WO2020002406A1 - Procédé de décodage d'entrée d'utilisateur codée - Google Patents

Procédé de décodage d'entrée d'utilisateur codée Download PDF

Info

Publication number
WO2020002406A1
WO2020002406A1 PCT/EP2019/066964 EP2019066964W WO2020002406A1 WO 2020002406 A1 WO2020002406 A1 WO 2020002406A1 EP 2019066964 W EP2019066964 W EP 2019066964W WO 2020002406 A1 WO2020002406 A1 WO 2020002406A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
elements
target information
code elements
sequence
Prior art date
Application number
PCT/EP2019/066964
Other languages
English (en)
Inventor
Kim Cornelius MØLLER
Peter Cornelius MØLLER
Erland MØLLER
Original Assignee
Erland Møller Og Sønner K/S
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Erland Møller Og Sønner K/S filed Critical Erland Møller Og Sønner K/S
Publication of WO2020002406A1 publication Critical patent/WO2020002406A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Definitions

  • the present disclosure relates to a computer implemented method of encoding and decoding information using a mapping manual.
  • the disclosure relates to a method and an apparatus for manipulation of a user input using such encoding and decoding.
  • Sequences of numbers and signs, such as alphabetic letters and characters, are used extensively in data processing as either an input and/or output. Providing an input can in some situations be a difficult and demanding task, especially for relatively long sequences. This requires concentration and time and the likelihood of input errors is increased such that the process must be repeated to eliminate the errors.
  • number and sign sequences are social security numbers, payment order numbers, customer IDs, invoice numbers, order numbers, shipping numbers, phone numbers, EAN codes, account numbers, transaction IDs, security codes, transitory codes, zip codes, IP addresses, terminal IDs, archival numbers, card numbers, and many others.
  • a significantly secure passcode is by definition one that contains many characters with no discernible pattern or logic which makes it hard to crack but also harder to remember.
  • Handling cargo may require a secure identification of the handled unit.
  • a person When a person is inspecting shipping containers on a moving vessel they often will have at least one hand to hold a recording device such as a notebook or electronic tablet. The other hand may be required to hold on for stability or be used to point an illumination device at the container ID. This means that it can be cumbersome to have to use one of the hands to write or type the ID number in the records.
  • a delivery person may be holding a package with both hands which again makes recording the ID of the package difficult or impossible without putting the package down.
  • a method for decoding a user input to derive a target information from the user input comprising:
  • a processor such as a hardware processor, the operations of:
  • mapping manual comprising a plurality of pairs of correlated code elements and information elements
  • a method for decoding a user input to derive a target information from the user input comprising:
  • a processor such as a hardware processor, the operations of:
  • mapping manual comprising a plurality of pairs of correlated code elements and information elements, wherein the code elements of the mapping manual are heterophone with respect to each other;
  • the mapping manual may be obtained by loading a data file containing the mapping manual into the processor, such as into the hardware processor.
  • the mapping manual may loaded from various computer readable storage media, such as a local hard-disk, a remote server, the cloud or any other means for storing data.
  • Identifying the sequence of code elements from the user input may comprise several steps. For example in the case where the user input comprises a user utterance, speech recognition is preferably performed on the received utterance to provide audio data representing the user utterance. The audio data are then analysed to divide the audio data into a sequence of code elements forming the encoded target information.
  • the target information retrieved by this method may subsequently be delivered to the target system.
  • sequence of code elements and the sequence of information elements may each comprise one or more code elements and information elements, respectively.
  • a method for encoding a target information comprising:
  • a processor such as a hardware processor, the operations of:
  • mapping manual comprising a plurality of pairs of correlated code elements and information elements
  • a method for encoding a target information to derive an encoded target information from the target information comprises:
  • a processor such as a hardware processor, the operations of:
  • mapping manual comprising a plurality of pairs of correlated code elements and information elements, wherein the code elements of the mapping manual are heterophone with respect to each other;
  • the method may comprise selecting the mapping manual from a plurality of mapping manuals each made for a different language by matching a user language to the language of the mapping manual.
  • the result of encoding the target information i.e. the sequence of code elements, may then be delivered to the user.
  • the user may more easily memorize the sequence of code elements and be ready to provide it at a later point in time.
  • the target information may be provided by the target system or a separate system.
  • an input manipulation apparatus for handling encoded target information comprising:
  • a user input capture device for receiving a user input representing encoded target information
  • a decoder comprising a processor, such as a hardware processor, and a computer readable medium, such as a non-transitory computer readable medium, storing:
  • mapping manual comprising a plurality of pairs of correlated code elements and information elements
  • a computer program product comprising instructions which when executed by the processor, such as by the hardware processor, are configured for:
  • an input manipulation apparatus for handling encoded target information comprising:
  • a user input capture device configured for receiving a user input representing an encoded target information, wherein the user input comprises a user utterance
  • a speech recognizer configured for performing speech recognition on the user utterance
  • a decoder comprising a processor, such as a hardware processor, and a computer readable medium, such as a non-transitory computer readable medium, storing:
  • mapping manual comprising a plurality of pairs of correlated code elements and information elements, wherein the code elements of the mapping manual are heterophone with respect to each other;
  • a computer program product comprising instructions which when executed by the processor, such as by the hardware processor, are configured for: identifying a sequence of code elements from the user input, wherein at least part of the code elements consist of words;
  • the input manipulation apparatus comprises an encoder configured for encoding target information by converting, using the mapping manual, information elements of the target information to correlated code elements.
  • the computer program product stored at the decoder may comprise additional instructions which when executed by the processor, such as a hardware processor, are configured for confirming a data integrity attribute of the target information. Confirming the data integrity attribute of the target information may comprise performing a checksum
  • Confirming the data integrity attribute of the target information may comprise implementing an transport layer protocol, such as a transmission control protocol (TCP), such as a user datagram protocol (UDP), such as a point-to-point tunnelling protocol (PPTP), etc.
  • TCP transmission control protocol
  • UDP user datagram protocol
  • PPTP point-to-point tunnelling protocol
  • a speech recognizer may be implemented in any way known to a skilled person, and the speech recognizer may be implemented by a processor, such as a hardware processor, configured for semi-autonomous natural language processing.
  • an input manipulation apparatus for handling target information comprising:
  • an encoder comprising a processor, , such as a hardware processor, and a computer readable medium, such as a non-transitory computer readable medium, storing:
  • mapping manual comprising a plurality of pairs of correlated code elements and information elements
  • a computer program product comprising instructions which when executed by the processor, such as the hardware processor, are configured for:
  • an input manipulation apparatus for encoding target information comprising:
  • a memory device configured for providing an encoded target information, such as to a user
  • an encoder comprising a processor, such as the hardware processor, and a computer readable medium, such a non-transitory computer readable medium, storing:
  • mapping manual comprising a plurality of pairs of correlated code elements and information elements, wherein the code elements of the mapping manual are heterophone with respect to each other;
  • a computer program product comprising instructions which when executed by the processor are configured for:
  • the memory device configured for providing an encoded target information may be implemented by a packet buffer in a network interface card.
  • the herein disclosed methods may be computer-implemented methods, the methods being implemented using computers, and/or processors, such as hardware processor, configured for performing the methods as herein disclosed.
  • the input manipulation apparatus comprises a decoder configured to obtain and decode the encoded target information, where the decoding is based on the mapping manual.
  • the input manipulation apparatus comprises a database configured for caching and/or storing a plurality of pairs of target information and corresponding encoded target information.
  • the input manipulation apparatus is enabled to check if an obtained target information has previously been encoded, and if so, is further enabled to retrieve the corresponding encoded target information instead of executing instructions by the processor at the encoder to encode the target information. It is advantageous that caching and/or storing a plurality of pairs of target information and corresponding encoded target information provides fewer instructions to be executed at the processor.
  • the input manipulation apparatus comprises a service interface, such as a web interface, such as a user interface of the device, configured for receiving a request for encoding a target information.
  • a service interface configured for receiving a request for encoding a target information
  • the input manipulation apparatus is enabled to handle a plurality of simultaneous requests for encoding a plurality of target information, such as by queuing the requests. It is advantageous that a service interface configured for receiving a request for encoding a target information enables handling of a plurality of simultaneous requests, which allows more users/systems to be served at once.
  • the service interface may comprise a front end for a database server.
  • the service interface may also provide a web service by implementing an application layer protocol, such as a hypertext transfer protocol (HTTP), such as a Doctrine database abstraction layer (DBAL) protocol, such as a clear text protocol, etc.
  • HTTP hypertext transfer protocol
  • DBAL Doctrine database abstraction layer
  • Encoding target information (e.g. a data string of arbitrary length) to a sequence of code elements using the mapping manual provides a sequence of code elements which more easily is remembered and transferred to an input system while still containing the same amount of data as the target information.
  • Encoding the target information involves identifying a sequence of information elements each containing one or more signs of the original data string forming the target information.
  • a target information in the form of a data string containing the twelve digits“396218269514” may be divided into four information elements“396”,“218”,“269” and “514” which then are converted to the four corresponding code elements, e.g.“guitar”, “automobile”,“Thomas” and“house”.
  • the sequence“guitar”,“automobile”,“Thomas” and “house” is clearly easier to remember and to utter than“396218269514”.
  • the target information of arbitrary length is encoded to and expressed by a sequence of code elements which more easily may be remembered and input a target system, such as a bank terminal or a payment device.
  • the encoding of the data string may be handled by an encoder comprising a data processor, such as a computer or similar device, equipped with a computer program product configured for converting the target information into a sequence of code elements, e.g. using the mapping manual.
  • the system may present this sequence of code elements as output on paper, electronic media, or as communicated data for further processing.
  • the user may then enter the sequence of code elements to a decoder e.g. simply by uttering the sequence to the disclosed decoder which decodes the utterance to arrive at the sequence of information elements and hence the target information.
  • a decoder e.g. simply by uttering the sequence to the disclosed decoder which decodes the utterance to arrive at the sequence of information elements and hence the target information.
  • the decoder may e.g. register the decoded target information and possibly execute an action which specifically requires the presentation of this string of information. E.g. a PIN which is a prerequisite for a money transfer.
  • the decoder may also send the decoded string of information to a target system.
  • An operational system may comprise several parts such as:
  • an encoder configured to receive a data string representing a target information and return a sequence of code elements, according to a mapping manual
  • a decoder configured to receive and decode the sequence of code elements and return a string of information elements which combine to form the target information encoded by the encoder.
  • an input manipulation system for handling encoded target information comprising:
  • a user input capture device configured for receiving a user input representing an encoded target information, wherein the user input comprises a user utterance; a speech recognizer configured for performing speech recognition on the user utterance; a memory device configured for providing an encoded target information, such as to a user; a least one processor; and at least one computer readable medium storing:
  • mapping manual comprising a plurality of pairs of correlated code elements and information elements, wherein the code elements of the mapping manual are heterophone with respect to each other;
  • a first computer program product comprising instructions which when executed by the at least one processor, are configured for:
  • a second computer program product comprising instructions which when executed by the at least one hardware processor are configured for:
  • the user input comprises a user utterance
  • the method comprises performing speech recognition on the user utterance.
  • Delivering the encoded target information in the form of a user utterance provides the advantage that code elements such as words easily may be spoken and that no hands are required to enter the user input.
  • the content of the user utterance may be identified by speech recognition.
  • the speech recognition may be performed by the user input capture device which then analyses the received utterance and delivers audio data relating to the provided user utterance to the hardware processor of the decoder.
  • the user input capture device may be on same location as the hardware processor, e.g. as part of one system, or on a remote location. The latter may e.g. be the case when hardware processor is part of a remote centralized system.
  • the encoder and decoder may be connected via a communication network, such as a wireless data network, such that data regarding e.g. the mapping manual and updates to this may be communicated e.g. from a central computer unit to the encoder and decoder. Further if such a central computer is used for speech recognition analysis of a user utterance, a representation of the utterance may be sent to the central computer from the decoder via the communication network or to the decoder from a terminal, such as a remote terminal or a user’s computer or mobile device, via the communication network.
  • the decoder and encoder may both be at a location distant from the user with communication of code element sequences and user utterances being communicated to and from the user over the communication network.
  • the encoder and decoder may be implemented on the same data processing device. Other parts in the system may be sales terminals, vending machines, large administrative IT system, systems designed to provide a specific service to their users, other systems and other devices.
  • the encoded target information is represented by a sequence of code elements. This sequence is designated as the encoded target information.
  • the encoded target information represents the result of coding the target information using the mapping manual to convert the information elements into code elements. I.e. the code elements are generated by coding the information elements based in the correlated pairs of the mapping manual.
  • Converting difficult target information intended for a target system to sequences of code elements and decoding each code elements may provide the following advantages:
  • a user can communicate difficult target information to a target system as utterances or entered code elements which are reliable in use, easy to remember and use;
  • the time spent on keying in data for e.g. logging on to the target system can be reduced
  • system and apparatuses can act as a communications link between users and secure systems e.g. for payment transactions and protection of information.
  • the method comprises validating the user input by:
  • mapping elements with the code elements of the mapping manual to confirm the validity of the received user input with respect to the mapping manual.
  • code elements found in the mapping manual are considered valid. If the validity of the received user input is confirmed, the sequence of proposed code elements is accepted.
  • the target information is divided into a sequence of information elements and the corresponding sequence of code elements is determined using the mapping manual.
  • a mapping manual comprising a plurality of predefined pairs of correlated code elements and information elements.
  • the target information is encoded using the mapping manual to determine a sequence of code elements that can represent the target information.
  • the encoded target information is decoded using the mapping manual to convert the sequence of code elements in the obtained encoded target information into the corresponding sequence of information elements such that the target information is retrieved.
  • the phrase“encoded target information” may be used in relation to the signs, i.e. letters, symbols, digits, etc. representing the result of encoding the target information.
  • the code elements relating to the information elements of the target information may be generated by encoding the information elements of the target information using the mapping manual.
  • Encoding the target information may provide the advantage of protecting the target information, such that when communicated e.g. in the form of a user utterance representing a protected target information, it does not readily reveal the target information to a third party overhearing the user utterance without further knowledge of the method.
  • the phrase“compatible mapping manual” may be used in relation to an encoded target information and a first mapping manual comprising a plurality of pairs of correlated code elements and information elements, wherein each unique code element in the sequence of code elements representing the encoded target information is also represented in the first mapping manual by a corresponding pair of the code element and the correlated information element. If all such corresponding pairs of correlated code elements and information elements in the first mapping manual are identical to pairs of correlated code elements and information elements comprised in a second mapping manual used for encoding the target information, the first mapping manual is considered compatible with the second mapping manual.
  • Any one encoded target information may be decoded using a compatible mapping manual to convert the sequence of code elements in the obtained encoded target information into the corresponding sequence of information elements whereby the target information is retrieved.
  • a mapping manual is sufficiently large to comprise a compatible mapping manual to any allowable form of an encoded target information e.g. represented as an arbitrary sequence of code elements chosen from at least 100 code elements.
  • the sequence of code elements may comprise a control code element and the sequence of information elements may comprise an information control element representing a data integrity attribute of the target information, such as a check sum, such as a cryptographic hash digest, such as an error-correcting code, such as a credit card security code, etc.
  • the sequence of information elements not comprising the information control element may be processed into an information control element by using any mathematical method, such as a check sum, such as a Luhn formula, such as a modulus 11 formula, etc.
  • a correlated control code element may be generated for the information control element.
  • an information control element may be comprised in the sequence of information elements without
  • control code element comprised in the sequence of code elements representing an encoded target information may be in the same form as the other code elements.
  • the control code element provides that a decoder may detect if the sequence of code elements was identified correctly, and thus that the data integrity of the target information was preserved.
  • generating a sequence of code elements, at the encoder comprises generating a correlated control code element for a first information control element, by converting, using the mapping manual, the first information control element into the correlated control code element representing a data integrity attribute of the target information.
  • generating a sequence of information elements, at the decoder comprises generating a second information control element for the control code element, by converting, using the mapping manual, the control code element into the correlated second information control element representing a data integrity attribute of the target information.
  • the encoder and decoder may be configured for comparing a first information control element, generated at the encoder, with a second information control element, generated at the decoder, to confirm the data integrity attribute of the target information derived from the user input.
  • the input manipulation system may provide or may ensure that no user utterance representing encoded target information, wherein a code element in the sequence of code element has been mistaken for another code element, such as by a user mistake, will result in incorrect target information being delivered to a target system. It is advantageous that delivering incorrect target information to a target system may be precluded as delivering incorrect target information to a target system may have unexpected side effects or consequences. Having the user utterance also convey a control code element in the encoded target information may provide a solution for confirming the target information without imposing undue burden.
  • identifying a sequence of information elements, at the encoder further comprises processing the sequence of information elements not comprising the information control element into a first information control element by using any mathematical method, such as a check sum, such as a Luhn formula, such as a modulus 11 formula, etc.
  • the processing may be performed as a final step in identifying the sequence of information elements or after.
  • converting the code elements into the correlated information elements, at the decoder comprises processing the sequence of information elements not comprising the information control element into a second information control element by using any
  • the processing may be performed as a final step in converting the code elements into the correlated information elements or after.
  • the computer program product stored at the decoder further comprises instructions which when executed by the hardware processor are configured for comparing the first information control element with the second information control element to confirm the data integrity attribute of the target information derived from the user input.
  • the code elements of the mapping manual are heterophone with respect to each other. In some embodiments, any two code elements which are heterophone are spelled differently.
  • the code elements of the mapping manual are heterophone with respect to each other since this allows for a user input in the form of a user utterance.
  • the heterophone code elements provide that the two different code elements are not mistaken.
  • code elements being heterophone implies that the pronunciation of a first heterophone code element is distinct from the pronunciation of any other code element.
  • speech recognition on the user utterance will identify the sequence of code elements from the user utterance with a high degree of certainty. For example, the degree of certainty may be higher than 95%, such as higher than 99%.
  • each code element in the mapping manual is correlated to one information element only. This provides for a smaller mapping manual compared to cases where some information elements may have two or more correlated code elements.
  • one or more code elements in the mapping manual is correlated to two or more information elements. This provides the advantage that the user may be allowed to select among different code elements for a given information element.
  • the mapping manual comprises a plurality of pairs of correlated information elements and code elements.
  • the mapping manual comprises at least 100 pairs of corresponding predefined code elements and corresponding code elements and thus describe the mapping between at least 100 code elements and the corresponding information elements.
  • the mapping manual may comprise a list of information elements adequate as input for a target system.
  • the target information may primarily be numerical values. These numerical values may be comprised of long strings of digits, be complex, and often of a critical nature for the user and the target system.
  • the system may also receive non-numerical values as well.
  • the information elements may be single-digit, double-digit, and three-digit numbers, as well as specific four-, five- and six-digit numbers. Furthermore, any signs that need to be represented, such as the full alphabet and special characters, may be included as well. If so desired, specific long and complex elements can be assigned.
  • a given target information may be divided into information elements several different ways.
  • Each of these information elements may be represented by one or more code elements.
  • a given target information may thus be represented by several different sequences of code elements.
  • security codes are required to consist of combinations of numbers, both lower case and upper case letters, and a selection of special characters from a keyboard. Having such security codes be represented by easy-to-remember code elements helps a user enter the correct information.
  • a system or apparatus for manipulating input may for different purposes be supplied with different mapping manuals, each listing the specific information elements for the code elements at hand.
  • the manual that applies to a given communication is preferably synchronised between the coding and the decoding devices and process in the system.
  • a common standard mapping manual may be used.
  • mapping manuals are preferably made for each language
  • mapping manuals For each of these mapping manuals, a common standard is preferably established and that adjustments and additions are performed synchronously. It is likely that experiences will be gained from the use of the system and various code elements. It is possible that a certain code element will prove to be problematic in some way. In some embodiments, a code element which is found to be problematic for some reason may be deleted and a new code element added to represent the same information element as the problematic word.
  • the mapping manual may be installed in the device or devices that handle the encoding and decoding.
  • the mapping manual may be accessible form the device or devices which handle the encoding and decoding, such as be accessible from a remote server, such as from a cloud based network, etc.
  • the target information may be of any length and consist of numerical digits and signs, such as alphabetic letters, and/or combinations thereof.
  • the number of code elements in the sequence of code elements is smaller than the number of signs and numerical digits in the target information.
  • the target information is divided into information elements, where at least one information element contains more than one sign or numerical digit. This may be done either in proper or reverse order.
  • the target information with the 12 digits“396218269514” is divided into four information elements“396”,“218”,“269” and“514”.
  • An initial analysis of the target information may determine the longest information elements the target information may be divided into based on the mapping manual. This provides that the number of information elements, and hence the number of code elements, required to represent the target information may be minimized such that the encoded information most easily can be remembered and uttered.
  • the code elements corresponding to the identified information elements are determined such that the encoded target information with the sequence of code elements is determined.
  • the code elements identified in this process are arranged according to the appearance of the corresponding information elements in the target information.
  • an information element corresponds to more than one code element
  • a sequence of code elements may be generated for each possible outcome. This enables the user to select the preferred sequence or sequences. All the presented options may represent the original target information. Different applications may make certain options preferable.
  • the encoding may be performed by a legal entity, such as a commercial company or a public institution, who is expecting to need the user’s input in the future. This may be a company issuing invoices with order numbers, shipping IDs, item numbers and payment orders with account numbers.
  • a legal entity such as a commercial company or a public institution
  • This may be a company issuing invoices with order numbers, shipping IDs, item numbers and payment orders with account numbers.
  • banks can generate sequences of code elements for account numbers, credit card numbers, etc.
  • the user may also generate the sequence himself, e.g. using a user interface on a device, such as network connected device, a mobile device, etc.
  • User generated sequences may include code elements for security codes. Using code elements which the users have created themselves, the users may much better retain and use long security codes.
  • the user may be allowed to reprioritize how the target information is divided into information elements, and the selection of corresponding code elements.
  • the purpose of this exercise may be to generate a preferred sequence of code elements.
  • a possible reason may be that a given sequence of code elements is easier to remember, enter or utter for the user.
  • a user may provide an input in a device capable of e.g. handling either manually entering the information (e.g. keypad) or receiving an utterance (e.g. a microphone connected to device, such as a speech to text device).
  • a comparison with the mapping manual may be executed to confirm the validity of the input (only code elements found in the mapping manual are considered valid). If the input is confirmed the sequence of target elements is accepted and the user may be notified. If the input cannot be confirmed, the system preferably returns an error message and/or provides a new suggestion for a sequence of code elements.
  • a user may create a sequence of personal code words. This sequence may define a particular target information that is be designated as the user’s personal service number, provided the specific sequence is not already in use.
  • the personal service number may be used to access all the user’s relations such as accounts, memberships and identities.
  • the sequence of code elements forming at least part of the encoded target information may be provided to a decoder. This may be done in several ways such as by typing in the code elements on a keyboard connected to an operating system, or by speaking or uttering the code elements into a microphone which will transmit to a speech recognition system which subsequently will deliver a result of the speech analysis.
  • the speech recognition system may be part of the decoder, the speech recognition system may be provided at a remote server, such as in a cloud based system, etc.
  • the result of the speech analysis may be sent to the decoder and the decoder may form part of the device or the decoder may be implemented at a remote server, such as in a cloud based system.
  • the physical distance between the user and the decoder may be quite long, as long as an adequate communication link exists.
  • the device used may be equipped with an input assisting function to ease the entering of input, such as an auto-correct system known from smartphones and similar devices.
  • an input assisting function to ease the entering of input, such as an auto-correct system known from smartphones and similar devices.
  • the mapping manual has“Aleksander” as the only code element starting with“Ale”.
  • the mapping manual offers a number of valid options, such as between fifty and a hundred valid options, each starting with an“A” from which the user may choose.
  • the next letter is T, the selection is most likely among a smaller number of options, and by the third letter‘e’, the code element is uniquely identified as“Aleksander”.
  • the word assumed to be the correct code element may then be highlighted, or may be discarded by the user.
  • the vocabulary of such an input assisting function is preferably limited to the relevant mapping manual.
  • the number of code elements in the encoded target information may vary.
  • signals denoting when input is finished are defined and/or a timer which marks how soon after the last detection of input that input is considered to have ended may be included. This may ensure quick and efficient handling of the encoded target information.
  • code elements in the form of words may have the advantage that words often are clearly heterophone and longer words, e.g. Alexander, are easy to remember compared to e.g. numbers with multiple digits.
  • the words used as code elements in a mapping manual may be selected through careful studying and screening a lexicon of the language to be used. Below, the prerequisites for these code elements are explored. Experience tells us that most languages only have a few thousand especially suitable words, such as words for which the pronunciation of one suitable word is distinct with respect to the pronunciation of other suitable words. This may limit how many elements may be expressed by code elements in a single mapping manual. The transfer of information from a printed source may be easier, when it is done with words rather than numbers, because people can often better relate to words than numbers, and it is easier to fluently read out words rather than numbers. In addition, the code elements of the present disclosure will eliminate recitation errors and typos.
  • At least part of the information elements consist of numbers, such as combinations of one or more digits. This may e.g. be the case for credit card numbers and social security numbers.
  • At least part of the code elements consists of words and at least part of the corresponding information elements consist of numbers, such as numbers comprising combinations of two or more digits.
  • code elements in encoded target information correspond to information elements in the form of numbers with two or more digits, the encoded target information may be easier to remember and provide via a user utterance than the target information itself.
  • the code elements of the mapping manuals preferably may have one or more of the following qualities:
  • Recognizable such as recognizable in a user utterance, even with background noise and possible limits to audio frequency.
  • Monosyllabic words may be problematic. In part, because they may disappear in noise. In part, due to the possibility of being mistaken for a short code element utterance. This may typically occur in an environment where the use of numerical values is a natural part of the background noise.
  • Code elements in the form of words preferably have a clearly defined way of spelling, preferably with special note to avoid mistaking the initial letters.
  • E.g., Fillip and Phillip can result in errors, if one way of spelling the word is used in the mapping manual and the user applies another. This may be handled by including several ways of spelling the same code element in the mapping manuals.
  • the code elements may preferably be easy to read and to remember. This may be
  • code element may be chosen in the Mapping Manual.
  • a user may be presented with the available options and select a code element based on these options.
  • the encoded target information comprises 2, 3, 4, 5 or more code elements.
  • the method comprises identifying the user by analysing the utterance with respect to user specific pronunciation of code elements. The system may then verify that the user is who he claims to be and this embodiment has the advantage that an additional safety measure is provided. I.e. not only the content of the target information is coded, the user identity is also determined.
  • Another approach to identify the user is to include a user specific element in the encoded target information, i.e. one element in the sequence of code elements is user specific, such as a username or an account name.
  • the user specific element is not necessarily coded.
  • the hardware processor is configured for performing several operations, such as identifying the user by analysing the utterance with respect to user specific
  • the mapping manual is used to identify the code elements in the encoded target information, i.e. the operation of identifying the sequence of code elements comprises using the mapping manual to identify the code elements in the encoded target information.
  • the code elements of the mapping manual may then be used to analyse the received encoded target information such that the encoded target information is divided into code elements of the mapping manual. This provides a more certain division of the received encoded target information into code elements that actually are known from the mapping manual.
  • an apparatus for decoding a received encoded target information may comprise a computer program product comprising instructions configured to obtain the encoded target information and to use the mapping manual for dividing the encoded target information into a sequence of code elements and subsequently convert the identified code elements into the corresponding information elements.
  • the mapping manual is used for determining information elements of a target information. This provides the advantage that the target information is divided into information elements that actually are in the mapping manual such that the entire data string of the target information may be converted into a sequence of code elements.
  • an apparatus for encoding target information may comprise a computer program product comprising instructions configured to obtain the target information and to use the mapping manual for dividing the target information into a sequence of information elements and subsequently convert the identified information elements into the corresponding code elements.
  • the disclosed encoder and decoder apparatuses may be combined in a joint system configured for handling the operations of both the encoding and the decoding.
  • the encoder and decoder are separate physical units, such as physical units located in different locations.
  • the system may then comprise communicating devices arranged to transmit data between the decoder and encoder and optional a central unit of the system e.g. for distributing updates to the mapping manual.
  • the system comprises both an encoder configured to encode target information providing encoded target information, and a decoder configured to receive and decode the encoded target information, where the encoding and decoding is based on the mapping manual.
  • the decoder may forward the decoded target information to a target system.
  • the decoder may confirm a data integrity attribute of the target information. The confirmation may e.g. comprise performing a checksum calculation.
  • mapping manual used by the decoder is compatible and/or identical with the mapping manual used by the encoder.
  • an encoder and a decoder may be implemented on a same processor or as part of the same computer program product.
  • a same processor may have access to both the computer-implemented encoder and the computer implemented decoder
  • Output from the decoder may be transmitted/communicated to the target system.
  • further processing of the target information may take place.
  • the target system may return information about errors or successful input. Since the input manipulation system represents a link between user and target system, the input manipulation system may handle this communication.
  • the authentication may take place in the target system or in another system with which it is connected.
  • the authentication may be a static and/or transitory code that has been delivered to the target system. An affirmation of the authentication and other potentially included information may be sent to the user and the user’s counterpart via another connection.
  • An authentication may also be based on voice recognition with personal identification. This may be handled by the target system. In such a setup, the voice sample of the user may be transmitted through the operating system for the target system for affirmation. If the user has pre-recorded code elements, they may be part of the user’s voice sample. Alternatively, the target system may request fresh voice samples, which may be transmitted through the operating system or may be redirected to bypass the operating system.
  • Other forms of authentication may be included, e.g.
  • the user is at a location where other biometrics such as finger prints, retina scans, facial recognition, local voice recognition and similar systems may be used.
  • the exact communication may depend on whether or not the identification data is present at the user’s location, or if it is necessary to transmit the identification data to an authentication central, or whether identification data is to be sent to the user’s position. If the authentication takes place where the user is, the affirmation is preferably transmitted to the target system or the underlying authentication affirmation. If the authentication takes place in an authentication centre, the user and in particular the counterpart is preferably informed. These communications are not necessarily the concern of the input manipulation operating system. Nevertheless, the input manipulation system is preferably informed of the granting or denial of access. Among other things, such rejections may be the basis for alarms, if they are an expression of an attempted scam.
  • the operating system handles the connections between the user, the counterpart, the target system and the authentication centre, as this may pass through firmly established communications between the operating system and the locations where the user might be.
  • the communications solution is such that the user interface is the micro- phone of a counterpart, which is connected to the operating system of the input manipulation system.
  • a Point of Sale may be imagined, where the initial communication usually will be an identification of the user and subsequently the account from which withdrawals are to be made to facilitate any payments.
  • a natural continuation of the process may for example include payment details which may be transmitted via the same connection to the operating system and from there may be transmitted to the target system for further actions.
  • mapping manual comprising a plurality of pairs of correlated code elements and information elements
  • mapping manual to convert the code elements of the user input into correlated information elements.
  • target information comprising a sequence of information elements
  • mapping manual comprising a plurality of pairs of correlated code elements and information elements; and using the mapping manual to convert the information elements in the target information into correlated code elements such that encoded target information comprising the sequence of code elements is generated.
  • Fig. 1 shows a flow diagram
  • Fig. 2 shows an encoding sequence
  • Fig. 3 shows a flow chart
  • Fig. 4 shows a schematic of a hardware system
  • Fig. 1 shows a flow diagram 100 illustrating encoding of target information and subsequent decoding of the encoded target information based on the mapping manual.
  • the target information is 396218269514 and the mapping manual contains information elements“396”,“218”,“269” and“514” corresponding to code elements “guitar”,“automobile”,“Thomas” and“house”, respectively.
  • the encoding starts by obtaining the target information which is intended to be encoded to a sequence of code elements.
  • the target information may e.g. be a drivers licence number or a bank account number.
  • step 102 the mapping manual is obtained.
  • This may be realized by loading a data file storing the mapping manual into the working memory of a processor, such as a hardware processor, configured for executing the encoding of the target information, such as from the hard drive of a computer device to the Random Access Memory of the computer device.
  • the mapping manual containing a plurality, e.g. more than 500 pairs of correlated information elements and code elements.
  • each information element contains three digits of the target information but other the target information may also be divided into information elements of 2 or 4 or more digits or combinations thereof.
  • the mapping manual may also have code elements corresponding to single digit information elements to ensure that all target information combinations can be expressed in terms of the information elements of the mapping manual, but it is preferred that several if not all information elements have multiple digits to reduce the number of information elements and hence the number of code elements in the encoded target information.
  • An initial guess for the sequence of information elements may be defined by dividing the target information into 3-digts elements from either end of the target information and subsequently comparing the thereby defined information elements with the information elements of the mapping manual to confirm that all the identified information elements appear in the mapping manual.
  • the mapping manual may be used actively such that the target information is compared with the information elements of mapping manual, such that the division
  • the information elements identified for the target information“396218269514” are “396”,“218”,“269” and“514” which all appear in the mapping manual.
  • step 104 the identified information elements which together represents the target information are converted to the corresponding code elements using the mapping manual.
  • the code elements corresponding to“396”,“218”,“269” and“514” are the words “guitar”,“automobile”,“Thomas” and“house”.
  • the encoded target information expressed by the sequence of words“guitar”,“automobile”, “Thomas” and“house” is then delivered to the user 105 e.g. as a written electronic message, as audio message or on print.
  • the user can then easily memorize the four code element words which are easy to remember compared to the twelve digit target information.
  • the decoder of the system receives a user input that represents the encoded target information, e.g. by a user utterance where the user speaks the code elements into a microphone which will transmit to a speech recognition system connected to the decoder or by the user entering the sequence of code elements via a keyboard.
  • a user input that represents the encoded target information
  • the user speaks the code elements into a microphone which will transmit to a speech recognition system connected to the decoder or by the user entering the sequence of code elements via a keyboard.
  • the physical distance between the user and the input manipulation apparatus can be quite far, as long as an adequate communication link exists.
  • the input manipulation apparatus may be in the vicinity of the task or in a remote location.
  • Synchronisation of the user input with the expectations of the target system may be managed by a communication handled by the input manipulation apparatus.
  • the number of code elements may vary.
  • signals denoting when input is finished may be determined and/or include a timer which marks how soon after the last detection of an input it is considered to have ended.
  • the device used may be equipped with an auxiliary function to ease the entering of input.
  • auxiliary function can be auto-correct systems, known from smartphones and similar devices. For example when an‘A’ in entered as the first letter of the word, the mapping manual offers between fifty and a hundred valid options from which the user can choose. When the next letter is T, the selection is perhaps between four options, and by the third letter‘e’, the code element will be uniquely identified. The code element can then be highlighted as the chosen code element, or be discarded by the user.
  • the vocabulary of the auxiliary function is limited to the relevant mapping manual.
  • the detection of the typed in “aleksander” triggers a signal to a different part of the programmed computer system. The signal can either be a transmission of the word in its standard version of the mapping manual; for example“aleksander” or“alexander”. Another practical solution is to transmit the machine code corresponding to the numerical value or sign the word represents in the mapping manual.
  • the decoding may involve confirming that the code elements are part of the vocabulary of the mapping manual.
  • This vocabulary has been preselected according to specific criteria.
  • the detection of a code element in the form of a word can trigger a signal to a part of the decoder.
  • the signal can either be the machine code corresponding to the numerical value or sign the word represents in the mapping manual. Alternatively, it can be a stored version of the pronounced word (here“aleksander” or “alexander”).
  • the code element may immediately be converted to the numerical value or sign which it represents, according to the mapping manual. Alternatively, it may be stored as part of the uttered code element. The utterance may subsequently be transmitted to another device or part of a device for decoding.
  • the mapping manual is obtained in step 102 and used in step 107 to convert the code elements into the corresponding information elements, such the sequence of four information elements [396, 218, 269, 514] is obtained.
  • step 108 the decoder assembles the four information elements according to their relative order in the sequence of code elements, such that the original target information 396218269514 is formed.
  • Separate utterances of code elements that correspond to information elements that are part of the entire target information in the example above a 20 digit number is used, will be put together in the proper order to form the long number (again, in the example a 20 digit number is used). This operation will take place in the part of the connected systems described above, where the decoding of code elements to numerical values takes place.
  • the decoding may take place on a local or remote decoder which subsequently delivers the target information to the target system 109.
  • the output target information derived from the sequence of code elements can then be used as input in the target system the user operates.
  • This (20 digit) numerical value is the output of the decoding system and will become the input of the target system connected to the decoder.
  • the numerical value can represent an account number, an invoice number, customer ID, PIN number, credit card number, an expiration date, a CVC code, or one of many other possible meanings.
  • a form filler or protocol ensuring the output of the decoder is placed in the right order of the input for the target system.
  • the decoded signal can appear on a display or be printed, if a person is the target.
  • Fig. 2 shows a sequence of code elements drawn from an excerpt from a Mapping Manual to form the encoded target information.
  • the mapping manual provides a correlation between a plurality of code elements 220-226 and corresponding information elements 227 233
  • the code elements can be words provided to the system as a user utterance from which the individual code elements are identified by speech analysis.
  • the received code elements are“Alexander”,“Doris”,“Steven”, Watson”,“Cecil”,“Karen” and“Torben”.
  • the input manipulation apparatus delivers an output in the form of a sequence of the corresponding information elements (here 12, 345, 678, 901 , 234, 567 and 890) such that these can be combined to form the target information“12345678901234567890” for the target system.
  • the information elements 227-233 are all double-digit or three-digit numbers.
  • a digital representation in the form of a machine code also exists which a computer unit can utilize in the analysis and delivery of the output.
  • code element for each information element, which in this system represents the pertinent element.
  • Some information elements may be represented by more than one code element.
  • one or more code elements can be connected to the information element“901” addition in addition to the code element“Watson”.
  • the words used as code elements in the mapping manual are preferably selected through careful studying and screening the lexicon of the language to be used. Experience shows that most languages only have a few thousand especially suitable words. This puts a limit on how many information elements can be expressed by code elements in a single mapping manual.
  • Fig. 3 shows a flow chart 340 illustrating how a sequence of code elements can be generated when encoding target information.
  • Encoding is the process that determines the sequence of code elements to represent a given target information.
  • target information 341 in the form of a twenty-digit number 12345678901234567890 is divided into a sequence of seven information elements 342 based on the mapping manual. If this mapping manual contains all three-digit numbers, all double-digit numbers, all single-digit numbers, and the letters of the alphabet, as well as all special characters required to form suitable expressions, the given target information to be encoded can be sequenced into independent information elements according to the mapping manual.
  • the target information from above is divided into the sequence information elements [12, 345, 678, 901 , 234, 567, 890] which are the individual numbers of the 20-digit target information split into the same information elements 227-233 that were illustrated in Fig. 2.
  • one or more predefined code elements appear in the mapping manual.
  • a given target information number can be divided into information elements in several ways by combining various methods of dividing the content. Taking simplicity and transaction speed into consideration, a prioritized method can be established. This ensures that the encoding is unambiguously determined. This prioritized method can be hard wired in the system or established by the applied mapping manual. The user may be given alternatively prioritized methods.
  • a sequential encoding of the information elements results in a sequence of code elements 343 which in the example also illustrated in Fig. 2 takes the form of the code elements:“Alexander”,“Doris”,“Steven”,“Watson”,“Cecil”,“Karen” and “Torben”.
  • a given target information 341 can be of any length and consist of numerical values and/or sign combinations.
  • the first analyses of the target information may determine whether the target information consists of only numerical values. If this is the case, the target information will in the illustrated example be divided into three-digit numbers by default. This can be done either in proper or reverse order. If needed, the string can end in a double- or single-digit numerical value.
  • the sign combinations are transferred with any numerical values arranged in three-, double- or single-digit numerical values, following the principle described above.
  • the division of the target information into the sequence of information elements can be initialized by searching for longer information elements per the mapping manual (e.g. four-digit numerical values or longer). If these exist in the mapping manual, they are used where applicable in the sequence of information elements 342. For some uses, it is possible to divide the target information into information elements according to either or both of the principles shown above. Other ways of sequencing the target information into information elements can also be applied. The output of the different methods of sequencing presented above will co-ordinately and separately be applied as input in the further processing, provided they are not discarded, either automatically, or as a result of user interaction.
  • the code elements that correspond to the sequence of information elements of the input are determined by comparing the sequence of information elements with the list of information elements and corresponding code elements in the mapping manual.
  • the code elements identified in this process are arranged according to their appearance in the input sequence of information elements.
  • the output sequence of code elements 343 is referred to as the encoded target information.
  • an information element corresponds to more than one code element
  • a sequence of code element can be generated for each possible outcome. This enables the user to select the preferred sequence or sequences. All the presented options represent the original target information. Different applications can make certain options preferable.
  • the encoding described here can be processed by the recipient of the user input.
  • One example can be a business mailing an invoice containing order, delivery, stock and account numbers. Once the encoded target information has been generated then this information is communicated to the relevant users.
  • banks can generate code elements for account numbers, credit card numbers, and the like.
  • the user can also generate a code element himself, using an application or computer program product executed on a data processing device such as a smart phone.
  • User generated code elements can include word for passwords and security codes. Using code elements which they have created themselves, users can much better retain and use long security codes.
  • target information 341 is a social security number, a customer ID, an invoice number, an order number, a payment order number, a payer ID number, or something similar a user needs to identify themselves. It may be expedient to print the code elements for the numerical values along with the numbers they represent.
  • PIN numbers and transitory codes are preferably sealed letters.
  • Examples One example of an application of the input manipulation apparatus is during loading and reloading of cargo.
  • the problem of the user not having enough hands or having difficulty in recording the ID of the cargo can be eliminated by the present disclosure.
  • a label with a sequence of code elements can ease this process, because it allows the handler to identify the unit hands free by speaking the code elements to a microphone.
  • Another example is a user putting in an order for a specific item via remote trade.
  • the desired item can then be identified by its EAN code (thirteen digits).
  • the EAN code can be expressed by a sequence of three or four code elements.
  • the user must provide a card number for the payment method (sixteen digits).
  • the card number can be expressed by a sequence of five or six code elements.
  • Fig. 4 shows a hardware system 440 with a central server, a payment terminal and a user device.
  • the payment terminal 441 has a user input capture device with a microphone 442 configured to receive a user utterance containing the sequence of code element corresponding to e.g. the users credit card.
  • the user input device can also have a keyboard 443 allowing the user to type the sequence of code elements.
  • the payment terminal 441 further has a receiver/transmitter unit 444 configured for receiving data from or sending data to the central server 447.
  • the central server also has a receiver/transmitter unit 448 for the communication with the payment terminal.
  • the central server 447 further has a computer unit configured for handling both the encoding of a target information and the subsequent decoding.
  • the computer unit has a data processor 450 and a non-transitory computer readable storage medium 451 encoded with a computer program product configured for the encoding and decoding based on the mapping manual and a data file storing the mapping manual itself.
  • the central server is further connected with a customer device 454 or user device 454 which has a receiver/transmitter unit 455 for communication with the central server 447 and a control unit 456 for controlling the operations of the customer device 454 e.g. in response to input provided via a microphone 457 or keyboard 458 of the customer device 454.
  • the control unit of the customer device 454 may be configured to allow the user to send a request for encoding a target information (e.g. his credit card number) to the central server 447 using the receiver/transmitter units 448, 455.
  • the target information may be sent to the central server 447 from the customer device 454 or be received from another source (e.g. the bank issuing the credit card in the case of the target information being a credit card number).
  • the data processor 450 of the central server 447 then encodes the target information using the mapping manual stored on the computer readable storage medium 451.
  • the encoded target information with its sequence of code elements is then returned to the customer device 454 where it can be provided to the user e.g. on a display or by a loud speaker.
  • the payment terminal 441 can be equipped with a decoder such that the decoding of the code elements is performed locally or the payment terminal may send the encoded target information to the central server 447 for a centralized decoding where the original target information (e.g. the credit card number or code) is transmitted back to the payment terminal 441.
  • the sequence of code elements forming the encoded target information e.g. four words representing a credit card number
  • the payment terminal 441 can be equipped with a decoder such that the decoding of the code elements is performed locally or the payment terminal may send the encoded target information to the central server 447 for a centralized decoding where the original target information (e.g. the credit card number or code) is transmitted back to the payment terminal 441.
  • mapping manual is then stored at the payment terminal (or at a storage medium which is part of a local network including the payment terminal, such as a main computer of a warehouse computer system supporting a plurality of payment terminals). Any updates and improvements to the mapping manual can then be transmitted from the central server to the payment terminal on a regular basis.
  • the mapping manual does not need to be stored at each payment terminal and the speech recognition can also be performed at a more powerful data processor at the central server.
  • the target information can be supplied to the target system (in the example the payment terminal and the system supporting to terminal to provide that the requested payment is made).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

L'invention concerne des procédés et des systèmes de gestion d'informations cibles complexes à l'aide d'un manuel de mappage comprenant une pluralité de paires d'éléments de code corrélés et d'éléments d'informations. Les procédés et systèmes selon l'invention permettent à un utilisateur de fournir des informations cibles complexes au moyen de séquences beaucoup plus simples d'éléments de code, rendant plus facile l'entrée d'informations cibles tout en maintenant un niveau élevé de sécurité.
PCT/EP2019/066964 2018-06-27 2019-06-26 Procédé de décodage d'entrée d'utilisateur codée WO2020002406A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
DKPA201870442 2018-06-27
DKPA201870442 2018-06-27

Publications (1)

Publication Number Publication Date
WO2020002406A1 true WO2020002406A1 (fr) 2020-01-02

Family

ID=68986615

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2019/066964 WO2020002406A1 (fr) 2018-06-27 2019-06-26 Procédé de décodage d'entrée d'utilisateur codée

Country Status (1)

Country Link
WO (1) WO2020002406A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200202340A1 (en) * 2018-12-19 2020-06-25 Visa International Service Association Method, System, and Computer Program Product for Representing an Identifier With a Sequence of Words
CN118487716A (zh) * 2024-07-09 2024-08-13 深圳金证引擎科技有限公司 一种用于数据交换的物联网处理方法及系统

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1320083A1 (fr) * 2001-12-13 2003-06-18 Siemens Aktiengesellschaft Authentification par la saisie d'une suite de mots structurée
US20040107107A1 (en) * 2002-12-03 2004-06-03 Philip Lenir Distributed speech processing
WO2016010989A1 (fr) * 2014-07-14 2016-01-21 Intellisis Corporation Système et procédés pour une authentification et une vérification de numéro d'identification personnel (pin) à l'aide d'une technique de mot de passe de non-divulgation pour la transmission du pin sur un canal acoustique non sécurisé à l'aide d'une reconnaissance vocale

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1320083A1 (fr) * 2001-12-13 2003-06-18 Siemens Aktiengesellschaft Authentification par la saisie d'une suite de mots structurée
US20040107107A1 (en) * 2002-12-03 2004-06-03 Philip Lenir Distributed speech processing
WO2016010989A1 (fr) * 2014-07-14 2016-01-21 Intellisis Corporation Système et procédés pour une authentification et une vérification de numéro d'identification personnel (pin) à l'aide d'une technique de mot de passe de non-divulgation pour la transmission du pin sur un canal acoustique non sécurisé à l'aide d'une reconnaissance vocale

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200202340A1 (en) * 2018-12-19 2020-06-25 Visa International Service Association Method, System, and Computer Program Product for Representing an Identifier With a Sequence of Words
US11461776B2 (en) * 2018-12-19 2022-10-04 Visa International Service Association Method, system, and computer program product for representing an identifier with a sequence of words
CN118487716A (zh) * 2024-07-09 2024-08-13 深圳金证引擎科技有限公司 一种用于数据交换的物联网处理方法及系统

Similar Documents

Publication Publication Date Title
US9754101B2 (en) Password check by decomposing password
US9407633B2 (en) System and method for cross-channel authentication
EP2784710B1 (fr) Procédé et système pour valider des identifiants de compte personnalisés au moyen d'une authentification biométrique et d'algorithmes d'auto-apprentissage
US20180151174A1 (en) Computer-Implemented System And Method For Identifying Special Information Within A Voice Recording
US9117212B2 (en) System and method for authentication using speaker verification techniques and fraud model
US11610582B2 (en) Systems and methods for formatting informal utterances
EP2273414A1 (fr) Vérification d'un utilisateur au moyen d'un interface multimodale web
EP3893196A1 (fr) Système d'authentification, dispositif de gestion, et procédé d'authentification
US10049197B2 (en) System and methods for personal identification number authentication and verification
KR20160011709A (ko) 지불 확인을 위한 방법, 장치 및 시스템
CN111540353B (zh) 一种语义理解方法、装置、设备及存储介质
US11204964B1 (en) Systems and methods for conversing with a user
US20190244196A1 (en) System, Method, and Apparatus for Automatically Encoding Data in an Electronic Communication
JP3703991B2 (ja) 自由音声評点法を用いた動的音声認識の方法および装置
WO2020002406A1 (fr) Procédé de décodage d'entrée d'utilisateur codée
CN107492191A (zh) 金融设备的安全认证方法、装置、金融设备和存储介质
JP2017168032A (ja) チケット有効性判定システム、チケット有効性判定方法、チケット有効性判定プログラム、チケット有効性判定プログラムを記憶する記憶媒体
CN111142834A (zh) 一种业务处理方法及系统
JP2021064110A (ja) 音声認証装置、音声認証システム、および音声認証方法
US20100290482A1 (en) Method for reducing errors while transferring tokens to and from people
KR101705228B1 (ko) 전자문서생성장치 및 그 동작 방법
CN109345215B (zh) 数字货币处理方法、装置、计算机设备及存储介质
US9646437B2 (en) Method of generating a temporarily limited and/or usage limited means and/or status, method of obtaining a temporarily limited and/or usage limited means and/or status, corresponding system and computer readable medium
US10721068B2 (en) Secure data transmission using natural language
WO2019036904A1 (fr) Procédé et terminal de gestion d'utilisateur de caisse enregistreuse

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19748665

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19748665

Country of ref document: EP

Kind code of ref document: A1