CN109063449A - Electronic equipment unlocking method and relevant apparatus based on vocal print - Google Patents

Electronic equipment unlocking method and relevant apparatus based on vocal print Download PDF

Info

Publication number
CN109063449A
CN109063449A CN201811182704.XA CN201811182704A CN109063449A CN 109063449 A CN109063449 A CN 109063449A CN 201811182704 A CN201811182704 A CN 201811182704A CN 109063449 A CN109063449 A CN 109063449A
Authority
CN
China
Prior art keywords
verified
audio
authentication
video information
determined
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811182704.XA
Other languages
Chinese (zh)
Other versions
CN109063449B (en
Inventor
王义文
王健宗
肖京
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811182704.XA priority Critical patent/CN109063449B/en
Publication of CN109063449A publication Critical patent/CN109063449A/en
Application granted granted Critical
Publication of CN109063449B publication Critical patent/CN109063449B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The embodiment of the present application discloses a kind of electronic equipment unlocking method and relevant apparatus based on vocal print, this method comprises: acquiring the audio/video information of object to be verified by audio and video acquisition devices, audio/video information includes facial image, voiceprint, voice content and lip reading information;Identifying object is treated according to audio/video information and carries out authentication, obtains the authentication of object to be verified as a result, authentication result is for characterizing the unlock permission whether object to be verified has electronic equipment;If it is determined that authentication result is the unlock permission that object to be verified has electronic equipment, then controlling electronic devices unlocks.The safety being unlocked to electronic equipment is helped to improve using the embodiment of the present application.

Description

Electronic equipment unlocking method and relevant apparatus based on vocal print
Technical field
This application involves sound groove recognition technology in e fields, and in particular to a kind of electronic equipment unlocking method and phase based on vocal print Close device.
Background technique
With the rapid development of science and technology, electronic equipment is more more and more universal, become in user's daily life it is close not The a part that can divide.Currently, the unlocking manner of electronic equipment mainly has number, recognition of face, fingerprint recognition, iris etc., such as The unlock that user carries out the unlock of mobile phone using recognition of face or user uses fingerprint recognition to carry out electronic lock.Above-mentioned electronics The unlocking manner of equipment is easier to crack, and can replace fingerprint, Huo Zhetong by stealthy fingerprint film due to having been carried out at this stage Resultant image, mask, 3D faceform are crossed instead of facial image, therefore safety is lower.
Summary of the invention
The embodiment of the present application provides a kind of electronic equipment unlocking method and relevant apparatus based on vocal print, helps to improve pair The safety that electronic equipment is unlocked.
In a first aspect, the embodiment of the present application provides a kind of electronic equipment unlocking method based on vocal print, which comprises
The audio/video information of object to be verified is acquired by audio and video acquisition devices, the audio/video information includes face figure Picture, voiceprint, voice content and lip reading information;
Authentication is carried out to the object to be verified according to the audio/video information, obtains the body of the object to be verified Part verification result, the authentication result is for characterizing the unlock the permission whether object to be verified has electronic equipment;
If it is determined that the authentication result is the unlock permission that the object to be verified has electronic equipment, then institute is controlled State electronic equipment unlock.
Second aspect, the embodiment of the present application provide a kind of electronic equipment tripper based on vocal print, and described device includes:
Acquisition unit, for acquiring the audio/video information of object to be verified, the audio-video by audio and video acquisition devices Information includes facial image, voiceprint, voice content and lip reading information;
Authentication unit obtains described for carrying out authentication to the object to be verified according to the audio/video information The authentication of object to be verified is as a result, the authentication result is used to characterize whether the object to be verified sets with electronics Standby unlock permission;
Unlocking unit, for if it is determined that the authentication result is the unlock that the object to be verified has electronic equipment Permission then controls the electronic equipment unlock.
The third aspect, the embodiment of the present application provide a kind of server, including processor, memory, communication interface and one A or multiple programs, wherein said one or multiple programs are stored in above-mentioned memory, and are configured by above-mentioned processing Device executes, and above procedure is included the steps that for executing the instruction in method described in the embodiment of the present application first aspect.
Fourth aspect, the embodiment of the present application provide a kind of terminal, including processor, memory, communication interface and one Or multiple programs, wherein said one or multiple programs are stored in above-mentioned memory, and are configured by above-mentioned processor It executes, above procedure is included the steps that for executing the instruction in method described in the embodiment of the present application first aspect.
5th aspect, the embodiment of the present application provide a kind of computer readable storage medium, above-mentioned computer-readable storage For storing computer program, the computer program is executed by processor medium, to realize such as the embodiment of the present application first party Step some or all of described in method described in face.
6th aspect, the embodiment of the present application provide a kind of computer program product, and above-mentioned computer program product includes The non-transient computer readable storage medium of computer program is stored, above-mentioned computer program is operable to hold computer Step some or all of described in method of the row as described in the embodiment of the present application first aspect.
As can be seen that in the embodiment of the present application, being regarded first by the sound that audio and video acquisition devices acquire object to be verified Frequency information, audio/video information include facial image, voiceprint, voice content and lip reading information, are then regarded according to the sound of acquisition Frequency information treats identifying object and carries out authentication, obtains the authentication of object to be verified as a result, last if it is determined that identity is tested Card result is that there is object to be verified the unlocking right of electronic equipment to prescribe a time limit, then controlling electronic devices unlocks.Due to audio/video information Including facial image, voiceprint, voice content and lip reading information, compared to only by recognition of face or fingerprint recognition judgement Whether electronic equipment is unlocked, improves the safety being unlocked to electronic equipment to a certain extent.
These aspects or other aspects of the application can more straightforward in the following description.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application or in background technique below will be implemented the application Attached drawing needed in example or background technique is illustrated.
Fig. 1 is a kind of configuration diagram of electronic equipment system for unlocking based on vocal print provided by the embodiments of the present application;
Fig. 2 is the flow diagram of the first electronic equipment unlocking method based on vocal print provided by the embodiments of the present application;
Fig. 3 is the flow diagram of the second provided by the embodiments of the present application electronic equipment unlocking method based on vocal print;
Fig. 4 is the flow diagram of the third electronic equipment unlocking method based on vocal print provided by the embodiments of the present application;
Fig. 5 is a kind of structural schematic diagram of electronic equipment tripper based on vocal print provided by the embodiments of the present application;
Fig. 6 is a kind of structural schematic diagram of server provided by the embodiments of the present application;
Fig. 7 is a kind of structural schematic diagram of terminal provided by the embodiments of the present application.
Specific implementation
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only The embodiment of the application a part, instead of all the embodiments.Based on the embodiment in the application, ordinary skill people Member's every other embodiment obtained without making creative work, all should belong to the model of the application protection It encloses.
It is described in detail separately below.
The description and claims of this application and term " first ", " second ", " third " and " in the attached drawing Four " etc. are not use to describe a particular order for distinguishing different objects.In addition, term " includes " and " having " and it Any deformation, it is intended that cover and non-exclusive include.Such as it contains the process, method of a series of steps or units, be System, product or equipment are not limited to listed step or unit, but optionally further comprising the step of not listing or list Member, or optionally further comprising other step or units intrinsic for these process, methods, product or equipment.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
Hereinafter, the part term in the application is explained, in order to those skilled in the art understand that.
(1) terminal may include the various handheld devices with wireless communication function, mobile unit, wearable device, meter Calculate equipment or be connected to radio modem other processing equipments and various forms of user equipment (User Equipment, UE), mobile station (Mobile Station, MS), terminal device (Terminal Device, TD), etc..
(2) server, also referred to as servomechanism are to provide the equipment of the service of calculating.The composition of server includes processor, hard Disk, memory, system bus etc. are similar with general computer architecture.In a network environment, the service class provided according to server Type is different, is divided into file server, database server, apps server, WEB server etc..
It describes in detail below to the embodiment of the present application.
Referring to Fig. 1, Fig. 1 is a kind of framework of electronic equipment system for unlocking based on vocal print provided by the embodiments of the present application Schematic diagram, being somebody's turn to do the electronic equipment system for unlocking based on vocal print includes control platform, audio and video acquisition devices, verifying device and unlock Device, control platform and audio and video acquisition devices, verifying device, tripper all have connection relationship.Control platform transmission is adopted To audio and video acquisition devices, acquisition instructions are used to indicate the audio-video letter that audio and video acquisition devices acquire object to be verified for collection instruction Breath;Audio and video acquisition devices receive acquisition instructions and acquire the audio/video information of object to be verified;Control platform sends verifying and refers to Extremely verifying device is enabled, verifying instruction is used to indicate verifying device and treats identifying object progress authentication;Verifying device reception is tested Card instruction simultaneously treats identifying object progress authentication according to the audio/video information of acquisition, exports the authentication of object to be verified As a result;If authentication unlock is the unlock permission that object to be verified has electronic equipment, control platform sends unlock instruction To tripper, unlock instruction is used to indicate tripper and is unlocked to electronic equipment;Tripper receives unlock instruction simultaneously Electronic device is unlocked.
Referring to Fig. 2, Fig. 2 is the stream of the first electronic equipment unlocking method based on vocal print provided by the embodiments of the present application Journey schematic diagram, executing subject can be server, be also possible to terminal, are somebody's turn to do the electronic equipment unlocking method based on vocal print and include:
Step 201: the audio/video information of object to be verified, the audio/video information packet are acquired by audio and video acquisition devices Include facial image, voiceprint, voice content and lip reading information.
Wherein, audio and video acquisition devices can be the camera with sound pick-up, be also possible to by not having sound pick-up What camera and microphone formed.
Wherein, voiceprint is voiceprint map, and the abscissa of voiceprint map is the time, and ordinate is frequency.
Wherein, voice content is one section of content of text, and content of text can only include text, can also only include number, It can also include text and number.
Wherein, lip reading information includes multiple lip reading instructions, and each lip reading instructs a corresponding text or number.
In a possible example, before the audio/video information that object to be verified is acquired by audio and video acquisition devices, The method also includes:
The distance between the object to be verified and the audio and video acquisition devices are obtained by range sensor;
Judge whether the distance is less than or equal to the first setting value;
If it is determined that the distance is less than or equal to first setting value, then it is described by display equipment display reminding information Prompt information includes target text content, and the prompt information is for prompting the object to be verified to read aloud in the target text Hold.
Wherein, it is customized to can be user for the first setting value, is also possible to server or terminal is customized.
In a possible example, before the audio/video information that object to be verified is acquired by audio and video acquisition devices, The method also includes:
Validation region is treated by the audio and video acquisition devices to be shot, and the corresponding mesh in the region to be verified is obtained Logo image, the target image include at least one object to be verified;
Determine the target number at least one object to be verified that the target image includes;
Judge whether the target number is less than or equal to the second setting value;
Determine that the target number is less than or equal to second setting value.
Wherein, it is customized to can be user for the second setting value, is also possible to server or terminal is customized.
In a possible example, after the audio/video information that object to be verified is acquired by audio and video acquisition devices, The method also includes:
The audio/video information is parsed, the corresponding image definition of the audio/video information and speech intelligibility are obtained;
Judge whether described image clarity is more than or equal to first threshold and whether the speech intelligibility is more than or equal to Two threshold values;
If it is determined that described image clarity is more than or equal to the first threshold and the speech intelligibility is more than or equal to described Second threshold, then trigger it is described authentication is carried out to the object to be verified according to the audio/video information, obtain it is described to The operation of the authentication result of identifying object.
Specifically, audio/video information is parsed, the embodiment for obtaining the corresponding image definition of audio/video information may is that If audio/video information includes multiple images, an at least image is chosen from multiple images;It determines every in an at least image The clarity for opening image, obtains at least one corresponding image definition of an at least image;Determine at least one image clearly The average value of degree, and using the average value of at least one image definition as the corresponding image definition of audio/video information.
Specifically, audio/video information is parsed, the embodiment for obtaining the corresponding speech intelligibility of audio/video information may is that The sound power of audio/video information is obtained by sound transducer;The noise function of audio/video information is obtained by noise transducer Rate;The signal-to-noise ratio of audio/video information is determined according to sound power and noise power;It is regarded the signal-to-noise ratio of audio/video information as sound The speech intelligibility of frequency information.
Wherein, it is customized to may each be user for first threshold and second threshold, are also possible to server or terminal is made by oneself Justice.
Step 202: authentication being carried out to the object to be verified according to the audio/video information, is obtained described to be verified The authentication of object is as a result, the authentication result is used to characterize the solution whether object to be verified has electronic equipment Lock permission.
In a possible example, authentication is carried out to the object to be verified according to the audio/video information, is obtained To the authentication result of the object to be verified, comprising:
The audio/video information is parsed, the facial image of the object to be verified is obtained;
The face images stored in the facial image and facial image database are matched;
Judge in the face images with the presence or absence of target facial image, the target facial image be with it is described to The matched facial image of the facial image of identifying object;
If it is determined that there are the target facial images, then the target is obtained from pre-stored matching times database Corresponding first matching times of facial image, first matching times be the object current face images match to be verified at The number of function;Wherein, the facial image successful match of the object to be verified every time, the corresponding matching time of the object to be verified Number plus 1;
The corresponding target verification strategy of first matching times, the verifying are determined according to matching times and authentication policy Strategy includes the first authentication policy, the second authentication policy and third authentication policy;
Authentication is carried out to the object to be verified according to the target verification strategy and the audio/video information, is obtained The authentication result of the object to be verified.
Specifically, audio/video information is parsed, if the embodiment for obtaining the facial image of object to be verified may is that sound regards Frequency information includes multiple facial images of object to be verified, determines the clarity of every facial image in multiple facial images, obtains To the corresponding multiple clarity of multiple facial images;Using the corresponding facial image of utmost sharpness in multiple clarity as to be tested Demonstrate,prove the facial image of object.
Specifically, judge in face images with the presence or absence of target facial image embodiment may is that determine to The matching degree of every facial image, obtains in the face images stored in the facial image and facial image database of identifying object The corresponding multiple matching degrees of face images;Judge to be more than or equal to third setting value with the presence or absence of matching degree in multiple matching degrees Object matching degree;If it is determined that there are object matching degree, it is determined that the corresponding facial image of object matching degree is target face figure Picture.Wherein, it is customized to can be user for third setting value, is also possible to server or terminal is customized.
Wherein, facial image database is pre-stored in server, every in the face images stored in facial image database Open the corresponding matching times of facial image.
In a possible example, the corresponding mesh of first matching times is determined according to matching times and authentication policy Mark authentication policy, comprising:
If first matching times are less than third threshold value, it is determined that the target verification strategy is the first verifying plan Slightly;
If first matching times are more than or equal to the third threshold value and less than the 4th threshold values, it is determined that the target is tested Card strategy is second authentication policy;
If first matching times are more than or equal to the 4th threshold value, it is determined that the target verification strategy is described the Three authentication policies;
Wherein, the authentication policy sorts successively from high to low according to safety are as follows: described in the first authentication policy > Third authentication policy described in second authentication policy >.
Wherein, it is customized to may each be user for third threshold value and the 4th threshold value, are also possible to server or terminal is made by oneself Justice.
In a possible example, authentication is carried out to the object to be verified according to the audio/video information, is obtained To the authentication result of the object to be verified, comprising:
The audio/video information is parsed, the facial image of the object to be verified is obtained;
The face images stored in the facial image and facial image database are matched;
Judge in the face images with the presence or absence of target facial image, the target facial image be with it is described to The matched facial image of the facial image of identifying object;
If it is determined that then determining the target according to the corresponding relationship of number and authentication policy there are the target facial image The corresponding target verification strategy of number;
Authentication is carried out to the object to be verified according to the target verification strategy and the audio/video information, is obtained The authentication result of the object to be verified.
In a possible example, the target number is greater than second setting value, according to number and authentication policy Determine the corresponding target verification strategy of the target number, comprising:
If the target number is in the first number interval, it is determined that the target verification strategy is the first verifying plan Slightly;
If the target number is in the second number section, it is determined that the target verification strategy is the second verifying plan Slightly;
If the target number is in third party's number interval, it is determined that the target verification strategy is that the third verifies plan Slightly, the first number interval, second number section and third party's number interval increase in staged.
In a possible example, target verification strategy is first authentication policy, described to be tested according to the target Card strategy and the audio/video information carry out authentication to the object to be verified, and the identity for obtaining the object to be verified is tested Demonstrate,prove result, comprising:
The audio/video information is parsed, is obtained in corresponding first voiceprint of the audio/video information and the first voice Hold, first voiceprint is voiceprint map, and first voice content is one section of content of text;
Judge whether first voice content and the first default voice content are identical;
If it is determined that first voice content is identical as the described first default voice content, then the first vocal print letter is judged Whether breath matches with default voiceprint;
If it is determined that first voiceprint is matched with the default voiceprint, it is determined that the body of the object to be verified Part verification result is the unlock permission that the object to be verified has electronic equipment.
Specifically, audio/video information is parsed, corresponding first voiceprint of audio/video information and the first voice content are obtained Embodiment may is that audio/video information is parsed according to voiceprint recognition algorithm, obtain audio/video information corresponding One voiceprint, the first voiceprint are the first voiceprint map, and the abscissa of the first voiceprint map is the time, and ordinate is frequency Rate;Audio/video information is parsed according to speech recognition algorithm, obtains corresponding first voice content of audio/video information.
Wherein, the first default voice content is identical as target text content.
Wherein, default voiceprint refers to corresponding second voiceprint map of target text content.
Specifically, judge that the first voiceprint may is that with the whether matched embodiment of default voiceprint to described First voiceprint map carries out intercept operation, obtains third voiceprint map, the initial time of the third voiceprint map and described the The initial time of two voiceprint maps corresponds to identical content of text, the end time of the third voiceprint map and the rising tone The end time of line map corresponds to identical content of text;Extract respectively the third voiceprint map N number of first frequency value and N number of second frequency value of second voiceprint map, the N are more than or equal to 2 integers, N number of second frequency value and the N A first frequency value corresponds, at the time of the corresponding first frequency value of each second frequency value corresponds to identical;According to institute It states N number of first frequency value, N number of second frequency value and matching degree formula and determines the third voiceprint map and the rising tone The matching degree of line voiceprint map;Judge whether the matching degree is more than or equal to the 4th setting value.Wherein, the 4th setting value can be User is customized, is also possible to server or terminal is customized;If matching degree is more than or equal to the 4th setting value, it is determined that the One voiceprint is matched with default voiceprint.
Wherein, matching degree formula are as follows:
Wherein, the D is the matching degree of the third voiceprint map and second voiceprint map, the x1It is N number of 1st first frequency value, the y in one frequency values1For the corresponding 1st second frequency value of the 1st first frequency value, the x2 For the 2nd first frequency value, the y in N number of first frequency value2For corresponding 2nd second frequency of the 2nd first frequency value Value, the xNFor n-th first frequency value in N number of first frequency value, the yNFor the corresponding n-th of n-th first frequency value Two frequency values.
In a possible example, target verification strategy is second authentication policy, described to be tested according to the target Card strategy and the audio/video information carry out authentication to the object to be verified, and the identity for obtaining the object to be verified is tested Demonstrate,prove result, comprising:
The audio/video information is parsed, corresponding second voice content of the audio/video information and the first lip reading letter are obtained Breath, second voice content are one section of content of text, and the first lip reading information is the instruction of multiple first lip readings;
Judge whether second voice content and the second default voice content are identical;
If it is determined that second voice content is identical as the described second default voice content, then the first lip reading letter is judged Whether breath matches with the first default lip reading information;
If it is determined that the first lip reading information and the described first default lip reading information matches, it is determined that the object to be verified Authentication result be the object to be verified have electronic equipment unlock permission.
Wherein, each lip reading instructs a corresponding content of text.
Specifically, audio/video information is parsed, the embodiment for obtaining the corresponding first lip reading information of audio/video information can be with It is: audio/video information is parsed according to lip reading recognizer, obtains the corresponding first lip reading information of audio/video information, first Lip reading information is the instruction of multiple first lip readings, and multiple lip readings instruct corresponding first segment content of text.
Wherein, the second default voice content is identical as target text content.
Wherein, the first default lip reading information refers to the corresponding second segment content of text of target text content.
Wherein, judge that the first lip reading information judges in first segment text with whether the first default lip reading information matches to be equivalent to Hold whether identical as second segment content of text.
In a possible example, target verification strategy is the third authentication policy, described to be tested according to the target Card strategy and the audio/video information carry out authentication to the object to be verified, and the identity for obtaining the object to be verified is tested Demonstrate,prove result, comprising:
The audio/video information is parsed, the corresponding second lip reading information of the audio/video information, second lip reading are obtained Information includes multiple second lip reading instructions;
Judge whether the second lip reading information matches with the second default lip reading information;
If it is determined that the second lip reading information and the described second default lip reading information matches, it is determined that the object to be verified Authentication result be the object to be verified have electronic equipment unlock permission.
Wherein, the second lip reading information corresponds to third section content of text.
Wherein, the second default lip reading information refers to the corresponding second segment content of text of target text content.
Wherein, judge that the second lip reading information judges in third section text with whether the second default lip reading information matches to be equivalent to Hold whether identical as second segment content of text.
Step 203: if it is determined that the authentication result is the unlock permission that the object to be verified has electronic equipment, Then control the electronic equipment unlock.
Wherein, electronic equipment can be terminal, be also possible to electronic lock, door-control lock.
As can be seen that in the embodiment of the present application, being regarded first by the sound that audio and video acquisition devices acquire object to be verified Frequency information, audio/video information include facial image, voiceprint, voice content and lip reading information, are then regarded according to the sound of acquisition Frequency information treats identifying object and carries out authentication, obtains the authentication of object to be verified as a result, last if it is determined that identity is tested Card result is that there is object to be verified the unlocking right of electronic equipment to prescribe a time limit, then controlling electronic devices unlocks.Due to audio/video information Including facial image, voiceprint, voice content and lip reading information, compared to only by recognition of face or fingerprint recognition judgement Whether electronic equipment is unlocked, improves the safety being unlocked to electronic equipment to a certain extent.
Referring to Fig. 3, Fig. 3 is the stream of the second provided by the embodiments of the present application electronic equipment unlocking method based on vocal print Journey schematic diagram, executing subject can be server, be also possible to terminal, are somebody's turn to do the electronic equipment unlocking method based on vocal print and include:
Step 301: the audio/video information of object to be verified, the audio/video information packet are acquired by audio and video acquisition devices Include facial image, voiceprint, voice content and lip reading information.
Step 302: parsing the audio/video information, obtain the facial image of the object to be verified.
Step 303: the face images stored in the facial image and facial image database are matched.
Step 304: judging that, with the presence or absence of target facial image in the face images, the target facial image is With the matched facial image of facial image of the object to be verified.
Step 305: if it is determined that there are the target facial images, then being obtained from pre-stored matching times database Corresponding first matching times of the target facial image, first matching times are the object current face figure to be verified As the number of successful match;Wherein, the facial image successful match of the object to be verified, the object to be verified are corresponding every time Matching times add 1.
Step 306: if first matching times are less than third threshold value, it is determined that the target verification strategy is described the One authentication policy.
Step 307: parsing the audio/video information, obtain corresponding first voiceprint of the audio/video information and first Voice content, first voiceprint are voiceprint map, and first voice content is one section of content of text.
Step 308: judging whether first voice content and the first default voice content are identical.
Step 309: if it is determined that first voice content is identical as the described first default voice content, then judging described Whether one voiceprint matches with default voiceprint.
Step 310: if it is determined that first voiceprint is matched with the default voiceprint, it is determined that described to be verified The authentication result of object is the unlock permission that the object to be verified has electronic equipment.
Step 311: controlling the electronic equipment unlock.
It should be noted that the specific implementation process of each step of method shown in Fig. 3 can be found in described in the above method Specific implementation process, no longer describe herein.
Referring to Fig. 4, Fig. 4 is the stream of the third electronic equipment unlocking method based on vocal print provided by the embodiments of the present application Journey schematic diagram, executing subject can be server, be also possible to terminal, are somebody's turn to do the electronic equipment unlocking method based on vocal print and include:
Step 401: the audio/video information of object to be verified, the audio/video information packet are acquired by audio and video acquisition devices Include facial image, voiceprint, voice content and lip reading information.
Step 402: parsing the audio/video information, obtain the facial image of the object to be verified.
Step 403: the face images stored in the facial image and facial image database are matched;
Step 404: judging that, with the presence or absence of target facial image in the face images, the target facial image is With the matched facial image of facial image of the object to be verified.
Step 405: if it is determined that there are the target facial images, then being obtained from pre-stored matching times database Corresponding first matching times of the target facial image, first matching times are the object current face figure to be verified As the number of successful match;Wherein, the facial image successful match of the object to be verified, the object to be verified are corresponding every time Matching times add 1.
Step 406: if first matching times are more than or equal to the third threshold value and less than the 4th threshold value, it is determined that institute Stating target verification strategy is second authentication policy.
Step 407: parsing the audio/video information, obtain corresponding second voice content of the audio/video information and first Lip reading information, second voice content are one section of content of text, and the first lip reading information is the instruction of multiple first lip readings.
Step 408: judging whether second voice content and the second default voice content are identical.
Step 409: if it is determined that second voice content is identical as the described second default voice content, then judging described Whether one lip reading information matches with the first default lip reading information.
Step 410: if it is determined that the first lip reading information and the described first default lip reading information matches, it is determined that it is described to The authentication result of identifying object is the unlock permission that the object to be verified has electronic equipment.
Step 411: controlling the electronic equipment unlock.
It should be noted that the specific implementation process of each step of method shown in Fig. 4 can be found in described in the above method Specific implementation process, no longer describe herein.
It is above-mentioned that mainly the scheme of the embodiment of the present application is described from the angle of method side implementation procedure.It is understood that , in order to realize the above functions, it comprises executing, each function is hard accordingly for the electronic equipment tripper based on vocal print Part structure and/or software module.Those skilled in the art should be readily appreciated that, retouch in conjunction with the embodiments described herein Each exemplary unit and algorithm steps stated, the application can be come real with the combining form of hardware or hardware and computer software It is existing.Some functions is executed in a manner of hardware or computer software driving hardware actually, depending on the specific of technical solution Using and design constraint.Professional technician can to it is each specifically realized using distinct methods it is described Function, but this realization is it is not considered that exceed scope of the present application.
The embodiment of the present application can carry out function to the electronic equipment tripper based on vocal print according to above method example The division of unit, for example, each functional unit of each function division can be corresponded to, it can also be by two or more functions It is integrated in a processing unit.Above-mentioned integrated unit both can take the form of hardware realization, can also use software function The form of energy unit is realized.It should be noted that be to the division of unit in the embodiment of the present application it is schematical, it is only a kind of Logical function partition, there may be another division manner in actual implementation.
Referring to Fig. 5, Fig. 5 is a kind of structure of electronic equipment tripper based on vocal print provided by the embodiments of the present application Schematic diagram should include processing unit 501, storage unit 502 and communication unit based on the electronic equipment tripper 500 of vocal print 503, processing unit 501 includes acquisition unit, authentication unit and unlocking unit, in which:
Acquisition unit, for acquiring the audio/video information of object to be verified, the audio-video by audio and video acquisition devices Information includes facial image, voiceprint, voice content and lip reading information;
Authentication unit obtains described for carrying out authentication to the object to be verified according to the audio/video information The authentication of object to be verified is as a result, the authentication result is used to characterize whether the object to be verified sets with electronics Standby unlock permission;
Unlocking unit, for if it is determined that the authentication result is the unlock that the object to be verified has electronic equipment Permission then controls the electronic equipment unlock.
As it can be seen that in this example, the audio/video information of object to be verified, sound view are acquired by audio and video acquisition devices first Frequency information includes facial image, voiceprint, voice content and lip reading information, then according to the audio/video information of acquisition to be tested It demonstrate,proves object and carries out authentication, obtain the authentication of object to be verified as a result, last if it is determined that authentication result is to be tested There is card object the unlocking right of electronic equipment to prescribe a time limit, then controlling electronic devices unlocks.Due to audio/video information include facial image, Voiceprint, voice content and lip reading information, judge whether to set electronics compared to only by recognition of face or fingerprint recognition It is standby to be unlocked, the safety being unlocked to electronic equipment is improved to a certain extent.
In a possible example, it is described by audio and video acquisition devices acquire object to be verified audio/video information it Afterwards, above-mentioned processing unit 501 further include:
Resolution unit, for parsing the audio/video information, obtain the corresponding image definition of the audio/video information and Speech intelligibility;
Judging unit, for judging whether described image clarity is more than or equal to first threshold and the speech intelligibility is It is no to be more than or equal to second threshold;
Determination unit, for determining that described image clarity is more than or equal to the first threshold and the speech intelligibility More than or equal to the second threshold.
In a possible example, authentication is being carried out to the object to be verified according to the audio/video information, In terms of obtaining the authentication result of the object to be verified, above-mentioned authentication unit is specifically used for:
The audio/video information is parsed, the facial image of the object to be verified is obtained;
The face images stored in the facial image and facial image database are matched;
Judge in the face images with the presence or absence of target facial image, the target facial image be with it is described to The matched facial image of the facial image of identifying object;
If it is determined that there are the target facial images, then the target is obtained from pre-stored matching times database Corresponding first matching times of facial image, first matching times be the object current face images match to be verified at The number of function;Wherein, the facial image successful match of the object to be verified every time, the corresponding matching time of the object to be verified Number plus 1;
The corresponding target verification strategy of first matching times, the verifying are determined according to matching times and authentication policy Strategy includes the first authentication policy, the second authentication policy and third authentication policy;
Authentication is carried out to the object to be verified according to the target verification strategy and the audio/video information, is obtained The authentication result of the object to be verified.
In a possible example, determining that first matching times are corresponding according to matching times and authentication policy In terms of target verification strategy, above-mentioned authentication unit is specifically used for:
If first matching times are less than third threshold value, it is determined that the target verification strategy is the first verifying plan Slightly;
If first matching times are more than or equal to the third threshold value and less than the 4th threshold values, it is determined that the target is tested Card strategy is second authentication policy;
If first matching times are more than or equal to the 4th threshold value, it is determined that the target verification strategy is described the Three authentication policies;
Wherein, the authentication policy according to safety from high to low successively are as follows: second described in the first authentication policy > Third authentication policy described in authentication policy >.
In a possible example, the target verification strategy is first authentication policy, according to the target Authentication policy and the audio/video information carry out authentication to the object to be verified, obtain the identity of the object to be verified In terms of verification result, above-mentioned authentication unit is specifically used for:
The audio/video information is parsed, is obtained in corresponding first voiceprint of the audio/video information and the first voice Hold, first voiceprint is voiceprint map, and first voice content is one section of content of text;
Judge whether first voice content and the first default voice content are identical;
If it is determined that first voice content is identical as the described first default voice content, then the first vocal print letter is judged Whether breath matches with default voiceprint;
If it is determined that first voiceprint is matched with the default voiceprint, it is determined that the body of the object to be verified Part verification result is the unlock permission that the object to be verified has electronic equipment.
In a possible example, the target verification strategy is second authentication policy, according to the target Authentication policy and the audio/video information carry out authentication to the object to be verified, obtain the identity of the object to be verified In terms of verification result, above-mentioned authentication unit is specifically used for:
The audio/video information is parsed, corresponding second voice content of the audio/video information and the first lip reading letter are obtained Breath, second voice content are one section of content of text, and the first lip reading information is the instruction of multiple first lip readings;
Judge whether second voice content and the second default voice content are identical;
If it is determined that second voice content is identical as the described second default voice content, then the first lip reading letter is judged Whether breath matches with the first default lip reading information;
If it is determined that the first lip reading information and the described first default lip reading information matches, it is determined that the object to be verified Authentication result be the object to be verified have electronic equipment unlock permission.
In a possible example, the target verification strategy is the third authentication policy, according to the target Authentication policy and the audio/video information carry out authentication to the object to be verified, obtain the identity of the object to be verified In terms of verification result, above-mentioned authentication unit is specifically used for:
The audio/video information is parsed, the corresponding second lip reading information of the audio/video information, second lip reading are obtained Information includes multiple second lip reading instructions;
Judge whether the second lip reading information matches with the second default lip reading information;
If it is determined that the second lip reading information and the described second default lip reading information matches, it is determined that the object to be verified Authentication result be the object to be verified have electronic equipment unlock permission.
Wherein, processing unit 501 can be processor or controller, (such as can be central processing unit (Central Processing Unit, CPU), general processor, digital signal processor (Digital Signal Processor, DSP), Dedicated integrated manipulator (Application-Specific Integrated Circuit, ASIC), field programmable gate array It is (Field Programmable Gate Array, FPGA) or other programmable logic device, transistor logic, hard Part component or any combination thereof.Storage unit 502 can be memory, and communication unit 503 can be transceiver, transmitting-receiving control Device, radio frequency chip, communication interface etc..
It is consistent with above-mentioned Fig. 2, Fig. 3 and embodiment shown in Fig. 4, referring to Fig. 6, Fig. 6 is that the embodiment of the present application provides A kind of server structural schematic diagram, which includes processor, memory, communication interface and one or more journey Sequence, wherein said one or multiple programs are stored in above-mentioned memory, and are configured to be executed by above-mentioned processor, on Stating program includes the instruction for executing following steps:
The audio/video information of object to be verified is acquired by audio and video acquisition devices, the audio/video information includes face figure Picture, voiceprint, voice content and lip reading information;
Authentication is carried out to the object to be verified according to the audio/video information, obtains the body of the object to be verified Part verification result, the authentication result is for characterizing the unlock the permission whether object to be verified has electronic equipment;
If it is determined that the authentication result is the unlock permission that the object to be verified has electronic equipment, then institute is controlled State electronic equipment unlock.
As it can be seen that in this example, the audio/video information of object to be verified, sound view are acquired by audio and video acquisition devices first Frequency information includes facial image, voiceprint, voice content and lip reading information, then according to the audio/video information of acquisition to be tested It demonstrate,proves object and carries out authentication, obtain the authentication of object to be verified as a result, last if it is determined that authentication result is to be tested There is card object the unlocking right of electronic equipment to prescribe a time limit, then controlling electronic devices unlocks.Due to audio/video information include facial image, Voiceprint, voice content and lip reading information, judge whether to set electronics compared to only by recognition of face or fingerprint recognition It is standby to be unlocked, the safety being unlocked to electronic equipment is improved to a certain extent.
In a possible example, it is described by audio and video acquisition devices acquire object to be verified audio/video information it Afterwards, above procedure further includes the instruction for executing following steps:
The audio/video information is parsed, the corresponding image definition of the audio/video information and speech intelligibility are obtained;
Judge whether described image clarity is more than or equal to first threshold and whether the speech intelligibility is more than or equal to Two threshold values;
If it is determined that described image clarity is more than or equal to the first threshold and the speech intelligibility is more than or equal to described Second threshold, then trigger it is described authentication is carried out to the object to be verified according to the audio/video information, obtain it is described to The operation of the authentication result of identifying object.
In a possible example, authentication is being carried out to the object to be verified according to the audio/video information, In terms of obtaining the authentication result of the object to be verified, above procedure includes the instruction specifically for executing following steps:
The audio/video information is parsed, the facial image of the object to be verified is obtained;
The face images stored in the facial image and facial image database are matched;
Judge in the face images with the presence or absence of target facial image, the target facial image be with it is described to The matched facial image of the facial image of identifying object;
If it is determined that there are the target facial images, then the target is obtained from pre-stored matching times database Corresponding first matching times of facial image, first matching times be the object current face images match to be verified at The number of function;Wherein, the facial image successful match of the object to be verified every time, the corresponding matching time of the object to be verified Number plus 1;
The corresponding target verification strategy of first matching times, the verifying are determined according to matching times and authentication policy Strategy includes the first authentication policy, the second authentication policy and third authentication policy;
Authentication is carried out to the object to be verified according to the target verification strategy and the audio/video information, is obtained The authentication result of the object to be verified.
In a possible example, determining that first matching times are corresponding according to matching times and authentication policy In terms of target verification strategy, above procedure includes the instruction specifically for executing following steps:
If first matching times are less than third threshold value, it is determined that the target verification strategy is the first verifying plan Slightly;
If first matching times are more than or equal to the third threshold value and less than the 4th threshold values, it is determined that the target is tested Card strategy is second authentication policy;
If first matching times are more than or equal to the 4th threshold value, it is determined that the target verification strategy is described the Three authentication policies;
Wherein, the authentication policy sorts successively from high to low according to safety are as follows: described in the first authentication policy > Third authentication policy described in second authentication policy >.
In a possible example, the target verification strategy is first authentication policy, according to the target Authentication policy and the audio/video information carry out authentication to the object to be verified, obtain the identity of the object to be verified In terms of verification result, above procedure includes the instruction specifically for following steps:
The audio/video information is parsed, is obtained in corresponding first voiceprint of the audio/video information and the first voice Hold, first voiceprint is voiceprint map, and first voice content is one section of content of text;
Judge whether first voice content and the first default voice content are identical;
If it is determined that first voice content is identical as the described first default voice content, then the first vocal print letter is judged Whether breath matches with default voiceprint;
If it is determined that first voiceprint is matched with the default voiceprint, it is determined that the body of the object to be verified Part verification result is the unlock permission that the object to be verified has electronic equipment.
In a possible example, the target verification strategy is second authentication policy, according to the target Authentication policy and the audio/video information carry out authentication to the object to be verified, obtain the identity of the object to be verified In terms of verification result, above procedure includes the instruction specifically for executing following steps:
The audio/video information is parsed, corresponding second voice content of the audio/video information and the first lip reading letter are obtained Breath, second voice content are one section of content of text, and the first lip reading information is the instruction of multiple first lip readings;
Judge whether second voice content and the second default voice content are identical;
If it is determined that second voice content is identical as the described second default voice content, then the first lip reading letter is judged Whether breath matches with the first default lip reading information;
If it is determined that the first lip reading information and the described first default lip reading information matches, it is determined that the object to be verified Authentication result be the object to be verified have electronic equipment unlock permission.
In a possible example, the target verification strategy is the third authentication policy, according to the target Authentication policy and the audio/video information carry out authentication to the object to be verified, obtain the identity of the object to be verified In terms of verification result, above procedure includes the instruction specifically for executing following steps:
The audio/video information is parsed, the corresponding second lip reading information of the audio/video information, second lip reading are obtained Information includes multiple second lip reading instructions;
Judge whether the second lip reading information matches with the second default lip reading information;
If it is determined that the second lip reading information and the described second default lip reading information matches, it is determined that the object to be verified Authentication result be the object to be verified have electronic equipment unlock permission.
It is consistent with above-mentioned Fig. 2, Fig. 3 and embodiment shown in Fig. 4, referring to Fig. 7, Fig. 7 is that the embodiment of the present application provides A kind of terminal structural schematic diagram, which includes processor, memory, communication interface and one or more program, In, said one or multiple programs are stored in above-mentioned memory, and are configured to be executed by above-mentioned processor, above procedure Including the instruction for executing following steps:
The audio/video information of object to be verified is acquired by audio and video acquisition devices, the audio/video information includes face figure Picture, voiceprint, voice content and lip reading information;
Authentication is carried out to the object to be verified according to the audio/video information, obtains the body of the object to be verified Part verification result, the authentication result is for characterizing the unlock the permission whether object to be verified has electronic equipment;
If it is determined that the authentication result is the unlock permission that the object to be verified has electronic equipment, then institute is controlled State electronic equipment unlock.
As it can be seen that in this example, the audio/video information of object to be verified, sound view are acquired by audio and video acquisition devices first Frequency information includes facial image, voiceprint, voice content and lip reading information, then according to the audio/video information of acquisition to be tested It demonstrate,proves object and carries out authentication, obtain the authentication of object to be verified as a result, last if it is determined that authentication result is to be tested There is card object the unlocking right of electronic equipment to prescribe a time limit, then controlling electronic devices unlocks.Due to audio/video information include facial image, Voiceprint, voice content and lip reading information, judge whether to set electronics compared to only by recognition of face or fingerprint recognition It is standby to be unlocked, the safety being unlocked to electronic equipment is improved to a certain extent.
In a possible example, it is described by audio and video acquisition devices acquire object to be verified audio/video information it Afterwards, above procedure further includes the instruction for executing following steps:
The audio/video information is parsed, the corresponding image definition of the audio/video information and speech intelligibility are obtained;
Judge whether described image clarity is more than or equal to first threshold and whether the speech intelligibility is more than or equal to Two threshold values;
If it is determined that described image clarity is more than or equal to the first threshold and the speech intelligibility is more than or equal to described Second threshold, then trigger it is described authentication is carried out to the object to be verified according to the audio/video information, obtain it is described to The operation of the authentication result of identifying object.
In a possible example, authentication is being carried out to the object to be verified according to the audio/video information, In terms of obtaining the authentication result of the object to be verified, above procedure includes the instruction specifically for executing following steps:
The audio/video information is parsed, the facial image of the object to be verified is obtained;
The face images stored in the facial image and facial image database are matched;
Judge in the face images with the presence or absence of target facial image, the target facial image be with it is described to The matched facial image of the facial image of identifying object;
If it is determined that there are the target facial images, then the target is obtained from pre-stored matching times database Corresponding first matching times of facial image, first matching times be the object current face images match to be verified at The number of function;Wherein, the facial image successful match of the object to be verified every time, the corresponding matching time of the object to be verified Number plus 1;
The corresponding target verification strategy of first matching times, the verifying are determined according to matching times and authentication policy Strategy includes the first authentication policy, the second authentication policy and third authentication policy;
Authentication is carried out to the object to be verified according to the target verification strategy and the audio/video information, is obtained The authentication result of the object to be verified.
In a possible example, determining that first matching times are corresponding according to matching times and authentication policy In terms of target verification strategy, above procedure includes the instruction specifically for executing following steps:
If first matching times are less than third threshold value, it is determined that the target verification strategy is the first verifying plan Slightly;
If first matching times are more than or equal to the third threshold value and less than the 4th threshold values, it is determined that the target is tested Card strategy is second authentication policy;
If first matching times are more than or equal to the 4th threshold value, it is determined that the target verification strategy is described the Three authentication policies;
Wherein, the authentication policy sorts successively from high to low according to safety are as follows: described in the first authentication policy > Third authentication policy described in second authentication policy >.
In a possible example, the target verification strategy is first authentication policy, according to the target Authentication policy and the audio/video information carry out authentication to the object to be verified, obtain the identity of the object to be verified In terms of verification result, above procedure includes the instruction specifically for following steps:
The audio/video information is parsed, is obtained in corresponding first voiceprint of the audio/video information and the first voice Hold, first voiceprint is voiceprint map, and first voice content is one section of content of text;
Judge whether first voice content and the first default voice content are identical;
If it is determined that first voice content is identical as the described first default voice content, then the first vocal print letter is judged Whether breath matches with default voiceprint;
If it is determined that first voiceprint is matched with the default voiceprint, it is determined that the body of the object to be verified Part verification result is the unlock permission that the object to be verified has electronic equipment.
In a possible example, the target verification strategy is second authentication policy, according to the target Authentication policy and the audio/video information carry out authentication to the object to be verified, obtain the identity of the object to be verified In terms of verification result, above procedure includes the instruction specifically for executing following steps:
The audio/video information is parsed, corresponding second voice content of the audio/video information and the first lip reading letter are obtained Breath, second voice content are one section of content of text, and the first lip reading information is the instruction of multiple first lip readings;
Judge whether second voice content and the second default voice content are identical;
If it is determined that second voice content is identical as the described second default voice content, then the first lip reading letter is judged Whether breath matches with the first default lip reading information;
If it is determined that the first lip reading information and the described first default lip reading information matches, it is determined that the object to be verified Authentication result be the object to be verified have electronic equipment unlock permission.
In a possible example, the target verification strategy is the third authentication policy, according to the target Authentication policy and the audio/video information carry out authentication to the object to be verified, obtain the identity of the object to be verified In terms of verification result, above procedure includes the instruction specifically for executing following steps:
The audio/video information is parsed, the corresponding second lip reading information of the audio/video information, second lip reading are obtained Information includes multiple second lip reading instructions;
Judge whether the second lip reading information matches with the second default lip reading information;
If it is determined that the second lip reading information and the described second default lip reading information matches, it is determined that the object to be verified Authentication result be the object to be verified have electronic equipment unlock permission.
The embodiment of the present application also provides a kind of computer storage medium, and the computer storage medium is for storing computer journey Sequence, the computer program are executed by processor, with realize part as either recorded method in above method embodiment or Overall Steps.
The embodiment of the present application also provides a kind of computer program product, and above-mentioned computer program product includes storing calculating The non-transient computer readable storage medium of machine program, above-mentioned computer program are operable to that computer is made to execute such as above-mentioned side Some or all of either record method step in method embodiment.The computer program product can be a software installation Packet.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the application is not limited by the described action sequence because According to the application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, related actions and modules not necessarily the application It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of said units, it is only a kind of Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit, It can be electrical or other forms.
Above-mentioned unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If above-mentioned integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer-readable access to memory.Based on this understanding, the technical solution of the application substantially or Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment (can be personal computer, server or network equipment etc.) executes all or part of each embodiment above method of the application Step.And memory above-mentioned includes: USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory The various media that can store program code such as (RAM, Random Access Memory), mobile hard disk, magnetic or disk.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can store in a computer-readable memory, memory May include: flash disk, read-only memory (English: Read-Only Memory, referred to as: ROM), random access device (English: Random Access Memory, referred to as: RAM), disk or CD etc..
The embodiment of the present application is described in detail above, specific case used herein to the principle of the application and Embodiment is expounded, the description of the example is only used to help understand the method for the present application and its core ideas; At the same time, for those skilled in the art can in specific implementation and application range according to the thought of the application There is change place, to sum up above-mentioned, the contents of this specification should not be construed as limiting the present application.

Claims (10)

1. a kind of electronic equipment unlocking method based on vocal print, which is characterized in that the described method includes:
Acquire the audio/video information of object to be verified by audio and video acquisition devices, the audio/video information include facial image, Voiceprint, voice content and lip reading information;
Authentication is carried out to the object to be verified according to the audio/video information, the identity for obtaining the object to be verified is tested Card is as a result, the authentication result is used to characterize the unlock the permission whether object to be verified has electronic equipment;
If it is determined that the authentication result is the unlock permission that the object to be verified has electronic equipment, then the electricity is controlled Sub- equipment unlock.
2. the method according to claim 1, wherein described acquire object to be verified by audio and video acquisition devices Audio/video information after, the method also includes:
The audio/video information is parsed, the corresponding image definition of the audio/video information and speech intelligibility are obtained;
Judge whether described image clarity is more than or equal to first threshold and whether the speech intelligibility is more than or equal to the second threshold Value;
If it is determined that described image clarity is more than or equal to the first threshold and the speech intelligibility is more than or equal to described second Threshold value, then trigger it is described authentication is carried out to the object to be verified according to the audio/video information, obtain described to be verified The operation of the authentication result of object.
3. according to the method described in claim 2, it is characterized in that, it is described according to the audio/video information to described to be verified right As carrying out authentication, the authentication result of the object to be verified is obtained, comprising:
The audio/video information is parsed, the facial image of the object to be verified is obtained;
The face images stored in the facial image and facial image database are matched;
Judge in the face images with the presence or absence of target facial image, the target facial image be with it is described to be verified The matched facial image of the facial image of object;
If it is determined that there are the target facial images, then the target face is obtained from pre-stored matching times database Corresponding first matching times of image, first matching times are that the object current face images match to be verified is successful Number;Wherein, the facial image successful match of the object to be verified every time, the corresponding matching times of the object to be verified add 1;
The corresponding target verification strategy of first matching times, the authentication policy are determined according to matching times and authentication policy Including the first authentication policy, the second authentication policy and third authentication policy;
Authentication is carried out to the object to be verified according to the target verification strategy and the audio/video information, is obtained described The authentication result of object to be verified.
4. according to the method described in claim 3, it is characterized in that, described determine described according to matching times and authentication policy The corresponding target verification strategy of one matching times, comprising:
If first matching times are less than third threshold value, it is determined that the target verification strategy is first authentication policy;
If first matching times are more than or equal to the third threshold value and less than the 4th threshold values, it is determined that the target verification plan Slightly described second authentication policy;
If first matching times are more than or equal to the 4th threshold value, it is determined that the target verification strategy is that the third is tested Card strategy;
Wherein, the authentication policy sorts successively from high to low according to safety are as follows: second described in the first authentication policy > Third authentication policy described in authentication policy >.
5. according to the method described in claim 4, it is characterized in that, the target verification strategy be first authentication policy, It is described that authentication is carried out to the object to be verified according to the target verification strategy and the audio/video information, it obtains described The authentication result of object to be verified, comprising:
The audio/video information is parsed, corresponding first voiceprint of the audio/video information and the first voice content, institute are obtained Stating the first voiceprint is voiceprint map, and first voice content is one section of content of text;
Judge whether first voice content and the first default voice content are identical;
If it is determined that first voice content is identical as the described first default voice content, then judge first voiceprint with Whether default voiceprint matches;
If it is determined that first voiceprint is matched with the default voiceprint, it is determined that the identity of the object to be verified is tested Demonstrate,proving result is the unlock permission that the object to be verified has electronic equipment.
6. according to the method described in claim 4, it is characterized in that, the target verification strategy be second authentication policy, It is described that authentication is carried out to the object to be verified according to the target verification strategy and the audio/video information, it obtains described The authentication result of object to be verified, comprising:
The audio/video information is parsed, corresponding second voice content of the audio/video information and the first lip reading information, institute are obtained Stating the second voice content is one section of content of text, and the first lip reading information is the instruction of multiple first lip readings;
Judge whether second voice content and the second default voice content are identical;
If it is determined that second voice content is identical as the described second default voice content, then judge the first lip reading information with Whether the first default lip reading information matches;
If it is determined that the first lip reading information and the described first default lip reading information matches, it is determined that the body of the object to be verified Part verification result is the unlock permission that the object to be verified has electronic equipment.
7. according to the method described in claim 4, it is characterized in that, the target verification strategy be the third authentication policy, It is described that authentication is carried out to the object to be verified according to the target verification strategy and the audio/video information, it obtains described The authentication result of object to be verified, comprising:
The audio/video information is parsed, the corresponding second lip reading information of the audio/video information, the second lip reading information are obtained It is instructed including multiple second lip readings;
Judge whether the second lip reading information matches with the second default lip reading information;
If it is determined that the second lip reading information and the described second default lip reading information matches, it is determined that the body of the object to be verified Part verification result is the unlock permission that the object to be verified has electronic equipment.
8. a kind of electronic equipment tripper based on vocal print, which is characterized in that described device includes:
Acquisition unit, for acquiring the audio/video information of object to be verified, the audio/video information by audio and video acquisition devices Including facial image, voiceprint, voice content and lip reading information;
Authentication unit obtains described to be tested for carrying out authentication to the object to be verified according to the audio/video information The authentication of object is demonstrate,proved as a result, the authentication result is for characterizing whether the object to be verified has electronic equipment Unlock permission;
Unlocking unit, for if it is determined that the authentication result is the unlocking right that the object to be verified has electronic equipment Limit then controls the electronic equipment unlock.
9. a kind of server, which is characterized in that described including processor, memory, communication interface and one or more programs One or more programs are stored in the memory, and are configured to be executed by the processor, and described program includes using In the instruction for executing the step in the method according to claim 1 to 7.
10. a kind of computer readable storage medium, which is characterized in that the computer readable storage medium is for storing computer Program, the computer program are executed by processor, to realize the method according to claim 1 to 7.
CN201811182704.XA 2018-10-11 2018-10-11 Electronic equipment unlocking method and related device based on voiceprint Active CN109063449B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811182704.XA CN109063449B (en) 2018-10-11 2018-10-11 Electronic equipment unlocking method and related device based on voiceprint

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811182704.XA CN109063449B (en) 2018-10-11 2018-10-11 Electronic equipment unlocking method and related device based on voiceprint

Publications (2)

Publication Number Publication Date
CN109063449A true CN109063449A (en) 2018-12-21
CN109063449B CN109063449B (en) 2024-07-09

Family

ID=64763846

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811182704.XA Active CN109063449B (en) 2018-10-11 2018-10-11 Electronic equipment unlocking method and related device based on voiceprint

Country Status (1)

Country Link
CN (1) CN109063449B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109903054A (en) * 2019-03-07 2019-06-18 百度在线网络技术(北京)有限公司 A kind of operation acknowledgement method, apparatus, electronic equipment and storage medium
CN111814732A (en) * 2020-07-23 2020-10-23 上海优扬新媒信息技术有限公司 Identity verification method and device
WO2022179253A1 (en) * 2021-02-26 2022-09-01 华为技术有限公司 Speech operation method for device, apparatus, and electronic device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101662680A (en) * 2008-08-28 2010-03-03 华为技术有限公司 Method, device and system for measuring video flow performance
CN103475490A (en) * 2013-09-29 2013-12-25 广州网易计算机系统有限公司 Identity authentication method and device
CN108259444A (en) * 2016-12-28 2018-07-06 南宁富桂精密工业有限公司 Malicious websites means of defence and system
CN108446674A (en) * 2018-04-28 2018-08-24 平安科技(深圳)有限公司 Electronic device, personal identification method and storage medium based on facial image and voiceprint

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101662680A (en) * 2008-08-28 2010-03-03 华为技术有限公司 Method, device and system for measuring video flow performance
CN103475490A (en) * 2013-09-29 2013-12-25 广州网易计算机系统有限公司 Identity authentication method and device
CN108259444A (en) * 2016-12-28 2018-07-06 南宁富桂精密工业有限公司 Malicious websites means of defence and system
CN108446674A (en) * 2018-04-28 2018-08-24 平安科技(深圳)有限公司 Electronic device, personal identification method and storage medium based on facial image and voiceprint

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109903054A (en) * 2019-03-07 2019-06-18 百度在线网络技术(北京)有限公司 A kind of operation acknowledgement method, apparatus, electronic equipment and storage medium
CN109903054B (en) * 2019-03-07 2023-11-28 百度在线网络技术(北京)有限公司 Operation confirmation method and device, electronic equipment and storage medium
CN111814732A (en) * 2020-07-23 2020-10-23 上海优扬新媒信息技术有限公司 Identity verification method and device
CN111814732B (en) * 2020-07-23 2024-02-09 度小满科技(北京)有限公司 Identity verification method and device
WO2022179253A1 (en) * 2021-02-26 2022-09-01 华为技术有限公司 Speech operation method for device, apparatus, and electronic device

Also Published As

Publication number Publication date
CN109063449B (en) 2024-07-09

Similar Documents

Publication Publication Date Title
EP1704668B1 (en) System and method for providing claimant authentication
CN105684345B (en) Identity authentication method, device and user equipment
CN105468950B (en) Identity authentication method and device, terminal and server
CN109997185A (en) Method and apparatus for the biometric authentication in electronic equipment
CN109063449A (en) Electronic equipment unlocking method and relevant apparatus based on vocal print
CN104298909B (en) Electronic device, authentication system and method
US8255699B2 (en) Portable data storage medium for biometric user identification
CN105429969B (en) A kind of user ID authentication method and equipment
CN105654033B (en) Face image verification method and device
WO2017045564A1 (en) Environmentally adaptive identity authentication method and terminal
US20160026840A1 (en) Enrollment And Authentication On A Mobile Device
WO2017066424A1 (en) Method and apparatus for initiating an operation using voice data
CN106062871B (en) Training a classifier using the selected subset of cohort samples
CN106169295B (en) Identity vector generation method and device
CN111611568A (en) Face voiceprint rechecking terminal and identity authentication method thereof
CN106096519A (en) Live body discrimination method and device
CN111653283B (en) Cross-scene voiceprint comparison method, device, equipment and storage medium
CN110472498A (en) Identity identifying method, system, storage medium and equipment based on hand-characteristic
JP2013239125A (en) Portable terminal
CN111445604A (en) Intelligent door and door lock opening method
CN110084142B (en) Age privacy protection method and system for face recognition
CN105827810B (en) A kind of communication terminal based on Application on Voiceprint Recognition recovers method and communication terminal
CN111611571A (en) Real-name authentication method and device
CN103856331B (en) A kind of signature authentication method and system
CN109284588A (en) Information Authentication method, apparatus and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant