WO2020119692A1 - 一种视频流播放方法及装置 - Google Patents

一种视频流播放方法及装置 Download PDF

Info

Publication number
WO2020119692A1
WO2020119692A1 PCT/CN2019/124395 CN2019124395W WO2020119692A1 WO 2020119692 A1 WO2020119692 A1 WO 2020119692A1 CN 2019124395 W CN2019124395 W CN 2019124395W WO 2020119692 A1 WO2020119692 A1 WO 2020119692A1
Authority
WO
WIPO (PCT)
Prior art keywords
voiceprint data
audio signal
played
video stream
voiceprint
Prior art date
Application number
PCT/CN2019/124395
Other languages
English (en)
French (fr)
Inventor
姚玉兵
Original Assignee
杭州海康威视数字技术股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州海康威视数字技术股份有限公司 filed Critical 杭州海康威视数字技术股份有限公司
Publication of WO2020119692A1 publication Critical patent/WO2020119692A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/439Processing of audio elementary streams
    • H04N21/4394Processing of audio elementary streams involving operations for analysing the audio stream, e.g. detecting features or characteristics in audio streams
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/22Interactive procedures; Man-machine interfaces
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/22Interactive procedures; Man-machine interfaces
    • G10L17/24Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/439Processing of audio elementary streams
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • G10L2015/223Execution procedure of a spoken command

Definitions

  • the present application relates to the technical field of video security, in particular to a method and device for playing video streams.
  • Video streams can be encrypted so that unrelated persons cannot play these video streams normally.
  • an encryption key may be used to encrypt a video stream through an AES (Advanced Encryption Standard) algorithm.
  • the encrypted video stream needs to be decrypted by the AES algorithm using the encryption key before it can be played normally.
  • the encryption key setting is relatively simple, it is easy to be cracked, and if the encryption key setting is relatively complicated, it is not convenient for the user to remember.
  • the purpose of the embodiments of the present application is to provide a method for playing a video stream, so that it is difficult for an unrelated person to play a video stream normally without requiring a user to memorize a key.
  • the specific technical solutions are as follows:
  • a method for playing a video stream includes:
  • the video stream to be played is played.
  • the authorized voiceprint data is stored in the to-be-played video stream in the following manner:
  • the method further includes:
  • the method before the acquiring voiceprint data of the input audio signal as verification voiceprint data, the method further includes:
  • the first dynamic verification code is dynamically generated
  • the video stream to be played is refused to be played.
  • the authorized voiceprint data is obtained in the following manner:
  • the second dynamic verification codes are generated dynamically
  • the voiceprint data of all audio signals is acquired as the authorized voiceprint data.
  • the acquiring voiceprint data of the input audio signal as verification voiceprint data includes:
  • the acquiring voiceprint data of the input audio signal as verification voiceprint data includes:
  • the authorized voiceprint data is voiceprint model data of the audio signal collected when encrypting the video stream to be played.
  • a video streaming playback device in a second aspect of the embodiments of the present application, includes:
  • the voiceprint recognition module is used to obtain the voiceprint data of the input audio signal as verification voiceprint data
  • the voiceprint comparison module is used to determine whether the verification voiceprint data matches the authorized voiceprint data carried in the video stream to be played, and the authorized voiceprint data is audio collected when the video stream to be played is encrypted Voiceprint data of the signal;
  • the code stream playing module is used to play the video stream to be played if the verification voiceprint data matches the authorized voiceprint data.
  • the authorized voiceprint data is stored in the video stream to be played in the following manner:
  • the device further includes a voiceprint parsing module, which is used to read the first paragraph of the video stream to be played before determining whether the verification voiceprint data matches the authorized voiceprint data carried by the video stream to be played The preset number of bytes starting from a storage location to obtain the bit length of the authorized voiceprint data;
  • the device further includes a dynamic verification module for displaying the first dynamic verification before acquiring the voiceprint data of the input audio signal as the verification voiceprint data Code, the first dynamic verification code is dynamically generated;
  • the voiceprint recognition module is specifically configured to execute the acquiring voiceprint data of the input audio signal as a step of verifying voiceprint data if the voice content matches the dynamic verification code.
  • the authorized voiceprint data is obtained in the following manner:
  • the second dynamic verification codes are generated dynamically
  • the voiceprint data of all audio signals is acquired as the authorized voiceprint data.
  • the voiceprint recognition module is specifically configured to perform voice activity detection on the input audio signal and extract the human voice signal in the audio signal;
  • the voiceprint recognition module is specifically configured to model the voiceprint of the input audio signal to obtain voiceprint model data of the audio signal as a verification sound Pattern data
  • the authorized voiceprint data is voiceprint model data of the audio signal collected when encrypting the video stream to be played.
  • an electronic device including:
  • Memory used to store computer programs
  • the processor is used to implement any of the video streaming methods described above when executing the program stored on the memory.
  • a computer-readable storage medium is provided, and a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, any of the above-mentioned videos is realized Streaming method.
  • the video stream playing method and device provided in the embodiments of the present application can use the authorized voiceprint data carried in the video stream to be played to verify the identity of the person preparing to watch the video stream to be played.
  • the content is irrelevant and the voiceprints of different people are different. Therefore, authorized personnel can watch the video stream to be played normally without the need to memorize any key, and it is difficult for unrelated personnel to watch the video stream to be played normally.
  • implementing any of the products or methods of this application does not necessarily need to achieve all the advantages described above at the same time.
  • FIG. 1 is a schematic flowchart of a video stream playing method provided by an embodiment of the present application
  • FIG. 2 is another schematic flowchart of a video stream playing method provided by an embodiment of this application.
  • FIG. 3 is a schematic flowchart of a method for obtaining authorized voiceprint data according to an embodiment of the present application
  • FIG. 4 is a schematic flowchart of a method for reading authorized voiceprint data according to an embodiment of the present application
  • 5a is a schematic structural diagram of a video streaming device provided by an embodiment of the present application.
  • 5b is another schematic structural diagram of a video stream playback device provided by an embodiment of the present application.
  • 5c is another schematic structural diagram of a video stream playback device provided by an embodiment of the present application.
  • FIG. 6 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • FIG. 1 is a schematic flowchart of a video streaming method provided by an embodiment of the present application.
  • the method may be applied to any electronic device having a video streaming function.
  • the method may include:
  • VAD VoiceActivityDetection, voice activity detection
  • voice activity detection processing on the input audio signal to remove the noise signal and the mute signal in the audio signal to obtain the human voice signal.
  • the vocal signal is input into the voiceprint neural network that has been pre-trained to obtain the verified voiceprint data.
  • the audio signal may be collected by an electronic device with a sound collection function.
  • the electronic device may be integrated on the user terminal or independent of the user terminal.
  • the verification voiceprint data may be different types of data according to actual requirements.
  • the verification voiceprint data may be an unsigned char array with a maximum of 128 bits.
  • S102 Determine whether the verification voiceprint data matches the authorized voiceprint data carried in the video stream to be played.
  • the authorized voiceprint data is the voiceprint data of the audio signal collected when encrypting the video stream to be played.
  • the method for acquiring the authorized voiceprint data may be the same as the method for acquiring the verified voiceprint data, or it may be different from the method for acquiring the verified voiceprint data.
  • the matching of the two voiceprint data means that the voiceprints represented by the two voiceprint data match.
  • the video stream to be played may carry only one authorized voiceprint data, or may carry multiple authorized voiceprint data.
  • the user may wish that the video stream to be played can only be viewed by himself, and then the audio signal input when encrypting the video stream to be played includes only his own voice.
  • the user may wish that the video stream to be played can only be watched by a specified group including himself. For example, if his family members, the audio signal input when encrypting the video stream to be played includes each family member the sound of.
  • the similarity between the verified voiceprint data and the one authorized voiceprint data may be calculated. If the similarity is higher than a preset similarity threshold, the verified voiceprint data is determined to be The authorized voiceprint data matches. If the similarity is not higher than the preset similarity threshold, it is determined that the verified voiceprint data does not match the authorized voiceprint data.
  • the similarity between the verified voiceprint data and each authorized voiceprint data may be calculated separately. If the similarity between the verified voiceprint data and at least one authorized voiceprint data, If it is higher than the preset similarity threshold set for the at least one authorized voiceprint data, it is determined that the verified voiceprint data matches the authorized voiceprint data. If the similarity between the verified voiceprint data and any authorized voiceprint data is not higher than the preset similarity threshold set for any authorized voiceprint data, it is determined that the verified voiceprint data does not match the authorized voiceprint data. For different authorized voiceprint data, different preset similarity thresholds may be set, or the same preset similarity threshold may be set.
  • the preset similarity thresholds set for all authorized voiceprint data it may also be determined whether the calculated maximum value among the multiple similarities is higher than the preset similarity threshold, if the maximum value among the multiple similarities If it is greater than the preset similarity threshold, it is determined that the verified voiceprint data matches the authorized voiceprint data. If the maximum value of multiple similarities is not greater than the preset similarity threshold, it is determined that the verified voiceprint data and authorized voiceprint data are not the same match.
  • Voiceprint is a biological factor of humans. It can be considered that the voiceprints of different people are different. Therefore, if the voiceprint model is sufficiently fine, the voiceprint data corresponding to the voiceprints of different people are different. of.
  • the audio signal input in S101 and the audio signal input when encrypting the video stream to be played include the voice signals of the same person, and the audio input when the video stream is being encrypted is encrypted
  • the sound signal included in the signal may be regarded as the sound signal of the person authorized to watch the video stream to be played (hereinafter referred to as an authorized person). Therefore, the audio signal input in S101 and the audio signal input when encrypting the video stream to be played include The voice signal of the same person may indicate that the person who is going to watch the video stream to be played (hereinafter referred to as the person to be verified) is an authorized person, so in this case, the video stream to be played can be played normally.
  • the person to be verified is not an authorized person (that is, the person to be verified is an unrelated person)
  • the verification voiceprint data does not match the authorized voiceprint data, so the video stream to be played cannot be played normally.
  • the authorized voiceprint data can be carried in the video stream to be played, and when the voiceprint data is verified to match the authorized voiceprint data, the video stream to be played can be played because the voiceprint is human A kind of biological factor has nothing to do with what the personnel specifically said, and different people have different voiceprints. Therefore, it is possible for authorized personnel to normally watch the video stream to be played without the need to remember the key, while it is difficult for unrelated personnel to normally watch the video stream to be played.
  • FIG. 2 is another schematic flowchart of a video stream playing method provided by an embodiment of the present application, which may include:
  • the first dynamic verification code is dynamically generated, for example, may be generated based on a chaotic equation, or may be generated based on a random number table.
  • the first dynamic verification code may be randomly generated by the user terminal according to a preset random algorithm, or the user terminal may send a verification request to the server and receive the service Verification information sent by the terminal, where the verification information includes a first dynamic verification code, and the first dynamic verification code is dynamically generated by the server.
  • the first dynamic verification code may be a character string including one or more characters among numbers, Chinese characters, letters and other characters.
  • the first dynamic verification code may be a character string including only digits, for example, may be a character string composed of 8 digits, such as "59347826".
  • S202 Perform voice recognition on the input audio signal to obtain the voice content of the audio signal.
  • the audio signal is input into a pre-trained speech recognition neural network to obtain the speech content of the audio signal.
  • the voice content of the audio signal refers to the voice content corresponding to the human voice signal in the audio signal. Exemplarily, assuming that the input audio signal is obtained by the sound input by the audio input device when the user says "ABC", the speech content of the audio signal is "ABC" without considering the error of speech recognition. ".
  • the matching of the voice content with the first dynamic verification code may mean that the similarity between the voice content and the first dynamic verification code is higher than a preset threshold. Since the first dynamic verification code is dynamically generated, in theory, the person to be verified cannot know the first dynamic verification code in advance. If the voice content matches the first dynamic verification code, the input audio signal may be regarded as the audio signal entered by the person to be verified through the audio input device after observing the displayed first dynamic verification code. Therefore, in this case, it can be considered that the voice of the person to be verified is recorded in the input audio signal.
  • the voice content does not match the first dynamic verification code, it can be considered that the input audio signal is not the audio signal entered by the person to be verified through the audio input device after observing the displayed first dynamic verification code. Therefore, in this case, it can be considered that the voice of the person to be verified is not recorded in the input audio signal.
  • the person to be verified is an irrelevant person
  • the execution subject of the method is a user terminal
  • the person to be verified stores the audio of the authorized person's speech in the portable audio playback device in advance
  • the input audio signal may be to be verified
  • the person plays the audio of the authorized person's speech through the portable audio playback device, and the audio signal input to the user terminal. Since the person to be verified cannot know the first dynamic verification code in advance, it is difficult for the person to be verified to induce the authorized person to read the first dynamic verification code, so the voice content of the audio signal cannot theoretically match the first dynamic verification code.
  • S204 Acquire voiceprint data of the input audio signal as verification voiceprint data.
  • This step is the same as S101, and reference may be made to the foregoing description of S101, which will not be repeated here.
  • S205 Determine whether the verified voiceprint data matches the authorized voiceprint data carried by the video stream to be played. If the verified voiceprint data matches the authorized voiceprint data carried by the video stream to be played, execute S206 to verify that the voiceprint data is If the authorized voiceprint data carried in the video stream to be played does not match, execute S207.
  • This step is the same as S102, and reference may be made to the foregoing description of S102, which will not be repeated here.
  • This step is the same as S103, and reference may be made to the foregoing description of S103, which will not be repeated here.
  • the identity of the person to be verified can also be verified through a preset identity verification method. If the person to be verified is verified as an authorized person, the video stream to be played is played.
  • the voice content does not match the first dynamic verification code, it may be considered that the voice of the person to be verified is not recorded in the input audio signal.
  • the voiceprint data of the input audio signal is acquired as Verification of voiceprint data.
  • the verification of voiceprint data may not effectively treat whether the verification person is an authorized person. For the sake of protecting user privacy, the video stream to be played may be directly refused to be played.
  • the verification voiceprint data is actually the voiceprint data representing the voiceprint of the authorized person, rather than the voiceprint to be verified
  • the voiceprint data of the voiceprint of the person may further incorrectly determine the person to be verified as an authorized person. That is, unrelated personnel can use the pre-recorded audio of the authorized person's speech to impersonate the authorized person to watch the video stream to be played.
  • the person to be verified can read the dynamically generated first dynamic verification code, which effectively avoids the occurrence of unauthorized persons successfully using the pre-recorded audio of the authorized person’s speech to impersonate the authorized person. The security of playing video streams.
  • the video stream playing method provided in the embodiment of the present application determines whether the person to be verified is authorized by verifying whether the voiceprint data matches the authorized voiceprint data. Therefore, whether the authorized voiceprint data is accurate directly affects the accuracy of the video stream playing method provided by the embodiment of the present application. For example, if there is a large gap between the voiceprint represented by the authorized voiceprint data and the actual voiceprint of the authorized personnel, it may cause the authorized personnel to be unable to normally watch the video stream to be played.
  • an embodiment of the present application provides an authorized voiceprint data acquisition method, which can be seen in FIG. 3, including:
  • S301 Display multiple second dynamic verification codes.
  • the number of displayed second dynamic verification codes can be set according to actual needs, and an example may be to display five second dynamic verification codes.
  • the obtaining method of the second dynamic verification code and the first dynamic verification code may be the same or different.
  • the second dynamic verification code may be a character string including only digits.
  • the second dynamic verification code may also include one or more of characters such as letters and Chinese characters. Kinds of characters.
  • the user terminal can be enabled to start MIC (Microphone) audio collection, and the sound of the second dynamic verification code read by the user is respectively recorded.
  • S302 may also be executed alternately with S301.
  • the first second dynamic verification code is displayed, the audio signal input for the first second dynamic verification code is acquired, and the second Two dynamic verification codes to obtain the audio signal input for the second second dynamic verification code... and so on, until the audio signal input for the last second dynamic verification code is acquired.
  • S303 Perform speech recognition on each input audio signal to obtain the speech content of the audio signal.
  • S303 may be executed alternately with S302, or may be executed alternately with S301 and S302.
  • speech recognition is performed on the audio signal to obtain the speech content of the audio signal, and then the second second dynamic verification is acquired The audio signal entered by the code.
  • the voice content of an audio signal matches the second dynamic verification code targeted by the audio signal, it means that the voice of the user reading the second dynamic verification code is recorded in the audio signal. If the speech content of each input audio signal matches the second dynamic verification code targeted by the audio signal, it means that each audio signal has recorded the sound of the corresponding second dynamic verification code read by the user. In this case, it can be considered that a sufficient number of user's voice samples have been recorded in multiple audio signals, and the voiceprint data acquired based on the sufficient user's voice samples is more accurate.
  • the video stream to be played includes other data, for example, may include H264 format video stream data.
  • FIG. 4 and FIG. 4 Shown is a schematic flowchart of a method for reading voiceprint data provided by an embodiment of the present application, which may include:
  • the preset number may be set according to actual needs.
  • a four-byte unsigned integer data (unsigned) int may be used to save the bit length of the authorized voiceprint data.
  • other data formats may also be used to save the bit length of the authorized voiceprint data.
  • S402 Read the byte length starting at the second storage location of the video stream to be played to obtain authorized voiceprint data.
  • the bit length is 126
  • the first storage location and the second storage location can be selected according to actual needs.
  • the authorized voiceprint data does not exceed 128 bytes at most.
  • the starting position in the continuous reserved bits of 4 bytes can be selected as the first storage position, and the starting position in the continuous reserved bits of 128 bytes can be selected as the second storage position.
  • the method for saving the authorized voiceprint data should be consistent with the method for reading the authorized voiceprint data, which may be to determine the bit length of the authorized voiceprint data, and save the bit length of the authorized voiceprint data at the first storage location in the video stream to be played. At the preset number of bytes, and the authorized voiceprint data is stored at the byte length starting from the second storage location of the video stream to be played, which will not be repeated here.
  • the authorized voiceprint data and the bit length may be saved in the form of a structure, and the format of the structure may be as follows:
  • nModelSize is unsigned integer data used to represent the bit length
  • strModel is an unsigned character array used to represent the authorized voiceprint data
  • MODEL_MAX_SIZE is the maximum bit length of the authorized voiceprint data.
  • the video stream to be played may be correspondingly provided with multiple first storage locations and multiple second storage locations, respectively reading multiple first The preset number of bytes at the beginning of the storage location to obtain the bit length of each authorized voiceprint data, for each authorized voiceprint data, read the corresponding bit length of the authorized voiceprint data starting at the second storage location To get the authorized voiceprint data.
  • FIG. 5a is a schematic structural diagram of a video streaming device provided by an embodiment of the present application, and may include:
  • the voiceprint recognition module 501 is used to obtain input audio signals for voiceprint data as verification voiceprint data;
  • the voiceprint comparison module 502 is used to determine whether the verified voiceprint data matches the authorized voiceprint data carried in the video stream to be played, and the authorized voiceprint data is the voiceprint data of the audio signal collected when encrypting the video stream to be played ;
  • the code stream playing module 503 is used to play the video stream to be played if the verification voiceprint data matches the authorized voiceprint data.
  • the authorized voiceprint data is stored in the video stream to be played in the following manner:
  • the device may further include a voiceprint parsing module 504, configured to read the first storage of the video stream to be played before determining whether the voiceprint data matches the authorized voiceprint data carried by the video stream to be played The preset number of bytes at the beginning of the position to get the bit length of the authorized voiceprint data;
  • the device may further include a dynamic verification module 505, which is used to display the first dynamic verification before acquiring the input audio signal to perform voiceprint data as the voiceprint data.
  • Code the first dynamic verification code is dynamically generated
  • the voiceprint recognition module is specifically used to perform the process of acquiring voiceprint data of the input audio signal as the step of verifying the voiceprint data if the voice content matches the dynamic verification code.
  • the authorized voiceprint data is obtained in the following manner:
  • the second dynamic verification codes are generated dynamically
  • the speech content of the audio signal is obtained
  • the voiceprint data of all audio signals is acquired as the authorized voiceprint data.
  • the voiceprint recognition module 501 is specifically configured to perform voice activity detection on the input audio signal and extract human voice signals in the audio signal;
  • the voiceprint recognition module 501 is specifically configured to model the voiceprint of the input audio signal to obtain voiceprint model data of the audio signal as verification voiceprint data;
  • the authorized voiceprint data is voiceprint model data of the audio signal collected when encrypting the video stream to be played.
  • An embodiment of the present application also provides an electronic device, as shown in FIG. 6, including:
  • Memory 601 used to store computer programs
  • the video stream to be played is played.
  • the authorized voiceprint data is stored in the video stream to be played in the following manner:
  • the method further includes:
  • the method before acquiring the voiceprint data of the input audio signal as the verification voiceprint data, the method further includes:
  • the first dynamic verification code is dynamically generated
  • the authorized voiceprint data is obtained in the following manner:
  • the second dynamic verification codes are generated dynamically
  • the speech content of the audio signal is obtained
  • the voiceprint data of all audio signals is acquired as the authorized voiceprint data.
  • acquiring voiceprint data of the input audio signal as verification voiceprint data includes:
  • acquiring the input audio signal to perform voiceprint modeling as verification voiceprint data includes:
  • the authorized voiceprint data is voiceprint model data of the audio signal collected when encrypting the video stream to be played.
  • the memory mentioned in the above electronic device may include random access memory (Random Access Memory, RAM) or non-volatile memory (Non-Volatile Memory, NVM), for example, at least one disk storage.
  • RAM Random Access Memory
  • NVM Non-Volatile Memory
  • the memory may also be at least one storage device located away from the foregoing processor.
  • the aforementioned processor may be a general-purpose processor, including a central processor (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; it may also be a digital signal processor (Digital Signal Processing, DSP), dedicated integration Circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components.
  • a central processor Central Processing Unit, CPU
  • NP Network Processor
  • DSP Digital Signal Processing
  • ASIC Application Specific Integrated Circuit
  • FPGA Field-Programmable Gate Array
  • a computer-readable storage medium stores instructions, which when run on a computer, causes the computer to execute any of the above embodiments Video streaming method.
  • a computer program product containing instructions is also provided, which, when it runs on a computer, causes the computer to execute any video streaming playing method in the above embodiments.
  • the computer program product includes one or more computer instructions.
  • the computer may be a general-purpose computer, a dedicated computer, a computer network, or other programmable devices.
  • the computer instructions may be stored in a computer-readable storage medium or transferred from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be from a website site, computer, server or data center Transmit to another website, computer, server or data center via wired (such as coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (such as infrared, wireless, microwave, etc.).
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device including a server, a data center, and the like integrated with one or more available media.
  • the usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, a magnetic tape), an optical medium (for example, a DVD), or a semiconductor medium (for example, Solid State Disk (SSD)) or the like.
  • a magnetic medium for example, a floppy disk, a hard disk, a magnetic tape
  • an optical medium for example, a DVD
  • a semiconductor medium for example, Solid State Disk (SSD)

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Acoustics & Sound (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Bioethics (AREA)
  • Biomedical Technology (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

本申请实施例提供了一种视频流播放方法及装置。其中,方法包括:获取输入的音频信号的声纹数据,作为验证声纹数据;确定所述验证声纹数据与待播放视频流所携带的授权声纹数据是否匹配,所述授权声纹数据为加密所述待播放视频流时所采集到的音频信号的声纹数据;如果所述验证声纹数据与所述授权声纹数据相匹配,播放所述待播放视频流。可以利用待播放视频流中所携带的授权声纹数据,对准备观看待播放视频流的人员的身份进行验证,由于声纹与具体所说的内容无关,并且不同人的声纹不一样,因此授权人员可以在不需要记忆任何密钥的前提下,正常观看待播放视频流,而无关人员难以正常观看待播放视频流。

Description

一种视频流播放方法及装置
本申请要求于2018年12月10日提交中国专利局、申请号为201811504930.5,发明名称为“一种视频流播放方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及视频安全技术领域,特别是涉及一种视频流播放方法及装置。
背景技术
出于实际需求,用户可能不希望一些视频流被无关人员观看到。可以对这些视频流进行加密,以使得无关人员无法正常播放这些视频流。相关技术中,可以是利用加密密钥,通过AES(Advanced Encryption Standard,高级加密标准)算法对视频流进行加密。加密后的视频流需要利用该加密密钥,通过AES算法进行解密,才能够正常播放。
但是,如果加密密钥设置的较为简单,则容易被破解,如果加密密钥设置的较为复杂,则不便于用户记忆。
发明内容
本申请实施例的目的在于提供一种视频流播放方法,以实现在不需要用户记忆密钥的前提下,使得无关人员难以正常播放视频流。具体技术方案如下:
在本申请实施例的第一方面,提供了一种视频流播放方法,所述方法包括:
获取输入的音频信号的声纹数据,作为验证声纹数据;
确定所述验证声纹数据与待播放视频流所携带的授权声纹数据是否匹配,所述授权声纹数据为加密所述待播放视频流时所采集到的音频信号的声纹数据;
如果所述验证声纹数据与所述授权声纹数据相匹配,播放所述待播放视频流。
结合第一方面,在第一种可能的实现方式中,所述授权声纹数据通过以下方式保存在所述待播放视频流中的:
利用所述待播放视频流中从第一存储位置开始的预设数目个字节,保存所述授权声纹数据的位长;
利用所述待播放视频流中从第一存储位置开始的所述位长个字节,保存所述授权声纹数据;
在所述确定所述验证声纹数据与待播放视频流所携带的授权声纹数据是否匹配之前,所述方法还包括:
读取所述待播放视频流的所述第一存储位置开始的所述预设数目个字节,得到所述授权声纹数据的位长;
读取所述待播放视频流的所述第二存储位置开始的所述位长个字节,得到所述授权声纹数据。
结合第一方面,在第二种可能的实现方式中,在所述获取输入的音频信号的声纹数据,作为验证声纹数据之前,所述方法还包括:
显示第一动态验证码,所述第一动态验证码为动态生成的;
对输入的音频信号进行语音识别,得到所述音频信号的语音内容;
确定所述语音内容与所述第一动态验证码是否匹配;
如果所述语音内容与所述动态验证码相匹配,执行所述获取输入的音频信号的声纹数据,作为验证声纹数据的步骤;
如果所述语音内容与所述动态验证码不相匹配,拒绝播放所述待播放视频流。
结合第一方面,在第三种可能的实现方式中,所述授权声纹数据通过以下方式得到的:
显示多个第二动态验证码,所述第二动态验证码为动态生成的;
获取针对每个第二动态验证码所输入的音频信号;
针对每个所输入的音频信号进行语音识别,得到该音频信号的语音内容;
如果每个所输入的音频信号的语音内容,与该音频信号所针对的第二动态验证码相匹配,获取所有音频信号的声纹数据,作为授权声纹数据。
结合第一方面,在第四种可能的实现方式中,所述获取输入的音频信号的声纹数据,作为验证声纹数据,包括:
对输入的音频信号进行语音活动检测,提取所述音频信号中的人声信号;
获取所述人声信号的声纹数据,作为验证声纹数据。
结合第一方面,在第五种可能的实现方式中,所述获取输入的音频信号的声纹数据,作为验证声纹数据,包括:
对输入的音频信号进行声纹建模,得到所述音频信号的声纹模型数据,作为验证声纹数据;
所述授权声纹数据为加密所述待播放视频流时所采集到的音频信号的声纹模型数据。
在本申请实施例的第二方面,提供了一种视频流播放装置,所述装置包括:
声纹识别模块,用于获取输入的音频信号的声纹数据,作为验证声纹数据;
声纹比对模块,用于确定所述验证声纹数据与待播放视频流所携带的授权声纹数据是否匹配,所述授权声纹数据为加密所述待播放视频流时所采集到的音频信号的声纹数据;
码流播放模块,用于如果所述验证声纹数据与所述授权声纹数据相匹配,播放所述待播放视频流。
结合第二方面,在第一种可能的实现方式中,所述授权声纹数据通过以下方式保存在所述待播放视频流中的:
利用所述待播放视频流中从第一存储位置开始的预设数目个字节,保存 所述授权声纹数据的位长;
利用所述待播放视频流中从第一存储位置开始的所述位长个字节,保存所述授权声纹数据;
所述装置还包括声纹解析模块,用于在所述确定所述验证声纹数据与待播放视频流所携带的授权声纹数据是否匹配之前,读取所述待播放视频流的所述第一存储位置开始的所述预设数目个字节,得到所述授权声纹数据的位长;
读取所述待播放视频流的所述第二存储位置开始的所述位长个字节,得到所述授权声纹数据。
结合第二方面,在第二种可能的实现方式,所述装置还包括动态验证模块,用于在所述获取输入的音频信号的声纹数据,作为验证声纹数据之前,显示第一动态验证码,所述第一动态验证码为动态生成的;
对输入的音频信号进行语音识别,得到所述音频信号的语音内容;
确定所述语音内容与所述第一动态验证码是否匹配;
如果所述语音内容与所述动态验证码不相匹配,拒绝播放所述待播放视频流;
所述声纹识别模块,具体用于如果所述语音内容与所述动态验证码相匹配,执行所述获取输入的音频信号的声纹数据,作为验证声纹数据的步骤。
结合第二方面,在第三种可能的实现方式中,所述授权声纹数据通过以下方式得到的:
显示多个第二动态验证码,所述第二动态验证码为动态生成的;
获取针对每个第二动态验证码所输入的音频信号;
针对每个所输入的音频信号进行语音识别,得到该音频信号的语音内容;
如果每个所输入的音频信号的语音内容,与该音频信号所针对的第二动态验证码相匹配,获取所有音频信号的声纹数据,作为授权声纹数据。
结合第二方面,在第四种可能的实现方式中,所述声纹识别模块,具体 用于对输入的音频信号进行语音活动检测,提取所述音频信号中的人声信号;
获取所述人声信号的声纹数据,作为验证声纹数据。
结合第二方面,在第五种可能的实现方式中,所述声纹识别模块,具体用于对输入的音频信号进行声纹建模,得到所述音频信号的声纹模型数据,作为验证声纹数据;
所述授权声纹数据为加密所述待播放视频流时所采集到的音频信号的声纹模型数据。
在本申请实施例的第三方面,提供了一种电子设备,包括:
存储器,用于存放计算机程序;
处理器,用于执行存储器上所存放的程序时,实现上述任一所述的视频流播放方法。
在本申请实施例的第四方面,提供了一种计算机可读存储介质,所述计算机可读存储介质内存储有计算机程序,所述计算机程序被处理器执行时实现上述任一所述的视频流播放方法。
本申请实施例提供的视频流播放方法及装置,可以利用待播放视频流中所携带的授权声纹数据,对准备观看待播放视频流的人员的身份进行验证,由于声纹与具体所说的内容无关,并且不同人的声纹不一样,因此授权人员可以在不需要记忆任何密钥的前提下,正常观看待播放视频流,而无关人员难以正常观看待播放视频流。当然,实施本申请的任一产品或方法并不一定需要同时达到以上所述的所有优点。
附图说明
为了更清楚地说明本申请实施例和现有技术的技术方案,下面对实施例和现有技术中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本申请实施例提供的视频流播放方法的一种流程示意图;
图2为本申请实施例提供的视频流播放方法的另一种流程示意图;
图3为本申请实施例提供的授权声纹数据获取方法的一种流程示意图;
图4为本申请实施例提供的授权声纹数据读取方法的一种流程示意图;
图5a为本申请实施例提供的视频流播放装置的一种结构示意图;
图5b为本申请实施例提供的视频流播放装置的另一种结构示意图;
图5c为本申请实施例提供的视频流播放装置的另一种结构示意图;
图6为本申请实施例提供的电子设备的一种结构示意图。
具体实施方式
为使本申请的目的、技术方案、及优点更加清楚明白,以下参照附图并举实施例,对本申请进一步详细说明。显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
参见图1,图1所示为本申请实施例提供的视频流播放方法的一种流程示意图,该方法可以应用于任一具有视频流播放功能的电子设备,方法可以包括:
S101,获取输入的音频信号的声纹数据,作为验证声纹数据。
可以是对输入的音频信号进行VAD(Voice Activity Detection,语音活动检测)处理,以剔除音频信号中的噪音信号和静音信号,得到其中的人声信号。并将人声信号输入预先经过训练的声纹神经网络,得到验证声纹数据。
音频信号可以是具有声音采集功能的电子设备采集得到的,以本方法的执行主体为用户终端为例,该电子设备可以是集成在用户终端上,也可以是独立于用户终端。
验证声纹数据根据实际需求可以是不同类型的数据,示例性的,在本申请实施例中,验证声纹数据可以是最大为128位的无符号字符(unsigned char)数组。
S102,确定验证声纹数据与待播放视频流所携带的授权声纹数据是否匹配。
其中,授权声纹数据为加密待播放视频流时所采集到的音频信号的声纹数据。授权声纹数据的获取方法可以和验证声纹数据的获取方法相同,也可以和验证声纹数据的获取方法不同。两个声纹数据匹配,是指这两个声纹数据各自所表示的声纹相匹配。
待播放视频流可以只携带有一个授权声纹数据,也可以携带有多个授权声纹数据。示例性的,在一些应用场景中,用户可能希望待播放视频流只能够被自己观看,则可以在加密待播放视频流时输入的音频信号中只包括自己的声音。在另一些应用场景中,用户可能希望待播放视频流只可以被包括自己在内的指定群体观看,如自己的家庭成员,则可以在加密待播放视频流时输入的音频信号中包括各个家庭成员的声音。
如果待播放视频流只携带一个授权声纹数据,则可以是计算验证声纹数据与该一个授权声纹数据的相似度,如果相似度高于预设相似度阈值,则确定验证声纹数据与授权声纹数据相匹配,如果相似度不高于预设相似度阈值,则确定验证声纹数据与授权声纹数据不相匹配。
如果待播放视频流中携带多个授权声纹数据,则可以是分别计算验证声纹数据与每个授权声纹数据的相似度,如果验证声纹数据与至少一个授权声纹数据的相似度,高于针对该至少一个授权声纹数据设置的预设相似度阈值,则确定验证声纹数据与授权声纹数据相匹配。如果验证声纹数据与任一授权声纹数据的相似度,不高于针对该任一授权声纹数据设置的预设相似度阈值,则确定验证声纹数据与授权声纹数据不相匹配。针对不同授权声纹数据,可以设置不同的预设相似度阈值,也可以是设置相同的预设相似度阈值。当针对所有授权声纹数据设置的预设相似度阈值相同时,也可以是确定计算得到的多个相似度中的最大值是否高于预设相似度阈值,如果多个相似度中的最大值大于预设相似度阈值,则确定验证声纹数据与授权声纹数据相匹配,如果多个相似度的最大值不大于预设相似度阈值,则确定验证声纹数据与授权声纹数据不相匹配。
S103,如果验证声纹数据与授权声纹数据相匹配,播放待播放视频流。
声纹是人的一种生物因子,可以认为不同的人的声纹是不一样的,因此在声纹模型建立的足够精细的情况下,不同的人的声纹所对应的声纹数据是不同的。
如果验证声纹数据与授权声纹数据相匹配,可以认为S101中输入的音频信号与加密待播放视频流时输入的音频信号中包含相同人员的声音信号,而加密待播放视频流时输入的音频信号所包括的声音信号,可以认为是被许可观看该待播放视频流的人员(以下称授权人员)的声音信号,因此S101中输入的音频信号与加密待播放视频流时输入的音频信号中包含相同人员的声音信号,可以表示准备观看该待播放视频流的人员(以下称待验证人员)为授权人员,因此在这种情况下可以正常播放待播放视频流。另一方面,如果待验证人员不为授权人员(即待验证人员为无关人员),则验证声纹数据与授权声纹数据不相匹配,因此无法正常播放待播放视频流。
选用该实施例,可以通过在待播放视频流中携带授权声纹数据,并在验证声纹数据与所携带的授权声纹数据相匹配的情况下,播放待播放视频流,由于声纹是人的一种生物因子,与人员具体所说的内容无关,并且不同人的声纹不一样。因此可以使得授权人员在不需要记忆密钥的前提下正常观看待播放视频流,而无关人员难以正常观看待播放视频流。
参见图2,图2所示为本申请实施例提供的视频流播放方法的另一种流程示意图,可以包括:
S201,显示第一动态验证码。
其中,第一动态验证码是动态生成的,示例性的,可以是基于混沌方程生成的,也可以是基于随机数表生成的。以该方法的执行主体为用户终端(如手机)为例,第一动态验证码可以是用户终端按照预设随机算法,随机生成的,也可以是用户终端向服务端发送验证请求,并接收服务端发送的验证信息,该验证信息中包括第一动态验证码,该第一动态验证码为服务端动态生成的。第一动态验证码根据实际需求,可以是包括数字、汉字、字母等字符中的一种或多种字符的字符串。在本申请实施例中,为方便用户辨认,第一动态验证码可以是只包括数字的字符串,示例性的,可以是由8个数字组成的字符串,如“59347826”。
S202,对输入的音频信号进行语音识别,得到音频信号的语音内容。
可以是将音频信号输入预先经过训练的语音识别神经网络,以得到该音频信号的语音内容。音频信号的语音内容,是指该音频信号中的人声信号所对应的语音内容。示例性的,假设所输入的音频信号,是音频输入设备录入用户说“ABC”时所发出的声音得到的,则在不考虑语音识别存在误差的情况下,该音频信号的语音内容为“ABC”。
S203,确定语音内容与第一动态验证码是否匹配,如果语音内容与第一动态验证码相匹配,执行S204,如果语音内容与第一动态验证码不相匹配,执行S207。
其中,语音内容与第一动态验证码相匹配,可以是指语音内容与第一动态验证码的相似度高于预设阈值。由于第一动态验证码是动态生成的,理论上待验证人员无法预先获知第一动态验证码。如果语音内容与第一动态验证码相匹配,可以认为输入的音频信号,为待验证人员在观察到所显示的第一动态验证码后通过音频输入设备录入的音频信号。因此,在这种情况下,可以认为输入的音频信号中录入了待验证人员的声音。
如果语音内容与第一动态验证码不相匹配,可以认为输入的音频信号,不为待验证人员在观察到所显示的第一动态验证码后通过音频输入设备录入的音频信号。因此,在这种情况下,可以认为输入的音频信号中没有录入待验证人员的声音。示例性的,假设待验证人员为无关人员,本方法的执行主体为用户终端,并且待验证人员预先在便携式音频播放设备中存储授权人员讲话的音频,则所输入的音频信号,可以是待验证人员通过该便携式音频播放设备播放授权人员讲话的音频,向用户终端输入的音频信号。由于待验证人员无法预先获知第一动态验证码,因此待验证人员也难以诱导授权人员念出第一动态验证码,因此该音频信号的语音内容理论上无法与第一动态验证码相匹配。
S204,获取输入的音频信号的声纹数据,作为验证声纹数据。
该步骤与S101相同,可以参见前述关于S101的描述,在此不再赘述。
S205,确定验证声纹数据与待播放视频流所携带的授权声纹数据是否匹 配,如果验证声纹数据与待播放视频流所携带的授权声纹数据相匹配,执行S206,验证声纹数据与待播放视频流所携带的授权声纹数据不相匹配,执行S207。
该步骤与S102相同,可以参见前述关于S102的描述,在此不再赘述。
S206,播放待播放视频流。
该步骤与S103相同,可以参见前述关于S103的描述,在此不再赘述。
S207,拒绝播放待播放视频流。
在其他可选的实施例中,也可以是通过预设身份验证方法,对待验证人员的身份进行验证。如果待验证人员被验证为授权人员,则播放待播放视频流。
如前述分析,如果语音内容与第一动态验证码不相匹配,可以认为输入的音频信号中没有录入待验证人员的声音,在这种情况下,即使获取输入的音频信号的声纹数据,作为验证声纹数据,该验证声纹数据可能无法有效对待验证人员是否为授权人员进行验证,出于保护用户隐私的考虑,可以直接拒绝播放待播放视频流。
仍以S203中的例子为例,如果继续获取输入的音频信号的声纹数据,作为验证声纹数据,则验证声纹数据实际为表示授权人员的声纹的声纹数据,而非表示待验证人员的声纹的声纹数据,进而可能错误的将待验证人员确定为授权人员。即无关人员可以利用预先录制的授权人员讲话的音频冒充授权人员,以观看到待播放视频流。而选用该实施例,可以通过要求待验证人员念出动态生成的第一动态验证码,有效避免无关人员成功利用预先录制的授权人员讲话的音频冒充授权人员的情况的发生,进一步地提高了待播放视频流的安全性。
本申请实施例提供的视频流播放方法,是通过验证声纹数据与授权声纹数据是否匹配,确定待验证人员是否授权人员的。因此授权声纹数据是否准确,直接影响到了本申请实施例提供的视频流播放方法的准确性。例如,如果授权声纹数据所表示的声纹与授权人员实际声纹存在较大差距,则可能导致授权人员也无法正常观看待播放视频流。为此,本申请实施例提供了一种 授权声纹数据获取方法,可以参见图3,包括:
S301,显示多个第二动态验证码。
显示的第二动态验证码的数量可以根据实际需求进行设置,示例性的可以是显示5个第二动态验证码。第二动态验证码和第一动态验证码的获取方式可以相同,也可以不同。并且在本实施例中,第二动态验证码可以为只包括数字的字符串,在其他可选的实施例中,第二动态验证码中也可以包括字母、汉字等字符中的一种或多种字符。
S302,获取针对每个第二动态验证码所输入的音频信号。
以执行主体为用户终端为例,可以使用户终端开启MIC(Microphone)音频采集,分别录入用户念出各个第二动态验证码的声音。在其他实施例中,S302也可以是和S301交替执行的,示例性的,显示第一个第二动态验证码,获取针对第一个第二动态验证码输入的音频信号,显示第二个第二动态验证码,获取针对第二个第二动态验证码输入的音频信号……依次类推,直至获取针对最后一个第二动态验证码所输入的音频信号。
S303,针对每个所输入的音频信号进行语音识别,得到该音频信号的语音内容。
关于语音内容和获取方法可以参见S202中的相关描述,在此不再赘述。在其他可选的实施例中,S303也可以是和S302交替执行的,还可以是和S301、S302交替执行的。示例性的,可以是在每次获取到针对一个第二动态验证码所输入的音频信号后,对该音频信号进行语音识别,得到该音频信号的语音内容,再获取针对下一个第二动态验证码所输入的音频信号。
S304,如果每个所输入的音频信号的语音内容,与该音频信号所针对的第二动态验证码相匹配,获取这多个音频信号的声纹数据,作为授权声纹数据。
如果一个音频信号的语音内容,与该音频信号所针对的第二动态验证码相匹配,说明该音频信号中录入了用户念出第二动态验证码的声音。如果每个所输入的音频信号的语音内容,与该音频信号所针对的第二动态验证码相匹配,则说明每个音频信号均录入了用户念出相对应的第二动态验证码的声 音。在这种情况下,可以认为多个音频信号中已经录入足够多的用户的声音样本,而基于足够多的用户的声音样本获取到的声纹数据更加准确。
在一些应用场景中,可能同时存在不希望被无关人员观看的待播放视频流,以及可以被所有人观看的待播放视频流。本申请实施例中,可以是在封装格式头中设置标识,以区分不希望被无关人员观看的待播放视频流,和可以被所有人观看的待播放视频流。并且不希望被无关人员观看的待播放视频流中携带有用于验证待验证人员身份的授权声纹数据。待播放视频流中除了授权声纹数据,还包括其他数据,例如可能包括H264格式的视频流数据,为了能够准确地从待播放视频流中读取授权声纹数据,可以参见图4,图4所示为本申请实施例提供的声纹数据读取方法的一种流程示意图,可以包括:
S401,读取待播放视频流的第一存储位置开始的预设数目个字节,得到授权声纹数据的位长。
预设数目可以根据实际需求进行设置,示例性的,本申请实施例中可以使用一个四字节的无符号整形数据(unsigned int)保存授权声纹数据的位长。其他实施例中,也可以选用其他数据格式保存授权声纹数据的位长。
S402,读取待播放视频流的第二存储位置开始的位长个字节,得到授权声纹数据。
示例性的,假设位长为126,则读取从第二存储位置开始的126个字节,以得到授权声纹数据。在本实施例中,第一存储位置和第二存储位置可以根据实际需求进行选取,在本申请实施例中,假设授权声纹数据最大不会超过128字节,为了避免与待播放视频流中的其他数据冲突,可以是选取4个字节的连续保留位中的起始位置作为第一存储位置,选取128个字节的连续保留位中的起始位置作为第二存储位置。
授权声纹数据的保存方法应当与授权声纹数据的读取方法一致,可以是确定授权声纹数据的位长,将授权声纹的位长保存于待播放视频流中的第一存储位置开始的预设数目个字节处,并将授权声纹数据保存于待播放视频流的第二存储位置开始的位长个字节处,在此不再赘述。在本申请实施例中,授权声纹数据以及位长可以是以结构体的形式进行保存的,结构体的格式可 以如下所示:
{
unsigned int nModelSize;
unsigned char strModel[MODEL_MAX_SIZE]
}
其中,nModelSize为用于表示位长的无符号整形数据,strModel为用于表示授权声纹数据的无符号字符数组,MODEL_MAX_SIZE为授权声纹数据的最大位长。
在另一些应用场景中,如果待播放视频流中包括多个授权声纹数据模型,则可以是对应的设置有多个第一存储位置以及多个第二存储位置,分别读取多个第一存储位置开始的预设数目个字节,得到各个授权声纹数据的位长,针对每个授权声纹数据,读取对应的第二存储位置开始的该授权声纹数据的位长个字节,得到该授权声纹数据。
参见图5a,图5a所示为本申请实施例提供的视频流播放装置的一种结构示意图,可以包括:
声纹识别模块501,用于获取输入的音频信号进行声纹数据,作为验证声纹数据;
声纹比对模块502,用于确定验证声纹数据与待播放视频流所携带的授权声纹数据是否匹配,授权声纹数据为加密待播放视频流时所采集到的音频信号的声纹数据;
码流播放模块503,用于如果验证声纹数据与授权声纹数据相匹配,播放待播放视频流。
在一种可选的实施例中,授权声纹数据通过以下方式保存在待播放视频流中的:
利用待播放视频流中从第一存储位置开始的预设数目个字节,保存授权声纹数据的位长;
利用待播放视频流中从第一存储位置开始的位长个字节,保存授权声纹数据;
如图5b所示,装置还可以包括声纹解析模块504,用于在确定验证声纹数据与待播放视频流所携带的授权声纹数据是否匹配之前,读取待播放视频流的第一存储位置开始的预设数目个字节,得到授权声纹数据的位长;
读取待播放视频流的第二存储位置开始的位长个字节,得到授权声纹数据。
在一种可选的实施例中,如图5c所示,装置还可以包括动态验证模块505,用于在获取输入的音频信号进行声纹数据,作为验证声纹数据之前,显示第一动态验证码,第一动态验证码为动态生成的;
对输入的音频信号进行语音识别,得到音频信号的语音内容;
确定语音内容与第一动态验证码是否匹配;
如果语音内容与动态验证码不相匹配,拒绝播放待播放视频流;
声纹识别模块,具体用于如果语音内容与动态验证码相匹配,执行获取输入的音频信号的声纹数据,作为验证声纹数据的步骤。
在一种可选的实施例中,授权声纹数据通过以下方式得到的:
显示多个第二动态验证码,第二动态验证码为动态生成的;
获取针对每个第二动态验证码所输入的音频信号;
针对对每个所输入的音频信号进行语音识别,得到该音频信号的语音内容;
如果每个所输入的音频信号的语音内容,与该音频信号所针对的第二动态验证码相匹配,获取所有音频信号的声纹数据,作为授权声纹数据。
在一种可选的实施例中,声纹识别模块501,具体用于对输入的音频信号进行语音活动检测,提取音频信号中的人声信号;
获取人声信号的声纹数据,作为验证声纹数据。
在一种可选的实施例中,声纹识别模块501,具体用于对输入的音频信号进行声纹建模,得到音频信号的声纹模型数据,作为验证声纹数据;
授权声纹数据为加密待播放视频流时所采集到的音频信号的声纹模型数据。
本申请实施例还提供了一种电子设备,如图6所示,包括:
存储器601,用于存放计算机程序;
处理器602,用于执行存储器601上所存放的程序时,实现如下步骤:
获取输入的音频信号的声纹数据,作为验证声纹数据;
确定验证声纹数据与待播放视频流所携带的授权声纹数据是否匹配,授权声纹数据为加密待播放视频流时所采集到的音频信号的声纹数据;
如果验证声纹数据与授权声纹数据相匹配,播放待播放视频流。
在一种可选的实施例中,,授权声纹数据通过以下方式保存在待播放视频流中的:
利用待播放视频流中从第一存储位置开始的预设数目个字节,保存授权声纹数据的位长;
利用待播放视频流中从第一存储位置开始的位长个字节,保存授权声纹数据;
在确定验证声纹数据与待播放视频流所携带的授权声纹数据是否匹配之前,方法还包括:
读取待播放视频流的第一存储位置开始的预设数目个字节,得到授权声纹数据的位长;
读取待播放视频流的第二存储位置开始的位长个字节,得到授权声纹数据。
在一种可选的实施例中,在获取输入的音频信号的声纹数据,作为验证声纹数据之前,方法还包括:
显示第一动态验证码,第一动态验证码为动态生成的;
对输入的音频信号进行语音识别,得到音频信号的语音内容;
确定语音内容与第一动态验证码是否匹配;
如果语音内容与动态验证码相匹配,执行获取输入的音频信号的声纹数据,作为验证声纹数据的步骤;
如果语音内容与动态验证码不相匹配,拒绝播放待播放视频流。
在一种可选的实施例中,授权声纹数据通过以下方式得到的:
显示多个第二动态验证码,第二动态验证码为动态生成的;
获取针对每个第二动态验证码所输入的音频信号;
针对对每个所输入的音频信号进行语音识别,得到该音频信号的语音内容;
如果每个所输入的音频信号的语音内容,与该音频信号所针对的第二动态验证码相匹配,获取所有音频信号的声纹数据,作为授权声纹数据。
在一种可选的实施例中,获取输入的音频信号的声纹数据,作为验证声纹数据,包括:
对输入的音频信号进行语音活动检测,提取音频信号中的人声信号;
获取人声信号的声纹数据,作为验证声纹数据。
在一种可选的实施例中,获取输入的音频信号进行声纹建模,作为验证声纹数据,包括:
对输入的音频信号进行声纹建模,得到音频信号的声纹模型数据,作为验证声纹数据;
授权声纹数据为加密待播放视频流时所采集到的音频信号的声纹模型数据。
上述电子设备提到的存储器可以包括随机存取存储器(Random Access Memory,RAM),也可以包括非易失性存储器(Non-Volatile Memory,NVM), 例如至少一个磁盘存储器。可选的,存储器还可以是至少一个位于远离前述处理器的存储装置。
上述的处理器可以是通用处理器,包括中央处理器(Central Processing Unit,CPU)、网络处理器(Network Processor,NP)等;还可以是数字信号处理器(Digital Signal Processing,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。
在本申请提供的又一实施例中,还提供了一种计算机可读存储介质,该计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述实施例中任一视频流播放方法。
在本申请提供的又一实施例中,还提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行上述实施例中任一视频流播放方法。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。
需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来 将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
本说明书中的各个实施例均采用相关的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于装置、电子设备、计算机可读存储介质、计算机程序产品的实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
以上所述仅为本申请的较佳实施例而已,并不用以限制本申请,凡在本申请的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本申请保护的范围之内。

Claims (14)

  1. 一种视频流播放方法,其特征在于,所述方法包括:
    获取输入的音频信号的声纹数据,作为验证声纹数据;
    确定所述验证声纹数据与待播放视频流所携带的授权声纹数据是否匹配,所述授权声纹数据为加密所述待播放视频流时所采集到的音频信号的声纹数据;
    如果所述验证声纹数据与所述授权声纹数据相匹配,播放所述待播放视频流。
  2. 根据权利要求1所述的方法,其特征在于,所述授权声纹数据通过以下方式保存在所述待播放视频流中的:
    利用所述待播放视频流中从第一存储位置开始的预设数目个字节,保存所述授权声纹数据的位长;
    利用所述待播放视频流中从第一存储位置开始的所述位长个字节,保存所述授权声纹数据;
    在所述确定所述验证声纹数据与待播放视频流所携带的授权声纹数据是否匹配之前,所述方法还包括:
    读取所述待播放视频流的所述第一存储位置开始的所述预设数目个字节,得到所述授权声纹数据的位长;
    读取所述待播放视频流的所述第二存储位置开始的所述位长个字节,得到所述授权声纹数据。
  3. 根据权利要求1所述的方法,其特征在于,在所述获取输入的音频信号的声纹数据,作为验证声纹数据之前,所述方法还包括:
    显示第一动态验证码,所述第一动态验证码为动态生成的;
    对输入的音频信号进行语音识别,得到所述音频信号的语音内容;
    确定所述语音内容与所述第一动态验证码是否匹配;
    如果所述语音内容与所述动态验证码相匹配,执行所述获取输入的音频 信号的声纹数据,作为验证声纹数据的步骤;
    如果所述语音内容与所述动态验证码不相匹配,拒绝播放所述待播放视频流。
  4. 根据权利要求1所述的方法,其特征在于,所述授权声纹数据通过以下方式得到的:
    显示多个第二动态验证码,所述第二动态验证码为动态生成的;
    获取针对每个第二动态验证码所输入的音频信号;
    针对每个所输入的音频信号进行语音识别,得到该音频信号的语音内容;
    如果每个所输入的音频信号的语音内容,与该音频信号所针对的第二动态验证码相匹配,获取所有音频信号的声纹数据,作为授权声纹数据。
  5. 根据权利要求1所述的方法,其特征在于,所述获取输入的音频信号的声纹数据,作为验证声纹数据,包括:
    对输入的音频信号进行语音活动检测,提取所述音频信号中的人声信号;
    获取所述人声信号的声纹数据,作为验证声纹数据。
  6. 根据权利要求1所述的方法,其特征在于,所述获取输入的音频信号的声纹数据,作为验证声纹数据,包括:
    对输入的音频信号进行声纹建模,得到所述音频信号的声纹模型数据,作为验证声纹数据;
    所述授权声纹数据为加密所述待播放视频流时所采集到的音频信号的声纹模型数据。
  7. 一种视频流播放装置,其特征在于,所述装置包括:
    声纹识别模块,用于获取输入的音频信号的声纹数据,作为验证声纹数据;
    声纹比对模块,用于确定所述验证声纹数据与待播放视频流所携带的授权声纹数据是否匹配,所述授权声纹数据为加密所述待播放视频流时所采集 到的音频信号的声纹数据;
    码流播放模块,用于如果所述验证声纹数据与所述授权声纹数据相匹配,播放所述待播放视频流。
  8. 根据权利要求7所述的装置,其特征在于,所述授权声纹数据通过以下方式保存在所述待播放视频流中的:
    利用所述待播放视频流中从第一存储位置开始的预设数目个字节,保存所述授权声纹数据的位长;
    利用所述待播放视频流中从第一存储位置开始的所述位长个字节,保存所述授权声纹数据;
    所述装置还包括声纹解析模块,用于在所述确定所述验证声纹数据与待播放视频流所携带的授权声纹数据是否匹配之前,读取所述待播放视频流的所述第一存储位置开始的所述预设数目个字节,得到所述授权声纹数据的位长;
    读取所述待播放视频流的所述第二存储位置开始的所述位长个字节,得到所述授权声纹数据。
  9. 根据权利要求7所述的装置,其特征在于,所述装置还包括动态验证模块,用于在所述获取输入的音频信号的声纹数据,作为验证声纹数据之前,显示第一动态验证码,所述第一动态验证码为动态生成的;
    对输入的音频信号进行语音识别,得到所述音频信号的语音内容;
    确定所述语音内容与所述第一动态验证码是否匹配;
    如果所述语音内容与所述动态验证码不相匹配,拒绝播放所述待播放视频流;
    所述声纹识别模块,具体用于如果所述语音内容与所述动态验证码相匹配,执行所述获取输入的音频信号的声纹数据,作为验证声纹数据的步骤。
  10. 根据权利要求7所述的装置,其特征在于,所述授权声纹数据通过以下方式得到的:
    显示多个第二动态验证码,所述第二动态验证码为动态生成的;
    获取针对每个第二动态验证码所输入的音频信号;
    针对每个所输入的音频信号进行语音识别,得到该音频信号的语音内容;
    如果每个所输入的音频信号的语音内容,与该音频信号所针对的第二动态验证码相匹配,获取所有音频信号的声纹数据,作为授权声纹数据。
  11. 根据权利要求7所述的装置,其特征在于,所述声纹识别模块,具体用于对输入的音频信号进行语音活动检测,提取所述音频信号中的人声信号;
    获取所述人声信号的声纹数据,作为验证声纹数据。
  12. 根据权利要求7所述的装置,其特征在于,所述声纹识别模块,具体用于对输入的音频信号进行声纹建模,得到所述音频信号的声纹模型数据,作为验证声纹数据;
    所述授权声纹数据为加密所述待播放视频流时所采集到的音频信号的声纹模型数据。
  13. 一种电子设备,其特征在于,包括:
    存储器,用于存放计算机程序;
    处理器,用于执行存储器上所存放的程序时,实现权利要求1-6任一所述的方法步骤。
  14. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质内存储有计算机程序,所述计算机程序被处理器执行时实现权利要求1-6任一所述的方法步骤。
PCT/CN2019/124395 2018-12-10 2019-12-10 一种视频流播放方法及装置 WO2020119692A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811504930.5 2018-12-10
CN201811504930.5A CN111294642B (zh) 2018-12-10 2018-12-10 一种视频流播放方法及装置

Publications (1)

Publication Number Publication Date
WO2020119692A1 true WO2020119692A1 (zh) 2020-06-18

Family

ID=71029831

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/124395 WO2020119692A1 (zh) 2018-12-10 2019-12-10 一种视频流播放方法及装置

Country Status (2)

Country Link
CN (1) CN111294642B (zh)
WO (1) WO2020119692A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114121050A (zh) * 2021-11-30 2022-03-01 云知声智能科技股份有限公司 音频播放方法、装置、电子设备和存储介质
CN117241253B (zh) * 2023-11-13 2024-01-19 成都智科通信技术股份有限公司 一种多音频自适应切换播放处理方法、系统、终端及介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007034031A (ja) * 2005-07-28 2007-02-08 Sekitai Sui Kofun Yugenkoshi 声紋パスワードキーのシステム
US20090310819A1 (en) * 2006-07-19 2009-12-17 Panasonic Corporation Media data processing apparatus and media data processing method
CN103679046A (zh) * 2012-09-17 2014-03-26 联想(北京)有限公司 数据创建方法和装置、以及数据访问方法和装置
CN104573550A (zh) * 2014-12-27 2015-04-29 小米科技有限责任公司 数据保护方法和装置
CN105279447A (zh) * 2014-06-23 2016-01-27 中兴通讯股份有限公司 数据加密方法、解密方法及装置
CN109219003A (zh) * 2018-08-22 2019-01-15 Oppo广东移动通信有限公司 信息加密方法、装置、存储介质及电子设备

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104935429B (zh) * 2014-03-17 2019-06-04 Tcl集团股份有限公司 一种采用多重加密的数据处理方法及其系统
KR102640423B1 (ko) * 2017-01-31 2024-02-26 삼성전자주식회사 음성 입력 처리 방법, 이를 지원하는 전자 장치, 및 시스템

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007034031A (ja) * 2005-07-28 2007-02-08 Sekitai Sui Kofun Yugenkoshi 声紋パスワードキーのシステム
US20090310819A1 (en) * 2006-07-19 2009-12-17 Panasonic Corporation Media data processing apparatus and media data processing method
CN103679046A (zh) * 2012-09-17 2014-03-26 联想(北京)有限公司 数据创建方法和装置、以及数据访问方法和装置
CN105279447A (zh) * 2014-06-23 2016-01-27 中兴通讯股份有限公司 数据加密方法、解密方法及装置
CN104573550A (zh) * 2014-12-27 2015-04-29 小米科技有限责任公司 数据保护方法和装置
CN109219003A (zh) * 2018-08-22 2019-01-15 Oppo广东移动通信有限公司 信息加密方法、装置、存储介质及电子设备

Also Published As

Publication number Publication date
CN111294642A (zh) 2020-06-16
CN111294642B (zh) 2021-06-18

Similar Documents

Publication Publication Date Title
US10650827B2 (en) Communication method, and electronic device therefor
CN108702354B (zh) 基于传感器信号的活跃度确定
US10146923B2 (en) Audiovisual associative authentication method, related system and device
US10158633B2 (en) Using the ability to speak as a human interactive proof
US7974411B2 (en) Method for protecting audio content
US20170118205A1 (en) User biological feature authentication method and system
US20160148012A1 (en) System, method and apparatus for voice biometric and interactive authentication
US10339288B2 (en) User authentication for mobile devices using behavioral analysis
US20140359736A1 (en) Dynamic voiceprint authentication
US11700127B2 (en) Authentication method, authentication device, electronic device and storage medium
CN105659324B (zh) 协作音频对话证明
JP2011215942A (ja) ユーザ認証装置、ユーザ認証システム、ユーザ認証方法及びプログラム
US9461987B2 (en) Audio authentication system
WO2020119692A1 (zh) 一种视频流播放方法及装置
CN112105297A (zh) 健康相关信息生成和存储
WO2015196642A1 (zh) 数据加密方法、解密方法及装置
JP5769454B2 (ja) 情報処理装置、情報処理方法及びプログラム
US20220272131A1 (en) Method, electronic device and system for generating record of telemedicine service
CN111954035A (zh) 影音信号流的加密方法与装置
KR102248687B1 (ko) 음성 기술을 이용한 원격 진료 시스템 및 방법
JP2019176251A (ja) 認証システム及び認証方法
KR20070016252A (ko) 음원 파일 처리 방법 및 그 장치
JP2010074391A (ja) 録音装置およびプログラムならびに録音再生システム
JP2000306090A (ja) 個人認証装置、方法及び記録媒体
US7978853B2 (en) System and computer program product for protecting audio content

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19894446

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19894446

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 19894446

Country of ref document: EP

Kind code of ref document: A1