CN115188109A - Device audio unlocking method, electronic device and storage medium - Google Patents

Device audio unlocking method, electronic device and storage medium Download PDF

Info

Publication number
CN115188109A
CN115188109A CN202210886056.6A CN202210886056A CN115188109A CN 115188109 A CN115188109 A CN 115188109A CN 202210886056 A CN202210886056 A CN 202210886056A CN 115188109 A CN115188109 A CN 115188109A
Authority
CN
China
Prior art keywords
audio
unlocking
type
voiceprint
voice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210886056.6A
Other languages
Chinese (zh)
Inventor
蔡春孟
顾向涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sipic Technology Co Ltd
Original Assignee
Sipic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sipic Technology Co Ltd filed Critical Sipic Technology Co Ltd
Priority to CN202210886056.6A priority Critical patent/CN115188109A/en
Publication of CN115188109A publication Critical patent/CN115188109A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/02Preprocessing operations, e.g. segment selection; Pattern representation or modelling, e.g. based on linear discriminant analysis [LDA] or principal components; Feature selection or extraction
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/04Training, enrolment or model building
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/06Decision making techniques; Pattern matching strategies
    • G10L17/08Use of distortion metrics or a particular distance between probe pattern and reference templates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Abstract

The invention discloses a device audio unlocking method, electronic equipment and a storage medium. In the method, an unlocking request audio is obtained; identifying whether the audio type corresponding to the unlocking request audio is a real voice type or not based on a preset audio type identification module; when the audio type is determined to be the real voice type, performing identity authentication on the unlocking request audio to determine whether to execute equipment unlocking operation; and when the audio type is determined to be the simulated human voice type, refusing to execute equipment unlocking operation. Therefore, illegal users can be effectively prevented from unlocking the equipment by using the synthesized voice or the recorded sound, and the safety of equipment unlocking is guaranteed.

Description

Device audio unlocking method, electronic device and storage medium
Technical Field
The invention belongs to the technical field of audio processing, and particularly relates to an equipment audio synthesis method, electronic equipment and a storage medium.
Background
The current voiceprint unlocking is based on the voiceprint sampling information of the equipment, and more is based on the extraction of the feature codes, so that the voice is matched, and the corresponding personnel information is obtained. However, there are some bugs in the above solutions, namely, the device may be directly unlocked by using a recording or speech synthesis method, which may result in failure to better defend against recording fraud.
In view of the above problems, the industry has not provided a better solution.
Disclosure of Invention
An embodiment of the present invention provides an apparatus audio unlocking method, an electronic apparatus, and a storage medium, which are used to solve at least one of the above technical problems.
In a first aspect, an embodiment of the present invention provides an apparatus audio unlocking method, including: acquiring an unlocking request audio; identifying whether the audio type corresponding to the unlocking request audio is a real voice type or not based on a preset audio type identification module; when the audio type is determined to be the real voice type, performing identity verification on the unlocking request audio to determine whether to execute equipment unlocking operation; and when the audio type is determined to be the simulated human voice type, refusing to execute equipment unlocking operation.
In a second aspect, an embodiment of the present invention provides an electronic device, which includes: the computer-readable medium includes at least one processor, and a memory communicatively coupled to the at least one processor, wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the steps of the above-described method.
In a third aspect, the present invention provides a storage medium, in which one or more programs including execution instructions are stored, where the execution instructions can be read and executed by an electronic device (including but not limited to a computer, a server, or a network device, etc.) to perform the steps of the above-mentioned method of the present invention.
In a fourth aspect, the present invention also provides a computer program product comprising a computer program stored on a storage medium, the computer program comprising program instructions which, when executed by a computer, cause the computer to perform the steps of the above method.
The embodiment of the invention has the beneficial effects that:
when the user uses the audio unlocking device, whether the audio type requested to be unlocked is the real voice type is identified, the following identity verification operation is continued after the voice type is determined, and the unlocking is refused when the voice type is determined to be the simulated voice type. Therefore, illegal users can be effectively prevented from unlocking the equipment by using the synthesized voice or the recorded sound, and the safety of equipment unlocking is guaranteed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
FIG. 1 shows a flow diagram of one example of a device audio unlocking method according to an embodiment of the invention;
fig. 2 is a flowchart illustrating an example of an authentication operation performed on the unlock request audio according to an embodiment of the present invention;
FIG. 3 illustrates an operational flow diagram of one example of a device audio unlocking method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an embodiment of an electronic device of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the embodiments and features of the embodiments may be combined with each other without conflict.
The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
As used herein, a "module," "system," and the like are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, or software in execution. In particular, for example, an element may be, but is not limited to being, a process running on a processor, an object, an executable, a thread of execution, a program, and/or a computer. Also, an application or script running on a server, or a server, may be an element. One or more elements may be in a process and/or thread of execution and an element may be localized on one computer and/or distributed between two or more computers and may be operated by various computer-readable media. The elements may also communicate by way of local and/or remote processes based on a signal having one or more data packets, e.g., from a data packet interacting with another element in a local system, distributed system, and/or across a network in the internet with other systems by way of the signal.
Finally, it should be further noted that the terms "comprises" and "comprising," when used herein, include not only those elements but also other elements not expressly listed or inherent to such processes, methods, articles, or devices. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of another like element in a process, method, article, or apparatus that comprises the element.
Fig. 1 is a flowchart illustrating an example of a device audio unlocking method according to an embodiment of the present invention. Regarding the execution subject of the method of the embodiment of the present invention, it may be various processing devices or modules (e.g., a central service module or a client local processor) having processing functions, so as to process the user audio and implement unlocking of the functions of the device or device application.
As shown in fig. 1, in step 110, an unlock request audio is acquired. Here, the audio requesting unlocking may be captured by an audio capture module onboard the device or audio data may be received from another device (e.g., a downstream client device for audio capture or functional unlock verification).
In step 120, based on the preset audio type identification module, it is identified whether the audio type corresponding to the unlocking request audio is the real voice type.
In some embodiments, the audio type identification module is capable of distinguishing a plurality of different preset audio types including a real human voice type.
In step 131, when it is determined that the audio type is the real human voice type, the unlocking request audio is authenticated to determine whether to perform a device unlocking operation. Here, the audio-based authentication manner may be diversified, such as voiceprint authentication, password authentication, and the like, and all of them belong to the implementation scope of the embodiment of the present invention.
In step 133, when it is determined that the audio type is the simulated human voice type, the device unlock operation is refused to be performed.
By the embodiment of the invention, the identification of the audio type before the audio authentication operation is carried out on the user is realized, whether the audio type is the real voice type is distinguished, the authentication of the audio data of the simulated voice type is not needed, the unlocking authentication efficiency of the equipment is improved, and the safety and the reliability of the audio unlocking operation are also ensured.
For the implementation details of the step 110, an environmental audio may be collected, whether a voice signal exists in the environmental audio is identified based on the voice endpoint detection module, and when the voice signal exists is detected, the unlocking request audio is determined according to the environmental audio. Therefore, frequent recognition and triggering of the non-human-voice environment audio are avoided, and resource consumption of the system can be effectively reduced.
For implementation details of the above step 120, the audio type identification module may employ a machine learning model to realize the identification of the audio type. Specifically, the training sample set of the machine learning model comprises a simulated audio sample and a real human voice sample, so that the audio type identification module can have the resolution capability on the simulated audio and the real human voice.
In the embodiment of the present invention, the types of the simulated audio samples can be diversified non-human audio samples, and all of them can be preferably practiced and applied in the embodiment of the present invention. Illustratively, the type of the simulated audio sample may include at least one of: recording audio samples, editing audio samples, and synthesizing audio samples.
In some embodiments, the audio type identification module may be composed of a plurality of cascaded audio type identification submodules. For example, the audio type recognition module may include a first recognition sub-module, a second recognition sub-module and a third recognition sub-module in cascade, wherein the first recognition sub-module is optimized by the recorded audio sample training, the second recognition sub-module is optimized by the edited audio sample training, and the third recognition sub-module is optimized by the synthesized audio sample training. Therefore, the characteristics of the specific simulated audio are identified through the respective identification submodules to determine whether the input audio is the corresponding type of simulated audio. Furthermore, when the recognition results of the recognition submodules for the specific simulation audio type are negative, the type of the input audio can be determined to be the real voice type.
Fig. 2 is a flowchart illustrating an example of an authentication operation performed on the unlocking request audio according to an embodiment of the present invention.
As shown in fig. 2, in step 210, a target voiceprint feature corresponding to the unlocking request audio is extracted.
In step 220, it is verified whether the target voiceprint feature is an authorized voiceprint.
In step 231, it is determined to perform a device unlock operation when the target voiceprint feature is an authorized voiceprint.
In step 233, when the target voiceprint feature is not an authorized voiceprint, execution of a device unlock operation is denied.
By the embodiment of the invention, the voiceprint identity verification operation is carried out in a voiceprint feature matching mode, so that the reliability of the voiceprint identity verification operation can be effectively ensured.
It should be noted that, based on the current voiceprint use environment, considering that the current voice synthesis and recording technology is relatively developed, certain worry is generated about the safety of the current voiceprint unlocking. In the embodiment of the invention, before voiceprint information is screened, information of recording, voice synthesis and voice editing is intercepted, and protected sound is used for sound matching and equipment unlocking, so that the safety of equipment unlocking operation can be effectively guaranteed.
As to implementation details of step 230 above, the target voiceprint characteristics can be matched with each registered voiceprint characteristics in the authorized voiceprint library to verify whether the target voiceprint characteristics are authorized voiceprints. Specifically, the authorized user may send the registration voice to the server in advance, and the server may extract the registration voiceprint feature corresponding to the registration voice and store the registration voiceprint feature in the authorization voiceprint library.
In some examples of embodiments of the present invention, when it is determined that the audio type is the simulated human voice type, a first unlocking failure notification is generated to prompt the user to unlock using real voice, and when the target voiceprint feature is not an authorized voiceprint, a second unlocking failure notification is generated to prompt the current user to be an unauthorized user. Therefore, when unlocking fails, the unlocking user can quickly know the reason of the unlocking failure, and the method is helpful for the user or customer service to quickly take countermeasures.
Fig. 3 is an operation flowchart of an example of a device audio unlocking method according to an embodiment of the present invention.
As shown in fig. 3, the device continuously obtains the voice from the outside, and when the voice detection module detects the voice, the current voice is intercepted, and a segment of voice data is obtained. And then, the intercepted voice data is sent to a voice protection module, and the voice frequency characteristics are respectively verified and matched with the synthetic voice, the recording voice and the editing voice. If one of the sounds is detected, unlocking fails; otherwise, the voice is sent to the voiceprint module for matching. And finally, calling a voiceprint module to match the voice feature code with the data of the database, if the voice feature code is matched with the data of the database, indicating that the voiceprint information exists in the database, and unlocking the equipment, otherwise, indicating that the user is not an authorized local user and not unlocking the equipment.
It should be noted that for simplicity of explanation, the foregoing method embodiments are described as a series of acts or combination of acts, but those skilled in the art will appreciate that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art will appreciate that the embodiments described in this specification are presently preferred and that no acts or modules are required by the invention. In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In some embodiments, the present invention provides a non-transitory computer readable storage medium, in which one or more programs including executable instructions are stored, where the executable instructions can be read and executed by an electronic device (including but not limited to a computer, a server, or a network device, etc.) to perform any one of the above-described device audio unlocking methods of the present invention.
In some embodiments, the present invention further provides a computer program product, which includes a computer program stored on a non-volatile computer-readable storage medium, where the computer program includes program instructions, and when the program instructions are executed by a computer, the computer executes any one of the above methods for unlocking audio of a device.
In some embodiments, an embodiment of the present invention further provides an electronic device, which includes: the audio unlocking device comprises at least one processor and a memory which is connected with the at least one processor in a communication mode, wherein the memory stores instructions which can be executed by the at least one processor, and the instructions are executed by the at least one processor so as to enable the at least one processor to execute the audio unlocking method of the device.
Fig. 4 is a schematic diagram of a hardware structure of an electronic device for executing a device audio unlocking method according to another embodiment of the present invention, and as shown in fig. 4, the electronic device includes:
one or more processors 410 and a memory 420, with one processor 410 being an example in fig. 4.
The device performing the device audio unlocking method may further include: an input device 430 and an output device 440.
The processor 410, the memory 420, the input device 430, and the output device 440 may be connected by a bus or other means, such as the bus connection in fig. 4.
The memory 420, which is a non-volatile computer-readable storage medium, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules, such as program instructions/modules corresponding to the device audio unlocking method in the embodiments of the present invention. The processor 410 executes various functional applications and data processing of the server by executing nonvolatile software programs, instructions and modules stored in the memory 420, namely, the device audio unlocking method of the embodiment of the method is realized.
The memory 420 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the voice interactive apparatus, and the like. Further, the memory 420 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, memory 420 may optionally include memory located remotely from processor 410, which may be connected to an audio synthesis device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 430 may receive input numeric or character information and generate signals related to user settings and function control of the audio synthesis apparatus. The output device 440 may include a display device such as a display screen.
The one or more modules are stored in the memory 420 and, when executed by the one or more processors 410, perform the device audio unlocking method of any of the method embodiments described above.
The product can execute the method provided by the embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method. For technical details that are not described in detail in this embodiment, reference may be made to the method provided by the embodiment of the present invention.
The electronic device of embodiments of the present invention exists in a variety of forms, including but not limited to:
(1) Mobile communication devices, which are characterized by mobile communication functions and are primarily targeted at providing voice and data communications. Such terminals include smart phones, multimedia phones, functional phones, and low-end phones, among others.
(2) The ultra-mobile personal computer equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include PDA, MID, and UMPC devices, among others.
(3) Portable entertainment devices such devices may display and play multimedia content. The devices comprise audio and video players, handheld game consoles, electronic books, intelligent toys and portable vehicle-mounted navigation devices.
(4) Other onboard electronic devices with data interaction functions, such as a vehicle-mounted device mounted on a vehicle.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a general hardware platform, and certainly can also be implemented by hardware. Based on such understanding, the above technical solutions substantially or contributing to the related art may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, and not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (9)

1. A device audio unlocking method, comprising:
acquiring an unlocking request audio;
identifying whether the audio type corresponding to the unlocking request audio is a real voice type or not based on a preset audio type identification module;
when the audio type is determined to be the real voice type, performing identity authentication on the unlocking request audio to determine whether to execute equipment unlocking operation;
and when the audio type is determined to be the simulated human voice type, refusing to execute equipment unlocking operation.
2. The method of claim 1, wherein the authenticating the unlock request audio to determine whether to perform a device unlock operation comprises:
extracting a target voiceprint characteristic corresponding to the unlocking request audio;
verifying whether the target voiceprint feature is an authorized voiceprint;
when the target voiceprint characteristic is an authorized voiceprint, determining to execute equipment unlocking operation; and
and when the target voiceprint characteristic is not the authorized voiceprint, refusing to execute the equipment unlocking operation.
3. The method of claim 1, wherein the audio type recognition module includes a machine learning model whose training sample set includes simulated audio samples and real human voice samples.
4. The method of claim 3, wherein the simulated audio samples comprise at least one of: recording audio samples, editing audio samples, and synthesizing audio samples.
5. The method of claim 2, wherein the verifying whether the target voiceprint feature is an authorized voiceprint comprises:
and matching the target voiceprint characteristics with each registered voiceprint characteristics in an authorized voiceprint library so as to verify whether the target voiceprint characteristics are authorized voiceprints.
6. The method of claim 1, wherein the obtaining the unlock request audio comprises:
collecting environmental audio;
identifying whether a voice signal exists in the environmental audio based on a voice endpoint detection module;
and when the voice signal is detected to exist, determining unlocking request audio according to the environment audio.
7. The method of claim 2, wherein the method further comprises:
when the audio type is determined to be the simulated human voice type, generating a first unlocking failure notice to prompt a user to unlock by using real voice; and
and when the target voiceprint feature is not an authorized voiceprint, generating a second unlocking failure notice to prompt the current user to be an unauthorized user.
8. An electronic device, comprising: at least one processor, and a memory communicatively coupled to the at least one processor, wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the steps of the method of any one of claims 1-7.
9. A storage medium on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN202210886056.6A 2022-07-26 2022-07-26 Device audio unlocking method, electronic device and storage medium Pending CN115188109A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210886056.6A CN115188109A (en) 2022-07-26 2022-07-26 Device audio unlocking method, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210886056.6A CN115188109A (en) 2022-07-26 2022-07-26 Device audio unlocking method, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN115188109A true CN115188109A (en) 2022-10-14

Family

ID=83521971

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210886056.6A Pending CN115188109A (en) 2022-07-26 2022-07-26 Device audio unlocking method, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN115188109A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110364178A (en) * 2019-07-22 2019-10-22 出门问问(苏州)信息科技有限公司 Voice processing method and device, storage medium and electronic equipment
CN110459204A (en) * 2018-05-02 2019-11-15 Oppo广东移动通信有限公司 Audio recognition method, device, storage medium and electronic equipment
CN112562742A (en) * 2020-12-29 2021-03-26 苏州思必驰信息科技有限公司 Voice processing method and device
CN114550731A (en) * 2022-03-31 2022-05-27 北京百度网讯科技有限公司 Audio identification method and device, electronic equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110459204A (en) * 2018-05-02 2019-11-15 Oppo广东移动通信有限公司 Audio recognition method, device, storage medium and electronic equipment
CN110364178A (en) * 2019-07-22 2019-10-22 出门问问(苏州)信息科技有限公司 Voice processing method and device, storage medium and electronic equipment
CN112562742A (en) * 2020-12-29 2021-03-26 苏州思必驰信息科技有限公司 Voice processing method and device
CN114550731A (en) * 2022-03-31 2022-05-27 北京百度网讯科技有限公司 Audio identification method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110365996B (en) Live broadcast management method, live broadcast management platform, electronic device and storage medium
US10135818B2 (en) User biological feature authentication method and system
US9571490B2 (en) Method and system for distinguishing humans from machines
CN111414599A (en) Identity authentication method, device, terminal, server and readable storage medium
CN107800672B (en) Information verification method, electronic equipment, server and information verification system
US10231124B2 (en) Anti-theft method and client for a mobile terminal
CN109271762B (en) User authentication method and device based on slider verification code
US20140233855A1 (en) Verifying vendor identification and organization affiliation of an individual arriving at a threshold location
CN106888204B (en) Implicit identity authentication method based on natural interaction
CN113177850A (en) Method and device for multi-party identity authentication of insurance
CN112966249A (en) Multi-user account switching method and device, computer equipment and medium
CN115188109A (en) Device audio unlocking method, electronic device and storage medium
KR20010019772A (en) User Password Verification System and Method by Speech for Reinforced Security
CN108985035B (en) Control method and device for user operation authority, storage medium and electronic equipment
CN115906028A (en) User identity verification method and device and self-service terminal
CN110532742B (en) Identity authentication method, identity authentication device, secret key equipment and storage medium
EP3572961B1 (en) Method and system for continuous verification of user identity in an online service using multi-biometric data
CN112671979A (en) Terminal anti-theft method and device
KR20020045150A (en) The System of File Transmission and Management using Voice Verification and the Method thereof
CN110675880A (en) Identity verification method and device and electronic equipment
US20230359719A1 (en) A computer implemented method
CN117831142A (en) Voice sign-in method, system, electronic equipment and storage medium
CN116756715A (en) Work number management method and device
CN117909958A (en) Login method, login device, login equipment and storage medium
Felker et al. Voice input for authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination