CN109063449A - Electronic equipment unlocking method and relevant apparatus based on vocal print - Google Patents
Electronic equipment unlocking method and relevant apparatus based on vocal print Download PDFInfo
- Publication number
- CN109063449A CN109063449A CN201811182704.XA CN201811182704A CN109063449A CN 109063449 A CN109063449 A CN 109063449A CN 201811182704 A CN201811182704 A CN 201811182704A CN 109063449 A CN109063449 A CN 109063449A
- Authority
- CN
- China
- Prior art keywords
- verified
- audio
- authentication
- video information
- determined
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 76
- 230000001755 vocal effect Effects 0.000 title claims abstract description 30
- 230000001815 facial effect Effects 0.000 claims abstract description 111
- 238000012795 verification Methods 0.000 claims description 69
- 238000004590 computer program Methods 0.000 claims description 13
- 238000004891 communication Methods 0.000 claims description 11
- 230000005611 electricity Effects 0.000 claims 1
- 230000006870 function Effects 0.000 description 16
- 238000010586 diagram Methods 0.000 description 14
- 238000012545 processing Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 6
- 230000009471 action Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 2
- 238000005192 partition Methods 0.000 description 2
- 230000000630 rising effect Effects 0.000 description 2
- 230000001052 transient effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Collating Specific Patterns (AREA)
Abstract
The embodiment of the present application discloses a kind of electronic equipment unlocking method and relevant apparatus based on vocal print, this method comprises: acquiring the audio/video information of object to be verified by audio and video acquisition devices, audio/video information includes facial image, voiceprint, voice content and lip reading information;Identifying object is treated according to audio/video information and carries out authentication, obtains the authentication of object to be verified as a result, authentication result is for characterizing the unlock permission whether object to be verified has electronic equipment;If it is determined that authentication result is the unlock permission that object to be verified has electronic equipment, then controlling electronic devices unlocks.The safety being unlocked to electronic equipment is helped to improve using the embodiment of the present application.
Description
Technical field
This application involves sound groove recognition technology in e fields, and in particular to a kind of electronic equipment unlocking method and phase based on vocal print
Close device.
Background technique
With the rapid development of science and technology, electronic equipment is more more and more universal, become in user's daily life it is close not
The a part that can divide.Currently, the unlocking manner of electronic equipment mainly has number, recognition of face, fingerprint recognition, iris etc., such as
The unlock that user carries out the unlock of mobile phone using recognition of face or user uses fingerprint recognition to carry out electronic lock.Above-mentioned electronics
The unlocking manner of equipment is easier to crack, and can replace fingerprint, Huo Zhetong by stealthy fingerprint film due to having been carried out at this stage
Resultant image, mask, 3D faceform are crossed instead of facial image, therefore safety is lower.
Summary of the invention
The embodiment of the present application provides a kind of electronic equipment unlocking method and relevant apparatus based on vocal print, helps to improve pair
The safety that electronic equipment is unlocked.
In a first aspect, the embodiment of the present application provides a kind of electronic equipment unlocking method based on vocal print, which comprises
The audio/video information of object to be verified is acquired by audio and video acquisition devices, the audio/video information includes face figure
Picture, voiceprint, voice content and lip reading information;
Authentication is carried out to the object to be verified according to the audio/video information, obtains the body of the object to be verified
Part verification result, the authentication result is for characterizing the unlock the permission whether object to be verified has electronic equipment;
If it is determined that the authentication result is the unlock permission that the object to be verified has electronic equipment, then institute is controlled
State electronic equipment unlock.
Second aspect, the embodiment of the present application provide a kind of electronic equipment tripper based on vocal print, and described device includes:
Acquisition unit, for acquiring the audio/video information of object to be verified, the audio-video by audio and video acquisition devices
Information includes facial image, voiceprint, voice content and lip reading information;
Authentication unit obtains described for carrying out authentication to the object to be verified according to the audio/video information
The authentication of object to be verified is as a result, the authentication result is used to characterize whether the object to be verified sets with electronics
Standby unlock permission;
Unlocking unit, for if it is determined that the authentication result is the unlock that the object to be verified has electronic equipment
Permission then controls the electronic equipment unlock.
The third aspect, the embodiment of the present application provide a kind of server, including processor, memory, communication interface and one
A or multiple programs, wherein said one or multiple programs are stored in above-mentioned memory, and are configured by above-mentioned processing
Device executes, and above procedure is included the steps that for executing the instruction in method described in the embodiment of the present application first aspect.
Fourth aspect, the embodiment of the present application provide a kind of terminal, including processor, memory, communication interface and one
Or multiple programs, wherein said one or multiple programs are stored in above-mentioned memory, and are configured by above-mentioned processor
It executes, above procedure is included the steps that for executing the instruction in method described in the embodiment of the present application first aspect.
5th aspect, the embodiment of the present application provide a kind of computer readable storage medium, above-mentioned computer-readable storage
For storing computer program, the computer program is executed by processor medium, to realize such as the embodiment of the present application first party
Step some or all of described in method described in face.
6th aspect, the embodiment of the present application provide a kind of computer program product, and above-mentioned computer program product includes
The non-transient computer readable storage medium of computer program is stored, above-mentioned computer program is operable to hold computer
Step some or all of described in method of the row as described in the embodiment of the present application first aspect.
As can be seen that in the embodiment of the present application, being regarded first by the sound that audio and video acquisition devices acquire object to be verified
Frequency information, audio/video information include facial image, voiceprint, voice content and lip reading information, are then regarded according to the sound of acquisition
Frequency information treats identifying object and carries out authentication, obtains the authentication of object to be verified as a result, last if it is determined that identity is tested
Card result is that there is object to be verified the unlocking right of electronic equipment to prescribe a time limit, then controlling electronic devices unlocks.Due to audio/video information
Including facial image, voiceprint, voice content and lip reading information, compared to only by recognition of face or fingerprint recognition judgement
Whether electronic equipment is unlocked, improves the safety being unlocked to electronic equipment to a certain extent.
These aspects or other aspects of the application can more straightforward in the following description.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application or in background technique below will be implemented the application
Attached drawing needed in example or background technique is illustrated.
Fig. 1 is a kind of configuration diagram of electronic equipment system for unlocking based on vocal print provided by the embodiments of the present application;
Fig. 2 is the flow diagram of the first electronic equipment unlocking method based on vocal print provided by the embodiments of the present application;
Fig. 3 is the flow diagram of the second provided by the embodiments of the present application electronic equipment unlocking method based on vocal print;
Fig. 4 is the flow diagram of the third electronic equipment unlocking method based on vocal print provided by the embodiments of the present application;
Fig. 5 is a kind of structural schematic diagram of electronic equipment tripper based on vocal print provided by the embodiments of the present application;
Fig. 6 is a kind of structural schematic diagram of server provided by the embodiments of the present application;
Fig. 7 is a kind of structural schematic diagram of terminal provided by the embodiments of the present application.
Specific implementation
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application
Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only
The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people
Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection
It encloses.
It is described in detail separately below.
The description and claims of this application and term " first ", " second ", " third " and " in the attached drawing
Four " etc. are not use to describe a particular order for distinguishing different objects.In addition, term " includes " and " having " and it
Any deformation, it is intended that cover and non-exclusive include.Such as it contains the process, method of a series of steps or units, be
System, product or equipment are not limited to listed step or unit, but optionally further comprising the step of not listing or list
Member, or optionally further comprising other step or units intrinsic for these process, methods, product or equipment.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments
It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical
Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and
Implicitly understand, embodiment described herein can be combined with other embodiments.
Hereinafter, the part term in the application is explained, in order to those skilled in the art understand that.
(1) terminal may include the various handheld devices with wireless communication function, mobile unit, wearable device, meter
Calculate equipment or be connected to radio modem other processing equipments and various forms of user equipment (User
Equipment, UE), mobile station (Mobile Station, MS), terminal device (Terminal Device, TD), etc..
(2) server, also referred to as servomechanism are to provide the equipment of the service of calculating.The composition of server includes processor, hard
Disk, memory, system bus etc. are similar with general computer architecture.In a network environment, the service class provided according to server
Type is different, is divided into file server, database server, apps server, WEB server etc..
It describes in detail below to the embodiment of the present application.
Referring to Fig. 1, Fig. 1 is a kind of framework of electronic equipment system for unlocking based on vocal print provided by the embodiments of the present application
Schematic diagram, being somebody's turn to do the electronic equipment system for unlocking based on vocal print includes control platform, audio and video acquisition devices, verifying device and unlock
Device, control platform and audio and video acquisition devices, verifying device, tripper all have connection relationship.Control platform transmission is adopted
To audio and video acquisition devices, acquisition instructions are used to indicate the audio-video letter that audio and video acquisition devices acquire object to be verified for collection instruction
Breath;Audio and video acquisition devices receive acquisition instructions and acquire the audio/video information of object to be verified;Control platform sends verifying and refers to
Extremely verifying device is enabled, verifying instruction is used to indicate verifying device and treats identifying object progress authentication;Verifying device reception is tested
Card instruction simultaneously treats identifying object progress authentication according to the audio/video information of acquisition, exports the authentication of object to be verified
As a result;If authentication unlock is the unlock permission that object to be verified has electronic equipment, control platform sends unlock instruction
To tripper, unlock instruction is used to indicate tripper and is unlocked to electronic equipment;Tripper receives unlock instruction simultaneously
Electronic device is unlocked.
Referring to Fig. 2, Fig. 2 is the stream of the first electronic equipment unlocking method based on vocal print provided by the embodiments of the present application
Journey schematic diagram, executing subject can be server, be also possible to terminal, are somebody's turn to do the electronic equipment unlocking method based on vocal print and include:
Step 201: the audio/video information of object to be verified, the audio/video information packet are acquired by audio and video acquisition devices
Include facial image, voiceprint, voice content and lip reading information.
Wherein, audio and video acquisition devices can be the camera with sound pick-up, be also possible to by not having sound pick-up
What camera and microphone formed.
Wherein, voiceprint is voiceprint map, and the abscissa of voiceprint map is the time, and ordinate is frequency.
Wherein, voice content is one section of content of text, and content of text can only include text, can also only include number,
It can also include text and number.
Wherein, lip reading information includes multiple lip reading instructions, and each lip reading instructs a corresponding text or number.
In a possible example, before the audio/video information that object to be verified is acquired by audio and video acquisition devices,
The method also includes:
The distance between the object to be verified and the audio and video acquisition devices are obtained by range sensor;
Judge whether the distance is less than or equal to the first setting value;
If it is determined that the distance is less than or equal to first setting value, then it is described by display equipment display reminding information
Prompt information includes target text content, and the prompt information is for prompting the object to be verified to read aloud in the target text
Hold.
Wherein, it is customized to can be user for the first setting value, is also possible to server or terminal is customized.
In a possible example, before the audio/video information that object to be verified is acquired by audio and video acquisition devices,
The method also includes:
Validation region is treated by the audio and video acquisition devices to be shot, and the corresponding mesh in the region to be verified is obtained
Logo image, the target image include at least one object to be verified;
Determine the target number at least one object to be verified that the target image includes;
Judge whether the target number is less than or equal to the second setting value;
Determine that the target number is less than or equal to second setting value.
Wherein, it is customized to can be user for the second setting value, is also possible to server or terminal is customized.
In a possible example, after the audio/video information that object to be verified is acquired by audio and video acquisition devices,
The method also includes:
The audio/video information is parsed, the corresponding image definition of the audio/video information and speech intelligibility are obtained;
Judge whether described image clarity is more than or equal to first threshold and whether the speech intelligibility is more than or equal to
Two threshold values;
If it is determined that described image clarity is more than or equal to the first threshold and the speech intelligibility is more than or equal to described
Second threshold, then trigger it is described authentication is carried out to the object to be verified according to the audio/video information, obtain it is described to
The operation of the authentication result of identifying object.
Specifically, audio/video information is parsed, the embodiment for obtaining the corresponding image definition of audio/video information may is that
If audio/video information includes multiple images, an at least image is chosen from multiple images;It determines every in an at least image
The clarity for opening image, obtains at least one corresponding image definition of an at least image;Determine at least one image clearly
The average value of degree, and using the average value of at least one image definition as the corresponding image definition of audio/video information.
Specifically, audio/video information is parsed, the embodiment for obtaining the corresponding speech intelligibility of audio/video information may is that
The sound power of audio/video information is obtained by sound transducer;The noise function of audio/video information is obtained by noise transducer
Rate;The signal-to-noise ratio of audio/video information is determined according to sound power and noise power;It is regarded the signal-to-noise ratio of audio/video information as sound
The speech intelligibility of frequency information.
Wherein, it is customized to may each be user for first threshold and second threshold, are also possible to server or terminal is made by oneself
Justice.
Step 202: authentication being carried out to the object to be verified according to the audio/video information, is obtained described to be verified
The authentication of object is as a result, the authentication result is used to characterize the solution whether object to be verified has electronic equipment
Lock permission.
In a possible example, authentication is carried out to the object to be verified according to the audio/video information, is obtained
To the authentication result of the object to be verified, comprising:
The audio/video information is parsed, the facial image of the object to be verified is obtained;
The face images stored in the facial image and facial image database are matched;
Judge in the face images with the presence or absence of target facial image, the target facial image be with it is described to
The matched facial image of the facial image of identifying object;
If it is determined that there are the target facial images, then the target is obtained from pre-stored matching times database
Corresponding first matching times of facial image, first matching times be the object current face images match to be verified at
The number of function;Wherein, the facial image successful match of the object to be verified every time, the corresponding matching time of the object to be verified
Number plus 1;
The corresponding target verification strategy of first matching times, the verifying are determined according to matching times and authentication policy
Strategy includes the first authentication policy, the second authentication policy and third authentication policy;
Authentication is carried out to the object to be verified according to the target verification strategy and the audio/video information, is obtained
The authentication result of the object to be verified.
Specifically, audio/video information is parsed, if the embodiment for obtaining the facial image of object to be verified may is that sound regards
Frequency information includes multiple facial images of object to be verified, determines the clarity of every facial image in multiple facial images, obtains
To the corresponding multiple clarity of multiple facial images;Using the corresponding facial image of utmost sharpness in multiple clarity as to be tested
Demonstrate,prove the facial image of object.
Specifically, judge in face images with the presence or absence of target facial image embodiment may is that determine to
The matching degree of every facial image, obtains in the face images stored in the facial image and facial image database of identifying object
The corresponding multiple matching degrees of face images;Judge to be more than or equal to third setting value with the presence or absence of matching degree in multiple matching degrees
Object matching degree;If it is determined that there are object matching degree, it is determined that the corresponding facial image of object matching degree is target face figure
Picture.Wherein, it is customized to can be user for third setting value, is also possible to server or terminal is customized.
Wherein, facial image database is pre-stored in server, every in the face images stored in facial image database
Open the corresponding matching times of facial image.
In a possible example, the corresponding mesh of first matching times is determined according to matching times and authentication policy
Mark authentication policy, comprising:
If first matching times are less than third threshold value, it is determined that the target verification strategy is the first verifying plan
Slightly;
If first matching times are more than or equal to the third threshold value and less than the 4th threshold values, it is determined that the target is tested
Card strategy is second authentication policy;
If first matching times are more than or equal to the 4th threshold value, it is determined that the target verification strategy is described the
Three authentication policies;
Wherein, the authentication policy sorts successively from high to low according to safety are as follows: described in the first authentication policy >
Third authentication policy described in second authentication policy >.
Wherein, it is customized to may each be user for third threshold value and the 4th threshold value, are also possible to server or terminal is made by oneself
Justice.
In a possible example, authentication is carried out to the object to be verified according to the audio/video information, is obtained
To the authentication result of the object to be verified, comprising:
The audio/video information is parsed, the facial image of the object to be verified is obtained;
The face images stored in the facial image and facial image database are matched;
Judge in the face images with the presence or absence of target facial image, the target facial image be with it is described to
The matched facial image of the facial image of identifying object;
If it is determined that then determining the target according to the corresponding relationship of number and authentication policy there are the target facial image
The corresponding target verification strategy of number;
Authentication is carried out to the object to be verified according to the target verification strategy and the audio/video information, is obtained
The authentication result of the object to be verified.
In a possible example, the target number is greater than second setting value, according to number and authentication policy
Determine the corresponding target verification strategy of the target number, comprising:
If the target number is in the first number interval, it is determined that the target verification strategy is the first verifying plan
Slightly;
If the target number is in the second number section, it is determined that the target verification strategy is the second verifying plan
Slightly;
If the target number is in third party's number interval, it is determined that the target verification strategy is that the third verifies plan
Slightly, the first number interval, second number section and third party's number interval increase in staged.
In a possible example, target verification strategy is first authentication policy, described to be tested according to the target
Card strategy and the audio/video information carry out authentication to the object to be verified, and the identity for obtaining the object to be verified is tested
Demonstrate,prove result, comprising:
The audio/video information is parsed, is obtained in corresponding first voiceprint of the audio/video information and the first voice
Hold, first voiceprint is voiceprint map, and first voice content is one section of content of text;
Judge whether first voice content and the first default voice content are identical;
If it is determined that first voice content is identical as the described first default voice content, then the first vocal print letter is judged
Whether breath matches with default voiceprint;
If it is determined that first voiceprint is matched with the default voiceprint, it is determined that the body of the object to be verified
Part verification result is the unlock permission that the object to be verified has electronic equipment.
Specifically, audio/video information is parsed, corresponding first voiceprint of audio/video information and the first voice content are obtained
Embodiment may is that audio/video information is parsed according to voiceprint recognition algorithm, obtain audio/video information corresponding
One voiceprint, the first voiceprint are the first voiceprint map, and the abscissa of the first voiceprint map is the time, and ordinate is frequency
Rate;Audio/video information is parsed according to speech recognition algorithm, obtains corresponding first voice content of audio/video information.
Wherein, the first default voice content is identical as target text content.
Wherein, default voiceprint refers to corresponding second voiceprint map of target text content.
Specifically, judge that the first voiceprint may is that with the whether matched embodiment of default voiceprint to described
First voiceprint map carries out intercept operation, obtains third voiceprint map, the initial time of the third voiceprint map and described the
The initial time of two voiceprint maps corresponds to identical content of text, the end time of the third voiceprint map and the rising tone
The end time of line map corresponds to identical content of text;Extract respectively the third voiceprint map N number of first frequency value and
N number of second frequency value of second voiceprint map, the N are more than or equal to 2 integers, N number of second frequency value and the N
A first frequency value corresponds, at the time of the corresponding first frequency value of each second frequency value corresponds to identical;According to institute
It states N number of first frequency value, N number of second frequency value and matching degree formula and determines the third voiceprint map and the rising tone
The matching degree of line voiceprint map;Judge whether the matching degree is more than or equal to the 4th setting value.Wherein, the 4th setting value can be
User is customized, is also possible to server or terminal is customized;If matching degree is more than or equal to the 4th setting value, it is determined that the
One voiceprint is matched with default voiceprint.
Wherein, matching degree formula are as follows:
Wherein, the D is the matching degree of the third voiceprint map and second voiceprint map, the x1It is N number of
1st first frequency value, the y in one frequency values1For the corresponding 1st second frequency value of the 1st first frequency value, the x2
For the 2nd first frequency value, the y in N number of first frequency value2For corresponding 2nd second frequency of the 2nd first frequency value
Value, the xNFor n-th first frequency value in N number of first frequency value, the yNFor the corresponding n-th of n-th first frequency value
Two frequency values.
In a possible example, target verification strategy is second authentication policy, described to be tested according to the target
Card strategy and the audio/video information carry out authentication to the object to be verified, and the identity for obtaining the object to be verified is tested
Demonstrate,prove result, comprising:
The audio/video information is parsed, corresponding second voice content of the audio/video information and the first lip reading letter are obtained
Breath, second voice content are one section of content of text, and the first lip reading information is the instruction of multiple first lip readings;
Judge whether second voice content and the second default voice content are identical;
If it is determined that second voice content is identical as the described second default voice content, then the first lip reading letter is judged
Whether breath matches with the first default lip reading information;
If it is determined that the first lip reading information and the described first default lip reading information matches, it is determined that the object to be verified
Authentication result be the object to be verified have electronic equipment unlock permission.
Wherein, each lip reading instructs a corresponding content of text.
Specifically, audio/video information is parsed, the embodiment for obtaining the corresponding first lip reading information of audio/video information can be with
It is: audio/video information is parsed according to lip reading recognizer, obtains the corresponding first lip reading information of audio/video information, first
Lip reading information is the instruction of multiple first lip readings, and multiple lip readings instruct corresponding first segment content of text.
Wherein, the second default voice content is identical as target text content.
Wherein, the first default lip reading information refers to the corresponding second segment content of text of target text content.
Wherein, judge that the first lip reading information judges in first segment text with whether the first default lip reading information matches to be equivalent to
Hold whether identical as second segment content of text.
In a possible example, target verification strategy is the third authentication policy, described to be tested according to the target
Card strategy and the audio/video information carry out authentication to the object to be verified, and the identity for obtaining the object to be verified is tested
Demonstrate,prove result, comprising:
The audio/video information is parsed, the corresponding second lip reading information of the audio/video information, second lip reading are obtained
Information includes multiple second lip reading instructions;
Judge whether the second lip reading information matches with the second default lip reading information;
If it is determined that the second lip reading information and the described second default lip reading information matches, it is determined that the object to be verified
Authentication result be the object to be verified have electronic equipment unlock permission.
Wherein, the second lip reading information corresponds to third section content of text.
Wherein, the second default lip reading information refers to the corresponding second segment content of text of target text content.
Wherein, judge that the second lip reading information judges in third section text with whether the second default lip reading information matches to be equivalent to
Hold whether identical as second segment content of text.
Step 203: if it is determined that the authentication result is the unlock permission that the object to be verified has electronic equipment,
Then control the electronic equipment unlock.
Wherein, electronic equipment can be terminal, be also possible to electronic lock, door-control lock.
As can be seen that in the embodiment of the present application, being regarded first by the sound that audio and video acquisition devices acquire object to be verified
Frequency information, audio/video information include facial image, voiceprint, voice content and lip reading information, are then regarded according to the sound of acquisition
Frequency information treats identifying object and carries out authentication, obtains the authentication of object to be verified as a result, last if it is determined that identity is tested
Card result is that there is object to be verified the unlocking right of electronic equipment to prescribe a time limit, then controlling electronic devices unlocks.Due to audio/video information
Including facial image, voiceprint, voice content and lip reading information, compared to only by recognition of face or fingerprint recognition judgement
Whether electronic equipment is unlocked, improves the safety being unlocked to electronic equipment to a certain extent.
Referring to Fig. 3, Fig. 3 is the stream of the second provided by the embodiments of the present application electronic equipment unlocking method based on vocal print
Journey schematic diagram, executing subject can be server, be also possible to terminal, are somebody's turn to do the electronic equipment unlocking method based on vocal print and include:
Step 301: the audio/video information of object to be verified, the audio/video information packet are acquired by audio and video acquisition devices
Include facial image, voiceprint, voice content and lip reading information.
Step 302: parsing the audio/video information, obtain the facial image of the object to be verified.
Step 303: the face images stored in the facial image and facial image database are matched.
Step 304: judging that, with the presence or absence of target facial image in the face images, the target facial image is
With the matched facial image of facial image of the object to be verified.
Step 305: if it is determined that there are the target facial images, then being obtained from pre-stored matching times database
Corresponding first matching times of the target facial image, first matching times are the object current face figure to be verified
As the number of successful match;Wherein, the facial image successful match of the object to be verified, the object to be verified are corresponding every time
Matching times add 1.
Step 306: if first matching times are less than third threshold value, it is determined that the target verification strategy is described the
One authentication policy.
Step 307: parsing the audio/video information, obtain corresponding first voiceprint of the audio/video information and first
Voice content, first voiceprint are voiceprint map, and first voice content is one section of content of text.
Step 308: judging whether first voice content and the first default voice content are identical.
Step 309: if it is determined that first voice content is identical as the described first default voice content, then judging described
Whether one voiceprint matches with default voiceprint.
Step 310: if it is determined that first voiceprint is matched with the default voiceprint, it is determined that described to be verified
The authentication result of object is the unlock permission that the object to be verified has electronic equipment.
Step 311: controlling the electronic equipment unlock.
It should be noted that the specific implementation process of each step of method shown in Fig. 3 can be found in described in the above method
Specific implementation process, no longer describe herein.
Referring to Fig. 4, Fig. 4 is the stream of the third electronic equipment unlocking method based on vocal print provided by the embodiments of the present application
Journey schematic diagram, executing subject can be server, be also possible to terminal, are somebody's turn to do the electronic equipment unlocking method based on vocal print and include:
Step 401: the audio/video information of object to be verified, the audio/video information packet are acquired by audio and video acquisition devices
Include facial image, voiceprint, voice content and lip reading information.
Step 402: parsing the audio/video information, obtain the facial image of the object to be verified.
Step 403: the face images stored in the facial image and facial image database are matched;
Step 404: judging that, with the presence or absence of target facial image in the face images, the target facial image is
With the matched facial image of facial image of the object to be verified.
Step 405: if it is determined that there are the target facial images, then being obtained from pre-stored matching times database
Corresponding first matching times of the target facial image, first matching times are the object current face figure to be verified
As the number of successful match;Wherein, the facial image successful match of the object to be verified, the object to be verified are corresponding every time
Matching times add 1.
Step 406: if first matching times are more than or equal to the third threshold value and less than the 4th threshold value, it is determined that institute
Stating target verification strategy is second authentication policy.
Step 407: parsing the audio/video information, obtain corresponding second voice content of the audio/video information and first
Lip reading information, second voice content are one section of content of text, and the first lip reading information is the instruction of multiple first lip readings.
Step 408: judging whether second voice content and the second default voice content are identical.
Step 409: if it is determined that second voice content is identical as the described second default voice content, then judging described
Whether one lip reading information matches with the first default lip reading information.
Step 410: if it is determined that the first lip reading information and the described first default lip reading information matches, it is determined that it is described to
The authentication result of identifying object is the unlock permission that the object to be verified has electronic equipment.
Step 411: controlling the electronic equipment unlock.
It should be noted that the specific implementation process of each step of method shown in Fig. 4 can be found in described in the above method
Specific implementation process, no longer describe herein.
It is above-mentioned that mainly the scheme of the embodiment of the present application is described from the angle of method side implementation procedure.It is understood that
, in order to realize the above functions, it comprises executing, each function is hard accordingly for the electronic equipment tripper based on vocal print
Part structure and/or software module.Those skilled in the art should be readily appreciated that, retouch in conjunction with the embodiments described herein
Each exemplary unit and algorithm steps stated, the application can be come real with the combining form of hardware or hardware and computer software
It is existing.Some functions is executed in a manner of hardware or computer software driving hardware actually, depending on the specific of technical solution
Using and design constraint.Professional technician can to it is each specifically realized using distinct methods it is described
Function, but this realization is it is not considered that exceed scope of the present application.
The embodiment of the present application can carry out function to the electronic equipment tripper based on vocal print according to above method example
The division of unit, for example, each functional unit of each function division can be corresponded to, it can also be by two or more functions
It is integrated in a processing unit.Above-mentioned integrated unit both can take the form of hardware realization, can also use software function
The form of energy unit is realized.It should be noted that be to the division of unit in the embodiment of the present application it is schematical, it is only a kind of
Logical function partition, there may be another division manner in actual implementation.
Referring to Fig. 5, Fig. 5 is a kind of structure of electronic equipment tripper based on vocal print provided by the embodiments of the present application
Schematic diagram should include processing unit 501, storage unit 502 and communication unit based on the electronic equipment tripper 500 of vocal print
503, processing unit 501 includes acquisition unit, authentication unit and unlocking unit, in which:
Acquisition unit, for acquiring the audio/video information of object to be verified, the audio-video by audio and video acquisition devices
Information includes facial image, voiceprint, voice content and lip reading information;
Authentication unit obtains described for carrying out authentication to the object to be verified according to the audio/video information
The authentication of object to be verified is as a result, the authentication result is used to characterize whether the object to be verified sets with electronics
Standby unlock permission;
Unlocking unit, for if it is determined that the authentication result is the unlock that the object to be verified has electronic equipment
Permission then controls the electronic equipment unlock.
As it can be seen that in this example, the audio/video information of object to be verified, sound view are acquired by audio and video acquisition devices first
Frequency information includes facial image, voiceprint, voice content and lip reading information, then according to the audio/video information of acquisition to be tested
It demonstrate,proves object and carries out authentication, obtain the authentication of object to be verified as a result, last if it is determined that authentication result is to be tested
There is card object the unlocking right of electronic equipment to prescribe a time limit, then controlling electronic devices unlocks.Due to audio/video information include facial image,
Voiceprint, voice content and lip reading information, judge whether to set electronics compared to only by recognition of face or fingerprint recognition
It is standby to be unlocked, the safety being unlocked to electronic equipment is improved to a certain extent.
In a possible example, it is described by audio and video acquisition devices acquire object to be verified audio/video information it
Afterwards, above-mentioned processing unit 501 further include:
Resolution unit, for parsing the audio/video information, obtain the corresponding image definition of the audio/video information and
Speech intelligibility;
Judging unit, for judging whether described image clarity is more than or equal to first threshold and the speech intelligibility is
It is no to be more than or equal to second threshold;
Determination unit, for determining that described image clarity is more than or equal to the first threshold and the speech intelligibility
More than or equal to the second threshold.
In a possible example, authentication is being carried out to the object to be verified according to the audio/video information,
In terms of obtaining the authentication result of the object to be verified, above-mentioned authentication unit is specifically used for:
The audio/video information is parsed, the facial image of the object to be verified is obtained;
The face images stored in the facial image and facial image database are matched;
Judge in the face images with the presence or absence of target facial image, the target facial image be with it is described to
The matched facial image of the facial image of identifying object;
If it is determined that there are the target facial images, then the target is obtained from pre-stored matching times database
Corresponding first matching times of facial image, first matching times be the object current face images match to be verified at
The number of function;Wherein, the facial image successful match of the object to be verified every time, the corresponding matching time of the object to be verified
Number plus 1;
The corresponding target verification strategy of first matching times, the verifying are determined according to matching times and authentication policy
Strategy includes the first authentication policy, the second authentication policy and third authentication policy;
Authentication is carried out to the object to be verified according to the target verification strategy and the audio/video information, is obtained
The authentication result of the object to be verified.
In a possible example, determining that first matching times are corresponding according to matching times and authentication policy
In terms of target verification strategy, above-mentioned authentication unit is specifically used for:
If first matching times are less than third threshold value, it is determined that the target verification strategy is the first verifying plan
Slightly;
If first matching times are more than or equal to the third threshold value and less than the 4th threshold values, it is determined that the target is tested
Card strategy is second authentication policy;
If first matching times are more than or equal to the 4th threshold value, it is determined that the target verification strategy is described the
Three authentication policies;
Wherein, the authentication policy according to safety from high to low successively are as follows: second described in the first authentication policy >
Third authentication policy described in authentication policy >.
In a possible example, the target verification strategy is first authentication policy, according to the target
Authentication policy and the audio/video information carry out authentication to the object to be verified, obtain the identity of the object to be verified
In terms of verification result, above-mentioned authentication unit is specifically used for:
The audio/video information is parsed, is obtained in corresponding first voiceprint of the audio/video information and the first voice
Hold, first voiceprint is voiceprint map, and first voice content is one section of content of text;
Judge whether first voice content and the first default voice content are identical;
If it is determined that first voice content is identical as the described first default voice content, then the first vocal print letter is judged
Whether breath matches with default voiceprint;
If it is determined that first voiceprint is matched with the default voiceprint, it is determined that the body of the object to be verified
Part verification result is the unlock permission that the object to be verified has electronic equipment.
In a possible example, the target verification strategy is second authentication policy, according to the target
Authentication policy and the audio/video information carry out authentication to the object to be verified, obtain the identity of the object to be verified
In terms of verification result, above-mentioned authentication unit is specifically used for:
The audio/video information is parsed, corresponding second voice content of the audio/video information and the first lip reading letter are obtained
Breath, second voice content are one section of content of text, and the first lip reading information is the instruction of multiple first lip readings;
Judge whether second voice content and the second default voice content are identical;
If it is determined that second voice content is identical as the described second default voice content, then the first lip reading letter is judged
Whether breath matches with the first default lip reading information;
If it is determined that the first lip reading information and the described first default lip reading information matches, it is determined that the object to be verified
Authentication result be the object to be verified have electronic equipment unlock permission.
In a possible example, the target verification strategy is the third authentication policy, according to the target
Authentication policy and the audio/video information carry out authentication to the object to be verified, obtain the identity of the object to be verified
In terms of verification result, above-mentioned authentication unit is specifically used for:
The audio/video information is parsed, the corresponding second lip reading information of the audio/video information, second lip reading are obtained
Information includes multiple second lip reading instructions;
Judge whether the second lip reading information matches with the second default lip reading information;
If it is determined that the second lip reading information and the described second default lip reading information matches, it is determined that the object to be verified
Authentication result be the object to be verified have electronic equipment unlock permission.
Wherein, processing unit 501 can be processor or controller, (such as can be central processing unit (Central
Processing Unit, CPU), general processor, digital signal processor (Digital Signal Processor, DSP),
Dedicated integrated manipulator (Application-Specific Integrated Circuit, ASIC), field programmable gate array
It is (Field Programmable Gate Array, FPGA) or other programmable logic device, transistor logic, hard
Part component or any combination thereof.Storage unit 502 can be memory, and communication unit 503 can be transceiver, transmitting-receiving control
Device, radio frequency chip, communication interface etc..
It is consistent with above-mentioned Fig. 2, Fig. 3 and embodiment shown in Fig. 4, referring to Fig. 6, Fig. 6 is that the embodiment of the present application provides
A kind of server structural schematic diagram, which includes processor, memory, communication interface and one or more journey
Sequence, wherein said one or multiple programs are stored in above-mentioned memory, and are configured to be executed by above-mentioned processor, on
Stating program includes the instruction for executing following steps:
The audio/video information of object to be verified is acquired by audio and video acquisition devices, the audio/video information includes face figure
Picture, voiceprint, voice content and lip reading information;
Authentication is carried out to the object to be verified according to the audio/video information, obtains the body of the object to be verified
Part verification result, the authentication result is for characterizing the unlock the permission whether object to be verified has electronic equipment;
If it is determined that the authentication result is the unlock permission that the object to be verified has electronic equipment, then institute is controlled
State electronic equipment unlock.
As it can be seen that in this example, the audio/video information of object to be verified, sound view are acquired by audio and video acquisition devices first
Frequency information includes facial image, voiceprint, voice content and lip reading information, then according to the audio/video information of acquisition to be tested
It demonstrate,proves object and carries out authentication, obtain the authentication of object to be verified as a result, last if it is determined that authentication result is to be tested
There is card object the unlocking right of electronic equipment to prescribe a time limit, then controlling electronic devices unlocks.Due to audio/video information include facial image,
Voiceprint, voice content and lip reading information, judge whether to set electronics compared to only by recognition of face or fingerprint recognition
It is standby to be unlocked, the safety being unlocked to electronic equipment is improved to a certain extent.
In a possible example, it is described by audio and video acquisition devices acquire object to be verified audio/video information it
Afterwards, above procedure further includes the instruction for executing following steps:
The audio/video information is parsed, the corresponding image definition of the audio/video information and speech intelligibility are obtained;
Judge whether described image clarity is more than or equal to first threshold and whether the speech intelligibility is more than or equal to
Two threshold values;
If it is determined that described image clarity is more than or equal to the first threshold and the speech intelligibility is more than or equal to described
Second threshold, then trigger it is described authentication is carried out to the object to be verified according to the audio/video information, obtain it is described to
The operation of the authentication result of identifying object.
In a possible example, authentication is being carried out to the object to be verified according to the audio/video information,
In terms of obtaining the authentication result of the object to be verified, above procedure includes the instruction specifically for executing following steps:
The audio/video information is parsed, the facial image of the object to be verified is obtained;
The face images stored in the facial image and facial image database are matched;
Judge in the face images with the presence or absence of target facial image, the target facial image be with it is described to
The matched facial image of the facial image of identifying object;
If it is determined that there are the target facial images, then the target is obtained from pre-stored matching times database
Corresponding first matching times of facial image, first matching times be the object current face images match to be verified at
The number of function;Wherein, the facial image successful match of the object to be verified every time, the corresponding matching time of the object to be verified
Number plus 1;
The corresponding target verification strategy of first matching times, the verifying are determined according to matching times and authentication policy
Strategy includes the first authentication policy, the second authentication policy and third authentication policy;
Authentication is carried out to the object to be verified according to the target verification strategy and the audio/video information, is obtained
The authentication result of the object to be verified.
In a possible example, determining that first matching times are corresponding according to matching times and authentication policy
In terms of target verification strategy, above procedure includes the instruction specifically for executing following steps:
If first matching times are less than third threshold value, it is determined that the target verification strategy is the first verifying plan
Slightly;
If first matching times are more than or equal to the third threshold value and less than the 4th threshold values, it is determined that the target is tested
Card strategy is second authentication policy;
If first matching times are more than or equal to the 4th threshold value, it is determined that the target verification strategy is described the
Three authentication policies;
Wherein, the authentication policy sorts successively from high to low according to safety are as follows: described in the first authentication policy >
Third authentication policy described in second authentication policy >.
In a possible example, the target verification strategy is first authentication policy, according to the target
Authentication policy and the audio/video information carry out authentication to the object to be verified, obtain the identity of the object to be verified
In terms of verification result, above procedure includes the instruction specifically for following steps:
The audio/video information is parsed, is obtained in corresponding first voiceprint of the audio/video information and the first voice
Hold, first voiceprint is voiceprint map, and first voice content is one section of content of text;
Judge whether first voice content and the first default voice content are identical;
If it is determined that first voice content is identical as the described first default voice content, then the first vocal print letter is judged
Whether breath matches with default voiceprint;
If it is determined that first voiceprint is matched with the default voiceprint, it is determined that the body of the object to be verified
Part verification result is the unlock permission that the object to be verified has electronic equipment.
In a possible example, the target verification strategy is second authentication policy, according to the target
Authentication policy and the audio/video information carry out authentication to the object to be verified, obtain the identity of the object to be verified
In terms of verification result, above procedure includes the instruction specifically for executing following steps:
The audio/video information is parsed, corresponding second voice content of the audio/video information and the first lip reading letter are obtained
Breath, second voice content are one section of content of text, and the first lip reading information is the instruction of multiple first lip readings;
Judge whether second voice content and the second default voice content are identical;
If it is determined that second voice content is identical as the described second default voice content, then the first lip reading letter is judged
Whether breath matches with the first default lip reading information;
If it is determined that the first lip reading information and the described first default lip reading information matches, it is determined that the object to be verified
Authentication result be the object to be verified have electronic equipment unlock permission.
In a possible example, the target verification strategy is the third authentication policy, according to the target
Authentication policy and the audio/video information carry out authentication to the object to be verified, obtain the identity of the object to be verified
In terms of verification result, above procedure includes the instruction specifically for executing following steps:
The audio/video information is parsed, the corresponding second lip reading information of the audio/video information, second lip reading are obtained
Information includes multiple second lip reading instructions;
Judge whether the second lip reading information matches with the second default lip reading information;
If it is determined that the second lip reading information and the described second default lip reading information matches, it is determined that the object to be verified
Authentication result be the object to be verified have electronic equipment unlock permission.
It is consistent with above-mentioned Fig. 2, Fig. 3 and embodiment shown in Fig. 4, referring to Fig. 7, Fig. 7 is that the embodiment of the present application provides
A kind of terminal structural schematic diagram, which includes processor, memory, communication interface and one or more program,
In, said one or multiple programs are stored in above-mentioned memory, and are configured to be executed by above-mentioned processor, above procedure
Including the instruction for executing following steps:
The audio/video information of object to be verified is acquired by audio and video acquisition devices, the audio/video information includes face figure
Picture, voiceprint, voice content and lip reading information;
Authentication is carried out to the object to be verified according to the audio/video information, obtains the body of the object to be verified
Part verification result, the authentication result is for characterizing the unlock the permission whether object to be verified has electronic equipment;
If it is determined that the authentication result is the unlock permission that the object to be verified has electronic equipment, then institute is controlled
State electronic equipment unlock.
As it can be seen that in this example, the audio/video information of object to be verified, sound view are acquired by audio and video acquisition devices first
Frequency information includes facial image, voiceprint, voice content and lip reading information, then according to the audio/video information of acquisition to be tested
It demonstrate,proves object and carries out authentication, obtain the authentication of object to be verified as a result, last if it is determined that authentication result is to be tested
There is card object the unlocking right of electronic equipment to prescribe a time limit, then controlling electronic devices unlocks.Due to audio/video information include facial image,
Voiceprint, voice content and lip reading information, judge whether to set electronics compared to only by recognition of face or fingerprint recognition
It is standby to be unlocked, the safety being unlocked to electronic equipment is improved to a certain extent.
In a possible example, it is described by audio and video acquisition devices acquire object to be verified audio/video information it
Afterwards, above procedure further includes the instruction for executing following steps:
The audio/video information is parsed, the corresponding image definition of the audio/video information and speech intelligibility are obtained;
Judge whether described image clarity is more than or equal to first threshold and whether the speech intelligibility is more than or equal to
Two threshold values;
If it is determined that described image clarity is more than or equal to the first threshold and the speech intelligibility is more than or equal to described
Second threshold, then trigger it is described authentication is carried out to the object to be verified according to the audio/video information, obtain it is described to
The operation of the authentication result of identifying object.
In a possible example, authentication is being carried out to the object to be verified according to the audio/video information,
In terms of obtaining the authentication result of the object to be verified, above procedure includes the instruction specifically for executing following steps:
The audio/video information is parsed, the facial image of the object to be verified is obtained;
The face images stored in the facial image and facial image database are matched;
Judge in the face images with the presence or absence of target facial image, the target facial image be with it is described to
The matched facial image of the facial image of identifying object;
If it is determined that there are the target facial images, then the target is obtained from pre-stored matching times database
Corresponding first matching times of facial image, first matching times be the object current face images match to be verified at
The number of function;Wherein, the facial image successful match of the object to be verified every time, the corresponding matching time of the object to be verified
Number plus 1;
The corresponding target verification strategy of first matching times, the verifying are determined according to matching times and authentication policy
Strategy includes the first authentication policy, the second authentication policy and third authentication policy;
Authentication is carried out to the object to be verified according to the target verification strategy and the audio/video information, is obtained
The authentication result of the object to be verified.
In a possible example, determining that first matching times are corresponding according to matching times and authentication policy
In terms of target verification strategy, above procedure includes the instruction specifically for executing following steps:
If first matching times are less than third threshold value, it is determined that the target verification strategy is the first verifying plan
Slightly;
If first matching times are more than or equal to the third threshold value and less than the 4th threshold values, it is determined that the target is tested
Card strategy is second authentication policy;
If first matching times are more than or equal to the 4th threshold value, it is determined that the target verification strategy is described the
Three authentication policies;
Wherein, the authentication policy sorts successively from high to low according to safety are as follows: described in the first authentication policy >
Third authentication policy described in second authentication policy >.
In a possible example, the target verification strategy is first authentication policy, according to the target
Authentication policy and the audio/video information carry out authentication to the object to be verified, obtain the identity of the object to be verified
In terms of verification result, above procedure includes the instruction specifically for following steps:
The audio/video information is parsed, is obtained in corresponding first voiceprint of the audio/video information and the first voice
Hold, first voiceprint is voiceprint map, and first voice content is one section of content of text;
Judge whether first voice content and the first default voice content are identical;
If it is determined that first voice content is identical as the described first default voice content, then the first vocal print letter is judged
Whether breath matches with default voiceprint;
If it is determined that first voiceprint is matched with the default voiceprint, it is determined that the body of the object to be verified
Part verification result is the unlock permission that the object to be verified has electronic equipment.
In a possible example, the target verification strategy is second authentication policy, according to the target
Authentication policy and the audio/video information carry out authentication to the object to be verified, obtain the identity of the object to be verified
In terms of verification result, above procedure includes the instruction specifically for executing following steps:
The audio/video information is parsed, corresponding second voice content of the audio/video information and the first lip reading letter are obtained
Breath, second voice content are one section of content of text, and the first lip reading information is the instruction of multiple first lip readings;
Judge whether second voice content and the second default voice content are identical;
If it is determined that second voice content is identical as the described second default voice content, then the first lip reading letter is judged
Whether breath matches with the first default lip reading information;
If it is determined that the first lip reading information and the described first default lip reading information matches, it is determined that the object to be verified
Authentication result be the object to be verified have electronic equipment unlock permission.
In a possible example, the target verification strategy is the third authentication policy, according to the target
Authentication policy and the audio/video information carry out authentication to the object to be verified, obtain the identity of the object to be verified
In terms of verification result, above procedure includes the instruction specifically for executing following steps:
The audio/video information is parsed, the corresponding second lip reading information of the audio/video information, second lip reading are obtained
Information includes multiple second lip reading instructions;
Judge whether the second lip reading information matches with the second default lip reading information;
If it is determined that the second lip reading information and the described second default lip reading information matches, it is determined that the object to be verified
Authentication result be the object to be verified have electronic equipment unlock permission.
The embodiment of the present application also provides a kind of computer storage medium, and the computer storage medium is for storing computer journey
Sequence, the computer program are executed by processor, with realize part as either recorded method in above method embodiment or
Overall Steps.
The embodiment of the present application also provides a kind of computer program product, and above-mentioned computer program product includes storing calculating
The non-transient computer readable storage medium of machine program, above-mentioned computer program are operable to that computer is made to execute such as above-mentioned side
Some or all of either record method step in method embodiment.The computer program product can be a software installation
Packet.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of
Combination of actions, but those skilled in the art should understand that, the application is not limited by the described action sequence because
According to the application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know
It knows, the embodiments described in the specification are all preferred embodiments, related actions and modules not necessarily the application
It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way
It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of said units, it is only a kind of
Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can
To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit,
It can be electrical or other forms.
Above-mentioned unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If above-mentioned integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer-readable access to memory.Based on this understanding, the technical solution of the application substantially or
Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products
Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment
(can be personal computer, server or network equipment etc.) executes all or part of each embodiment above method of the application
Step.And memory above-mentioned includes: USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory
The various media that can store program code such as (RAM, Random Access Memory), mobile hard disk, magnetic or disk.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can
It is completed with instructing relevant hardware by program, which can store in a computer-readable memory, memory
May include: flash disk, read-only memory (English: Read-Only Memory, referred to as: ROM), random access device (English:
Random Access Memory, referred to as: RAM), disk or CD etc..
The embodiment of the present application is described in detail above, specific case used herein to the principle of the application and
Embodiment is expounded, the description of the example is only used to help understand the method for the present application and its core ideas;
At the same time, for those skilled in the art can in specific implementation and application range according to the thought of the application
There is change place, to sum up above-mentioned, the contents of this specification should not be construed as limiting the present application.
Claims (10)
1. a kind of electronic equipment unlocking method based on vocal print, which is characterized in that the described method includes:
Acquire the audio/video information of object to be verified by audio and video acquisition devices, the audio/video information include facial image,
Voiceprint, voice content and lip reading information;
Authentication is carried out to the object to be verified according to the audio/video information, the identity for obtaining the object to be verified is tested
Card is as a result, the authentication result is used to characterize the unlock the permission whether object to be verified has electronic equipment;
If it is determined that the authentication result is the unlock permission that the object to be verified has electronic equipment, then the electricity is controlled
Sub- equipment unlock.
2. the method according to claim 1, wherein described acquire object to be verified by audio and video acquisition devices
Audio/video information after, the method also includes:
The audio/video information is parsed, the corresponding image definition of the audio/video information and speech intelligibility are obtained;
Judge whether described image clarity is more than or equal to first threshold and whether the speech intelligibility is more than or equal to the second threshold
Value;
If it is determined that described image clarity is more than or equal to the first threshold and the speech intelligibility is more than or equal to described second
Threshold value, then trigger it is described authentication is carried out to the object to be verified according to the audio/video information, obtain described to be verified
The operation of the authentication result of object.
3. according to the method described in claim 2, it is characterized in that, it is described according to the audio/video information to described to be verified right
As carrying out authentication, the authentication result of the object to be verified is obtained, comprising:
The audio/video information is parsed, the facial image of the object to be verified is obtained;
The face images stored in the facial image and facial image database are matched;
Judge in the face images with the presence or absence of target facial image, the target facial image be with it is described to be verified
The matched facial image of the facial image of object;
If it is determined that there are the target facial images, then the target face is obtained from pre-stored matching times database
Corresponding first matching times of image, first matching times are that the object current face images match to be verified is successful
Number;Wherein, the facial image successful match of the object to be verified every time, the corresponding matching times of the object to be verified add
1;
The corresponding target verification strategy of first matching times, the authentication policy are determined according to matching times and authentication policy
Including the first authentication policy, the second authentication policy and third authentication policy;
Authentication is carried out to the object to be verified according to the target verification strategy and the audio/video information, is obtained described
The authentication result of object to be verified.
4. according to the method described in claim 3, it is characterized in that, described determine described according to matching times and authentication policy
The corresponding target verification strategy of one matching times, comprising:
If first matching times are less than third threshold value, it is determined that the target verification strategy is first authentication policy;
If first matching times are more than or equal to the third threshold value and less than the 4th threshold values, it is determined that the target verification plan
Slightly described second authentication policy;
If first matching times are more than or equal to the 4th threshold value, it is determined that the target verification strategy is that the third is tested
Card strategy;
Wherein, the authentication policy sorts successively from high to low according to safety are as follows: second described in the first authentication policy >
Third authentication policy described in authentication policy >.
5. according to the method described in claim 4, it is characterized in that, the target verification strategy be first authentication policy,
It is described that authentication is carried out to the object to be verified according to the target verification strategy and the audio/video information, it obtains described
The authentication result of object to be verified, comprising:
The audio/video information is parsed, corresponding first voiceprint of the audio/video information and the first voice content, institute are obtained
Stating the first voiceprint is voiceprint map, and first voice content is one section of content of text;
Judge whether first voice content and the first default voice content are identical;
If it is determined that first voice content is identical as the described first default voice content, then judge first voiceprint with
Whether default voiceprint matches;
If it is determined that first voiceprint is matched with the default voiceprint, it is determined that the identity of the object to be verified is tested
Demonstrate,proving result is the unlock permission that the object to be verified has electronic equipment.
6. according to the method described in claim 4, it is characterized in that, the target verification strategy be second authentication policy,
It is described that authentication is carried out to the object to be verified according to the target verification strategy and the audio/video information, it obtains described
The authentication result of object to be verified, comprising:
The audio/video information is parsed, corresponding second voice content of the audio/video information and the first lip reading information, institute are obtained
Stating the second voice content is one section of content of text, and the first lip reading information is the instruction of multiple first lip readings;
Judge whether second voice content and the second default voice content are identical;
If it is determined that second voice content is identical as the described second default voice content, then judge the first lip reading information with
Whether the first default lip reading information matches;
If it is determined that the first lip reading information and the described first default lip reading information matches, it is determined that the body of the object to be verified
Part verification result is the unlock permission that the object to be verified has electronic equipment.
7. according to the method described in claim 4, it is characterized in that, the target verification strategy be the third authentication policy,
It is described that authentication is carried out to the object to be verified according to the target verification strategy and the audio/video information, it obtains described
The authentication result of object to be verified, comprising:
The audio/video information is parsed, the corresponding second lip reading information of the audio/video information, the second lip reading information are obtained
It is instructed including multiple second lip readings;
Judge whether the second lip reading information matches with the second default lip reading information;
If it is determined that the second lip reading information and the described second default lip reading information matches, it is determined that the body of the object to be verified
Part verification result is the unlock permission that the object to be verified has electronic equipment.
8. a kind of electronic equipment tripper based on vocal print, which is characterized in that described device includes:
Acquisition unit, for acquiring the audio/video information of object to be verified, the audio/video information by audio and video acquisition devices
Including facial image, voiceprint, voice content and lip reading information;
Authentication unit obtains described to be tested for carrying out authentication to the object to be verified according to the audio/video information
The authentication of object is demonstrate,proved as a result, the authentication result is for characterizing whether the object to be verified has electronic equipment
Unlock permission;
Unlocking unit, for if it is determined that the authentication result is the unlocking right that the object to be verified has electronic equipment
Limit then controls the electronic equipment unlock.
9. a kind of server, which is characterized in that described including processor, memory, communication interface and one or more programs
One or more programs are stored in the memory, and are configured to be executed by the processor, and described program includes using
In the instruction for executing the step in the method according to claim 1 to 7.
10. a kind of computer readable storage medium, which is characterized in that the computer readable storage medium is for storing computer
Program, the computer program are executed by processor, to realize the method according to claim 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811182704.XA CN109063449B (en) | 2018-10-11 | 2018-10-11 | Electronic equipment unlocking method and related device based on voiceprint |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811182704.XA CN109063449B (en) | 2018-10-11 | 2018-10-11 | Electronic equipment unlocking method and related device based on voiceprint |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109063449A true CN109063449A (en) | 2018-12-21 |
CN109063449B CN109063449B (en) | 2024-07-09 |
Family
ID=64763846
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811182704.XA Active CN109063449B (en) | 2018-10-11 | 2018-10-11 | Electronic equipment unlocking method and related device based on voiceprint |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109063449B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109903054A (en) * | 2019-03-07 | 2019-06-18 | 百度在线网络技术(北京)有限公司 | A kind of operation acknowledgement method, apparatus, electronic equipment and storage medium |
CN111814732A (en) * | 2020-07-23 | 2020-10-23 | 上海优扬新媒信息技术有限公司 | Identity verification method and device |
WO2022179253A1 (en) * | 2021-02-26 | 2022-09-01 | 华为技术有限公司 | Speech operation method for device, apparatus, and electronic device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101662680A (en) * | 2008-08-28 | 2010-03-03 | 华为技术有限公司 | Method, device and system for measuring video flow performance |
CN103475490A (en) * | 2013-09-29 | 2013-12-25 | 广州网易计算机系统有限公司 | Identity authentication method and device |
CN108259444A (en) * | 2016-12-28 | 2018-07-06 | 南宁富桂精密工业有限公司 | Malicious websites means of defence and system |
CN108446674A (en) * | 2018-04-28 | 2018-08-24 | 平安科技(深圳)有限公司 | Electronic device, personal identification method and storage medium based on facial image and voiceprint |
-
2018
- 2018-10-11 CN CN201811182704.XA patent/CN109063449B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101662680A (en) * | 2008-08-28 | 2010-03-03 | 华为技术有限公司 | Method, device and system for measuring video flow performance |
CN103475490A (en) * | 2013-09-29 | 2013-12-25 | 广州网易计算机系统有限公司 | Identity authentication method and device |
CN108259444A (en) * | 2016-12-28 | 2018-07-06 | 南宁富桂精密工业有限公司 | Malicious websites means of defence and system |
CN108446674A (en) * | 2018-04-28 | 2018-08-24 | 平安科技(深圳)有限公司 | Electronic device, personal identification method and storage medium based on facial image and voiceprint |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109903054A (en) * | 2019-03-07 | 2019-06-18 | 百度在线网络技术(北京)有限公司 | A kind of operation acknowledgement method, apparatus, electronic equipment and storage medium |
CN109903054B (en) * | 2019-03-07 | 2023-11-28 | 百度在线网络技术(北京)有限公司 | Operation confirmation method and device, electronic equipment and storage medium |
CN111814732A (en) * | 2020-07-23 | 2020-10-23 | 上海优扬新媒信息技术有限公司 | Identity verification method and device |
CN111814732B (en) * | 2020-07-23 | 2024-02-09 | 度小满科技(北京)有限公司 | Identity verification method and device |
WO2022179253A1 (en) * | 2021-02-26 | 2022-09-01 | 华为技术有限公司 | Speech operation method for device, apparatus, and electronic device |
Also Published As
Publication number | Publication date |
---|---|
CN109063449B (en) | 2024-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1704668B1 (en) | System and method for providing claimant authentication | |
CN105684345B (en) | Identity authentication method, device and user equipment | |
CN105468950B (en) | Identity authentication method and device, terminal and server | |
CN109997185A (en) | Method and apparatus for the biometric authentication in electronic equipment | |
CN109063449A (en) | Electronic equipment unlocking method and relevant apparatus based on vocal print | |
CN104298909B (en) | Electronic device, authentication system and method | |
US8255699B2 (en) | Portable data storage medium for biometric user identification | |
CN105429969B (en) | A kind of user ID authentication method and equipment | |
CN105654033B (en) | Face image verification method and device | |
WO2017045564A1 (en) | Environmentally adaptive identity authentication method and terminal | |
US20160026840A1 (en) | Enrollment And Authentication On A Mobile Device | |
WO2017066424A1 (en) | Method and apparatus for initiating an operation using voice data | |
CN106062871B (en) | Training a classifier using the selected subset of cohort samples | |
CN106169295B (en) | Identity vector generation method and device | |
CN111611568A (en) | Face voiceprint rechecking terminal and identity authentication method thereof | |
CN106096519A (en) | Live body discrimination method and device | |
CN111653283B (en) | Cross-scene voiceprint comparison method, device, equipment and storage medium | |
CN110472498A (en) | Identity identifying method, system, storage medium and equipment based on hand-characteristic | |
JP2013239125A (en) | Portable terminal | |
CN111445604A (en) | Intelligent door and door lock opening method | |
CN110084142B (en) | Age privacy protection method and system for face recognition | |
CN105827810B (en) | A kind of communication terminal based on Application on Voiceprint Recognition recovers method and communication terminal | |
CN111611571A (en) | Real-name authentication method and device | |
CN103856331B (en) | A kind of signature authentication method and system | |
CN109284588A (en) | Information Authentication method, apparatus and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant |