic data matrix of current voice print verification voice data, this feature data matrix is corresponding vocal print Feature vector.
Specifically, preemphasis and windowing process are carried out to current voice print verification voice data, Fu is carried out to each adding window Vertical leaf transformation obtains corresponding frequency spectrum, and the frequency spectrum is inputted Meier filter to export to obtain Meier frequency spectrum;In Meier frequency spectrum Upper progress cepstral analysis is corresponded to obtaining mel-frequency cepstrum coefficient MFCC based on mel-frequency cepstrum coefficient MFCC compositions Vocal print feature vector.
Wherein, preemphasis processing is really high-pass filtering processing, filters out low-frequency data so that current voice print verification voice number High frequency characteristics in more highlights, and specifically, the transmission function of high-pass filtering is:H (Z)=1- α Z-1, wherein Z is voice number According to α is constant factor, it is preferable that the value of α is 0.97;Since voice data deviates from original to a certain extent after framing Beginning voice, therefore, it is necessary to carry out windowing process to voice data.On Meier frequency spectrum carry out cepstral analysis be, for example, take logarithm, Inverse transformation is done, inverse transformation is realized generally by DCT discrete cosine transforms, takes the 2nd after DCT to the 13rd coefficient conduct Mel-frequency cepstrum coefficient MFCC.Mel-frequency cepstrum coefficient MFCC is the vocal print feature of this frame voice data, by every frame Mel-frequency cepstrum coefficient MFCC composition characteristic data matrixes, this feature data matrix is the vocal print feature of speech sample data Vector.
The present embodiment takes the mel-frequency cepstrum coefficient MFCC of voice data to form corresponding vocal print feature vector, due to it Than the frequency band for the linear interval in normal cepstrum more can subhuman auditory system, therefore body can be improved The accuracy of part verification.
Then, it by above-mentioned vocal print feature vector input background channel model trained in advance, is tested with constructing current vocal print The corresponding current vocal print discriminant vectors of voice data are demonstrate,proved, for example, calculating current sound using background channel model trained in advance The corresponding eigenmatrix of line validating speech data, with determine the corresponding current vocal print of current voice print verification voice data differentiate to Amount.
For high efficiency, the corresponding current vocal print discriminant vectors of current voice print verification voice data are constructed in high quality, In a preferred embodiment, which is one group of gauss hybrid models, the training process of the background channel model Include the following steps:1. obtaining the voice data sample of preset quantity, the voice data sample of each preset quantity is corresponding with mark Accurate vocal print discriminant vectors;It is corresponded to 2. being handled respectively each voice data sample with extracting each voice data sample Preset kind vocal print feature, and each voice number is built based on the corresponding preset kind vocal print feature of each voice data sample According to the corresponding vocal print feature vector of sample;3. all preset kind vocal print feature vectors extracted are divided into the first percentage The verification collection of training set and the second percentage, the sum of first percentage and the second percentage are less than or equal to 100%;4. This group of gauss hybrid models are trained using the preset kind vocal print feature vector in training set, and the profit after the completion of training It is verified with the accuracy rate of this group of gauss hybrid models after verification set pair training;If accuracy rate be more than predetermined threshold value (for example, 98.5%), then training terminates, using this group of gauss hybrid models after training as background channel model ready for use, if alternatively, Accuracy rate is less than or equal to predetermined threshold value, then increases the quantity of voice data sample, and be trained again, until the group is high The accuracy rate of this mixed model is more than predetermined threshold value.
The background channel model that the present embodiment is trained in advance is by excavation to a large amount of voice data and to compare trained It arrives, this model can accurately portray background sound when user speaks while retaining the vocal print feature of user to greatest extent Line feature, and can remove this feature in identification, and the inherent feature of user voice is extracted, it can significantly improve use The accuracy rate and efficiency of family authentication.
In one embodiment, the distance between the current vocal print discriminant vectors of above-mentioned calculating and standard vocal print discriminant vectors, base Include in the step of distance of calculating generates authentication result:
Calculate the COS distance between the current vocal print discriminant vectors and standard vocal print discriminant vectors: For the standard vocal print discriminant vectors,For current vocal print discriminant vectors;If the COS distance is small In or equal to preset distance threshold, then the information being verified is generated;If the COS distance is more than preset apart from threshold Value, then generate verification not by information.
Wherein, User Identity can be carried when storing the standard vocal print discriminant vectors of user, verification user's When identity, corresponding standard vocal print discriminant vectors are obtained according to the identification information match of current vocal print discriminant vectors, and calculate and work as COS distance between preceding vocal print discriminant vectors and the standard vocal print discriminant vectors matched verifies target with COS distance The identity of user improves the accuracy of authentication.
Compared with prior art, the present invention using client computer, server and is held eventually when carrying out voice print verification The framework of composition, client computer is held to carry User Identity and made requests on to server, server generates and user's body Part identifies corresponding graphic code parameter and is sent to client computer, and the corresponding figure of display graphic code parameter is carried out for it Code, user are verified by chained address transmission random code to server using after the handheld terminal scanning figure shape code of carrying, Channel can be established with server by being verified, and obtain the voice data of the user of handheld terminal acquisition, carried out vocal print and tested Card, the present invention do not need the voice data of developed client-side program acquisition user, voice print verification are carried out using handheld terminal Flexibility is high and is not easy to be disturbed, and binds server and client computer using User Identity, recycles random code Client computer, server and handheld terminal are bound again, avoid the occurrence of the case where sound is kidnapped, improves voice print verification Authenticity and safety.
As shown in Fig. 2, Fig. 2 is the flow diagram of one embodiment of method of voice print verification of the present invention, the voice print verification Method includes the following steps:
Step S1, after receiving the authentication request of carrying User Identity of client computer transmission, clothes Business device generates the graphic code parameter of graphic code corresponding with the User Identity, and the graphic code parameter is sent to the client Computer is held, graphic code corresponding with the graphic code parameter, the graphic code parameter are generated and shown for the client computer Including random secret key and voice print database acquisition link address;
Wherein, User Identity is the mark of the identity for unique mark user, it is preferable that User Identity is Identification card number.Graphic code is preferably Quick Response Code, however, not limited to this, such as can also be bar code.Graphic code parameter is used for Corresponding graphic code is generated, such as Quick Response Code parameter generates corresponding Quick Response Code, bar code parameters generate corresponding bar code.Figure Shape code parameter includes random secret key and voice print database acquisition link address, can also further comprise effective time, the figure of graphic code The details of shape code, scene value ID of graphic code etc., random secret key can be random number word string or random string etc..
The authentication request for the carrying User Identity that client computer is sent to server, server receive After the authentication request, generate corresponding with User Identity random secret key, the server voice print database acquisition link It is grounded location and the effective time of graphic code, the details of graphic code, the graphic codes parameter such as scene value ID of graphic code, by this Graphic code parameter is sent to the client computer, after client computer receives graphic code parameter, according to graphic code parameter Corresponding graphic code is generated, and is shown, is scanned for handheld terminal.
Step S2, it is described after handheld terminal parsing graphic code obtains random secret key and voice print database acquisition link address Server receives handheld terminal and is asked by the voice print verification for carrying random secret key that voice print database acquisition link address is sent, And analyze the random secret key being sent in the graphic code parameter of the client computer and the random secret key received from handheld terminal It is whether consistent;
Handheld terminal carries out graphic code using the function module for parsing graphic code of itself after scanning figure shape code Parsing obtains corresponding random secret key, the effective time of the voice print database acquisition link address of the server and graphic code, figure Graphic codes parameter, the handheld terminals such as the details of shape code, the scene value ID of graphic code pass through voice print database acquisition link address The voice print verification that transmission carries random secret key is asked into server.
After server receives voice print verification request, analysis is sent in the graphic code parameter of the client computer Whether random secret key and the random secret key received from handheld terminal are consistent, other handheld terminals usurp the random of this in order to prevent Voice print verification is carried out with server after secret key, improves the accuracy of voice print verification, in one embodiment, server receives hand-held whole The voice print verification request for carrying random secret key that end is sent by voice print database acquisition link address, first analysis receive this Whether the number of random secret key is more than preset times;If the number for receiving the random secret key is more than preset times, it is greater than 1 Secondary, then the server refusal respond voice print verification is asked, and can the relevant information of the handheld terminal be sent to server, for clothes The reference frame whether business device is subsequently spoofed as voice print verification, if being less than or equal to the preset times, for example, 1 time, then again Execute the random secret key that is sent in the graphic code parameter of the client computer of analysis with received from handheld terminal it is random secret The whether consistent operation of key.
Other handheld terminals are usurped and carry out voice print verification with server after this random secret key in order to prevent, further carry The accuracy of high voice print verification, in another embodiment, server receive handheld terminal and pass through voice print database acquisition link address Whether the time that the voice print verification request for carrying random secret key sent, first analysis receive the random secret key is in the figure Within the scope of the effective time of shape code, such as the effective time of the graphic code is 2018.03.01-2018.03.10, and server receives The time of the random secret key of handheld terminal is 2018.03.08, then is within the scope of the effective time of the graphic code.If in should Within the scope of the effective time of graphic code, then the number for receiving the random secret key is analyzed again whether more than preset times, for example, point Whether the number that analysis receives the random secret key is more than 1 time;If the number for receiving the random secret key is more than preset times, take Device refusal respond of being engaged in voice print verification request, and the relevant information of the handheld terminal can be sent to server, after server The continuous reference frame whether being spoofed as voice print verification.It is last to execute analysis transmission again if being less than or equal to the preset times It is whether consistent to the random secret key in the graphic code parameter of the client computer and the random secret key from handheld terminal reception Operation.
Step S3 if so, the server establishes the data under voice channel with the handheld terminal, and is based on the language Sound data acquisition channel obtains the current voice print verification voice data of the user acquired from the handheld terminal;
If the random secret key being sent in the graphic code parameter of the client computer and received from handheld terminal with Machine secret key is consistent, then establishes the data under voice channel with the handheld terminal.Handheld terminal passes through the voice collectings such as microphone Equipment collects the current voice print verification voice data of user in real time.When acquiring current voice print verification voice data, should use up Amount prevents the interference of ambient noise and handheld terminal.Handheld terminal keeps suitable distance with user, and does not have to be distorted big as possible Handheld terminal, it is preferable to use alternating currents for power supply, and electric current is kept to stablize;Sensor should be used when being recorded.In framing and adopt Before sample, noise treatment can be carried out to current voice print verification voice data, to be further reduced interference.In order to extract The vocal print feature of current voice print verification voice data is obtained, the current voice print verification voice data acquired is preset data length Voice data, or be the voice data more than preset data length.
Step S4 builds the corresponding current vocal print discriminant vectors of the current voice print verification voice data, according to scheduled use The mapping relations of family identity and standard vocal print discriminant vectors, determine the corresponding standard vocal print of the User Identity differentiate to Amount, calculates the distance between current vocal print discriminant vectors and standard vocal print discriminant vectors, and the distance based on calculating generates identity and tests Card by the authentication result as a result, and be sent to the client computer.
In order to effectively reduce the calculation amount of Application on Voiceprint Recognition, the speed of Application on Voiceprint Recognition is improved, in one embodiment, above-mentioned structure It the step of current voice print verification voice data corresponding current vocal print discriminant vectors, specifically includes:To current voice print verification language Sound data are handled, and to extract preset kind vocal print feature, and build corresponding vocal print based on the preset kind vocal print feature Feature vector;In the background channel model that vocal print feature vector input is trained in advance, to build the current voice print verification language The corresponding current vocal print discriminant vectors of sound data.
Wherein, vocal print feature includes multiple types, such as broadband vocal print, narrowband vocal print, amplitude vocal print etc., and the present embodiment is pre- If type vocal print feature is preferably mel-frequency cepstrum coefficient (the Mel Frequency of current voice print verification voice data Cepstrum Coefficient, MFCC), Predetermined filter is Meier filter.When building corresponding vocal print feature vector, By the vocal print feature composition characteristic data matrix of current voice print verification voice data, this feature data matrix is corresponding vocal print Feature vector.
Specifically, preemphasis and windowing process are carried out to current voice print verification voice data, Fu is carried out to each adding window Vertical leaf transformation obtains corresponding frequency spectrum, and the frequency spectrum is inputted Meier filter to export to obtain Meier frequency spectrum;In Meier frequency spectrum Upper progress cepstral analysis is corresponded to obtaining mel-frequency cepstrum coefficient MFCC based on mel-frequency cepstrum coefficient MFCC compositions Vocal print feature vector.
Wherein, preemphasis processing is really high-pass filtering processing, filters out low-frequency data so that current voice print verification voice number High frequency characteristics in more highlights, and specifically, the transmission function of high-pass filtering is:H (Z)=1- α Z-1, wherein Z is voice number According to α is constant factor, it is preferable that the value of α is 0.97;Since voice data deviates from original to a certain extent after framing Beginning voice, therefore, it is necessary to carry out windowing process to voice data.On Meier frequency spectrum carry out cepstral analysis be, for example, take logarithm, Inverse transformation is done, inverse transformation is realized generally by DCT discrete cosine transforms, takes the 2nd after DCT to the 13rd coefficient conduct Mel-frequency cepstrum coefficient MFCC.Mel-frequency cepstrum coefficient MFCC is the vocal print feature of this frame voice data, by every frame Mel-frequency cepstrum coefficient MFCC composition characteristic data matrixes, this feature data matrix is the vocal print feature of speech sample data Vector.
The present embodiment takes the mel-frequency cepstrum coefficient MFCC of voice data to form corresponding vocal print feature vector, due to it Than the frequency band for the linear interval in normal cepstrum more can subhuman auditory system, therefore body can be improved The accuracy of part verification.
Then, it by above-mentioned vocal print feature vector input background channel model trained in advance, is tested with constructing current vocal print The corresponding current vocal print discriminant vectors of voice data are demonstrate,proved, for example, calculating current sound using background channel model trained in advance The corresponding eigenmatrix of line validating speech data, with determine the corresponding current vocal print of current voice print verification voice data differentiate to Amount.
For high efficiency, the corresponding current vocal print discriminant vectors of current voice print verification voice data are constructed in high quality, In a preferred embodiment, which is one group of gauss hybrid models, the training process of the background channel model Include the following steps:1. obtaining the voice data sample of preset quantity, the voice data sample of each preset quantity is corresponding with mark Accurate vocal print discriminant vectors;It is corresponded to 2. being handled respectively each voice data sample with extracting each voice data sample Preset kind vocal print feature, and each voice number is built based on the corresponding preset kind vocal print feature of each voice data sample According to the corresponding vocal print feature vector of sample;3. all preset kind vocal print feature vectors extracted are divided into the first percentage The verification collection of training set and the second percentage, the sum of first percentage and the second percentage are less than or equal to 100%;4. This group of gauss hybrid models are trained using the preset kind vocal print feature vector in training set, and the profit after the completion of training It is verified with the accuracy rate of this group of gauss hybrid models after verification set pair training;If accuracy rate be more than predetermined threshold value (for example, 98.5%), then training terminates, using this group of gauss hybrid models after training as background channel model ready for use, if alternatively, Accuracy rate is less than or equal to predetermined threshold value, then increases the quantity of voice data sample, and be trained again, until the group is high The accuracy rate of this mixed model is more than predetermined threshold value.
The background channel model that the present embodiment is trained in advance is by excavation to a large amount of voice data and to compare trained It arrives, this model can accurately portray background sound when user speaks while retaining the vocal print feature of user to greatest extent Line feature, and can remove this feature in identification, and the inherent feature of user voice is extracted, it can significantly improve use The accuracy rate and efficiency of family authentication.
In one embodiment, the distance between the current vocal print discriminant vectors of above-mentioned calculating and standard vocal print discriminant vectors, base Include in the step of distance of calculating generates authentication result:
Calculate the COS distance between the current vocal print discriminant vectors and standard vocal print discriminant vectors: For the standard vocal print discriminant vectors,For current vocal print discriminant vectors;If the COS distance is small In or equal to preset distance threshold, then the information being verified is generated;If the COS distance is more than preset apart from threshold Value, then generate verification not by information.
Wherein, User Identity can be carried when storing the standard vocal print discriminant vectors of user, verification user's When identity, corresponding standard vocal print discriminant vectors are obtained according to the identification information match of current vocal print discriminant vectors, and calculate and work as COS distance between preceding vocal print discriminant vectors and the standard vocal print discriminant vectors matched verifies target with COS distance The identity of user improves the accuracy of authentication.
Compared with prior art, the present invention using client computer, server and is held eventually when carrying out voice print verification The framework of composition, client computer is held to carry User Identity and made requests on to server, server generates and user's body Part identifies corresponding graphic code parameter and is sent to client computer, and the corresponding figure of display graphic code parameter is carried out for it Code, user are verified by chained address transmission random code to server using after the handheld terminal scanning figure shape code of carrying, Channel can be established with server by being verified, and obtain the voice data of the user of handheld terminal acquisition, carried out vocal print and tested Card, the present invention do not need the voice data of developed client-side program acquisition user, voice print verification are carried out using handheld terminal Flexibility is high and is not easy to be disturbed, and binds server and client computer using User Identity, recycles random code Client computer, server and handheld terminal are bound again, avoid the occurrence of the case where sound is kidnapped, improves voice print verification Authenticity and safety.
The present invention also provides a kind of computer readable storage medium, processing is stored on the computer readable storage medium The step of system, the processing system realizes the method for above-mentioned voice print verification when being executed by processor.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal equipment (can be mobile phone, computer, clothes Be engaged in device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of server, which is characterized in that the server includes memory and the processor that is connect with the memory, institute The processing system that is stored with and can run on the processor in memory is stated, when the processing system is executed by the processor Realize following steps:
Generation step generates after receiving the authentication request of carrying User Identity of client computer transmission The graphic code parameter of graphic code corresponding with the User Identity, and the graphic code parameter is sent to the client and is calculated Machine, generates for the client computer and shows corresponding with graphic code parameter graphic code, the graphic code parameter include with Machine secret key and voice print database acquisition link address;
Analytical procedure receives hand after handheld terminal parsing graphic code obtains random secret key and voice print database acquisition link address It holds terminal to ask by the voice print verification for carrying random secret key that voice print database acquisition link address is sent, and analyzes and be sent to Whether random secret key in the graphic code parameter of the client computer and the random secret key received from handheld terminal are consistent;
Obtaining step if so, establishing the data under voice channel with the handheld terminal, and is believed based on the data under voice Road obtains the current voice print verification voice data of the user acquired from the handheld terminal;
Verification step builds the corresponding current vocal print discriminant vectors of the current voice print verification voice data, according to scheduled user The mapping relations of identity and standard vocal print discriminant vectors, determine the corresponding standard vocal print of the User Identity differentiate to Amount, calculates the distance between current vocal print discriminant vectors and standard vocal print discriminant vectors, and the distance based on calculating generates identity and tests Card by the authentication result as a result, and be sent to the client computer.
2. server according to claim 1, which is characterized in that the analytical procedure specifically includes:
The server receives the vocal print for carrying random secret key that handheld terminal is sent by voice print database acquisition link address Whether checking request, the number that analysis receives the random secret key are more than preset times;
If being less than or equal to the preset times, analysis be sent to random secret key in the graphic code parameter of the client computer with Whether the random secret key received from handheld terminal is consistent.
3. server according to claim 1, which is characterized in that the graphic code parameter further include graphic code it is effective when Between, the analytical procedure specifically includes:
The server receives the vocal print for carrying random secret key that handheld terminal is sent by voice print database acquisition link address Whether checking request, the time that analysis receives the random secret key are within the scope of the effective time of the graphic code;
If within the scope of the effective time in the graphic code, whether the number that analysis receives the random secret key is more than default time Number;
If being less than or equal to the preset times, analysis be sent to random secret key in the graphic code parameter of the client computer with Whether the random secret key received from handheld terminal is consistent.
4. server according to any one of claims 1 to 3, which is characterized in that described structure current voice print verification language It the step of sound data corresponding current vocal print discriminant vectors, specifically includes:
Current voice print verification voice data is handled, to extract preset kind vocal print feature, and is based on the preset kind sound The corresponding vocal print feature vector of line feature construction;
In the background channel model that vocal print feature vector input is trained in advance, to build the current voice print verification voice data Corresponding current vocal print discriminant vectors;
Described to calculate the distance between current vocal print discriminant vectors and standard vocal print discriminant vectors, the distance based on calculating generates body The step of part verification result includes:
Calculate the COS distance between the current vocal print discriminant vectors and standard vocal print discriminant vectors: For The standard vocal print discriminant vectors,For current vocal print discriminant vectors;
If the COS distance is less than or equal to preset distance threshold, the information being verified is generated;
If the COS distance be more than preset distance threshold, generate verification not by information.
5. a kind of method of voice print verification, which is characterized in that the method for the voice print verification includes:
S1, after receiving the authentication request of carrying User Identity of client computer transmission, server generates The graphic code parameter of graphic code corresponding with the User Identity, and the graphic code parameter is sent to the client and is calculated Machine, generates for the client computer and shows corresponding with graphic code parameter graphic code, the graphic code parameter include with Machine secret key and voice print database acquisition link address;
S2, after handheld terminal parsing graphic code obtains random secret key and voice print database acquisition link address, the server connects It receives handheld terminal to ask by the voice print verification for carrying random secret key that voice print database acquisition link address is sent, and analyzes hair Whether give random secret key in the graphic code parameter of the client computer consistent with the random secret key that is received from handheld terminal;
S3 if so, the server establishes the data under voice channel with the handheld terminal, and is adopted based on the voice data Collection channel obtains the current voice print verification voice data of the user acquired from the handheld terminal;
S4 builds the corresponding current vocal print discriminant vectors of the current voice print verification voice data, according to scheduled user identity mark Know the mapping relations with standard vocal print discriminant vectors, determine the corresponding standard vocal print discriminant vectors of the User Identity, calculates Current the distance between vocal print discriminant vectors and standard vocal print discriminant vectors, the distance generation authentication based on calculating as a result, And the authentication result is sent to the client computer.
6. the method for voice print verification according to claim 5, which is characterized in that the step S2 is specifically included:
The server receives the vocal print for carrying random secret key that handheld terminal is sent by voice print database acquisition link address Whether checking request, the number that analysis receives the random secret key are more than preset times;
If being less than or equal to the preset times, analysis be sent to random secret key in the graphic code parameter of the client computer with Whether the random secret key received from handheld terminal is consistent.
7. the method for voice print verification according to claim 5, which is characterized in that the graphic code parameter further includes graphic code Effective time, the step S2 specifically includes:
The server receives the vocal print for carrying random secret key that handheld terminal is sent by voice print database acquisition link address Whether checking request, the time that analysis receives the random secret key are within the scope of the effective time of the graphic code;
If within the scope of the effective time in the graphic code, whether the number that analysis receives the random secret key is more than default time Number;
If being less than or equal to the preset times, analysis be sent to random secret key in the graphic code parameter of the client computer with Whether the random secret key received from handheld terminal is consistent.
8. according to the method for claim 5 to 7 any one of them voice print verification, which is characterized in that described structure current sound It the step of line validating speech data corresponding current vocal print discriminant vectors, specifically includes:
Current voice print verification voice data is handled, to extract preset kind vocal print feature, and is based on the preset kind sound The corresponding vocal print feature vector of line feature construction;
In the background channel model that vocal print feature vector input is trained in advance, to build the current voice print verification voice data Corresponding current vocal print discriminant vectors;
Described to calculate the distance between current vocal print discriminant vectors and standard vocal print discriminant vectors, the distance based on calculating generates body The step of part verification result includes:
Calculate the COS distance between the current vocal print discriminant vectors and standard vocal print discriminant vectors: For The standard vocal print discriminant vectors,For current vocal print discriminant vectors;
If the COS distance is less than or equal to preset distance threshold, the information being verified is generated;
If the COS distance be more than preset distance threshold, generate verification not by information.
9. the method for voice print verification according to claim 8, which is characterized in that described to current voice print verification voice data Handled, to extract preset kind vocal print feature, and based on the preset kind vocal print feature build corresponding vocal print feature to The step of amount, specifically includes:
Preemphasis, framing and windowing process are carried out to the current voice print verification voice data, Fourier is carried out to each adding window Leaf transformation obtains corresponding frequency spectrum, and the frequency spectrum is inputted Meier filter to export to obtain Meier frequency spectrum;
Cepstral analysis is carried out on Meier frequency spectrum to obtain mel-frequency cepstrum coefficient MFCC, is based on mel-frequency cepstrum system Number MFCC forms corresponding vocal print feature vector.
10. a kind of computer readable storage medium, which is characterized in that be stored with processing system on the computer readable storage medium System, when the processing system is executed by processor the method for voice print verification of the realization as described in any one of claim 5 to 9 Step.
CN201810457267.1A 2018-05-14 2018-05-14 Server, voiceprint verification method and storage medium Active CN108650266B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810457267.1A CN108650266B (en) 2018-05-14 2018-05-14 Server, voiceprint verification method and storage medium
PCT/CN2018/102049 WO2019218512A1 (en) 2018-05-14 2018-08-24 Server, voiceprint verification method, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810457267.1A CN108650266B (en) 2018-05-14 2018-05-14 Server, voiceprint verification method and storage medium

Publications (2)

Publication Number Publication Date
CN108650266A true CN108650266A (en) 2018-10-12
CN108650266B CN108650266B (en) 2020-02-18

Family

ID=63755329

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810457267.1A Active CN108650266B (en) 2018-05-14 2018-05-14 Server, voiceprint verification method and storage medium

Country Status (2)

Country Link
CN (1) CN108650266B (en)
WO (1) WO2019218512A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109462482A (en) * 2018-11-09 2019-03-12 深圳壹账通智能科技有限公司 Method for recognizing sound-groove, device, electronic equipment and computer readable storage medium
CN113129903A (en) * 2019-12-31 2021-07-16 深圳市航盛电子股份有限公司 Automatic audio test method and device, computer equipment and storage medium
CN113973299A (en) * 2020-07-22 2022-01-25 中国石油化工股份有限公司 Wireless sensor with identity authentication function and identity authentication method
WO2022017452A1 (en) * 2020-07-24 2022-01-27 Giesecke+Devrient Mobile Security Gmbh Identity authentication method, apparatus, devices and storage media

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050089172A1 (en) * 2003-10-24 2005-04-28 Aruze Corporation Vocal print authentication system and vocal print authentication program
CN107610707A (en) * 2016-12-15 2018-01-19 平安科技(深圳)有限公司 A kind of method for recognizing sound-groove and device
CN107993071A (en) * 2017-11-21 2018-05-04 平安科技(深圳)有限公司 Electronic device, auth method and storage medium based on vocal print

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2519571A (en) * 2013-10-25 2015-04-29 Aplcomp Oy Audiovisual associative authentication method and related system
CN105100123A (en) * 2015-09-11 2015-11-25 深圳市亚略特生物识别科技有限公司 Application registration method and system
CN107068154A (en) * 2017-03-13 2017-08-18 平安科技(深圳)有限公司 The method and system of authentication based on Application on Voiceprint Recognition

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050089172A1 (en) * 2003-10-24 2005-04-28 Aruze Corporation Vocal print authentication system and vocal print authentication program
CN107610707A (en) * 2016-12-15 2018-01-19 平安科技(深圳)有限公司 A kind of method for recognizing sound-groove and device
CN107993071A (en) * 2017-11-21 2018-05-04 平安科技(深圳)有限公司 Electronic device, auth method and storage medium based on vocal print

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109462482A (en) * 2018-11-09 2019-03-12 深圳壹账通智能科技有限公司 Method for recognizing sound-groove, device, electronic equipment and computer readable storage medium
CN109462482B (en) * 2018-11-09 2023-08-08 深圳壹账通智能科技有限公司 Voiceprint recognition method, voiceprint recognition device, electronic equipment and computer readable storage medium
CN113129903A (en) * 2019-12-31 2021-07-16 深圳市航盛电子股份有限公司 Automatic audio test method and device, computer equipment and storage medium
CN113973299A (en) * 2020-07-22 2022-01-25 中国石油化工股份有限公司 Wireless sensor with identity authentication function and identity authentication method
CN113973299B (en) * 2020-07-22 2023-09-29 中国石油化工股份有限公司 Wireless sensor with identity authentication function and identity authentication method
WO2022017452A1 (en) * 2020-07-24 2022-01-27 Giesecke+Devrient Mobile Security Gmbh Identity authentication method, apparatus, devices and storage media

Also Published As

Publication number Publication date
WO2019218512A1 (en) 2019-11-21
CN108650266B (en) 2020-02-18

Similar Documents

Publication Publication Date Title
CN107517207A (en) Server, auth method and computer-readable recording medium
CN107527620B (en) Electronic device, the method for authentication and computer readable storage medium
CN107993071A (en) Electronic device, auth method and storage medium based on vocal print
CN108650266A (en) Server, the method for voice print verification and storage medium
CN107977776B (en) Information processing method, device, server and computer readable storage medium
US11862176B2 (en) Reverberation compensation for far-field speaker recognition
CN108805091A (en) Method and apparatus for generating model
CN108154371A (en) Electronic device, the method for authentication and storage medium
CN107393541A (en) Information Authentication method and apparatus
WO2021051572A1 (en) Voice recognition method and apparatus, and computer device
CN109086719A (en) Method and apparatus for output data
CN108281158A (en) Voice biopsy method, server and storage medium based on deep learning
CN112466314A (en) Emotion voice data conversion method and device, computer equipment and storage medium
CN108694952A (en) Electronic device, the method for authentication and storage medium
CN110473552A (en) Speech recognition authentication method and system
CN109146492A (en) A kind of device and method of vehicle end mobile payment
CN112037800A (en) Voiceprint nuclear model training method and device, medium and electronic equipment
CN108630208B (en) Server, voiceprint-based identity authentication method and storage medium
CN111933154A (en) Method and device for identifying counterfeit voice and computer readable storage medium
CN109165570A (en) Method and apparatus for generating information
CN108664610A (en) Method and apparatus for handling data
CN116975823A (en) Data processing method, device, computer equipment, storage medium and product
CN115910071A (en) Identity authentication method and device, computer equipment and storage medium
CN113393318A (en) Bank card application wind control method and device, electronic equipment and medium
CN117174094A (en) Voiceprint recognition method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant