+

CN113612738A - Voiceprint real-time authentication encryption method, voiceprint authentication equipment and controlled equipment - Google Patents

Voiceprint real-time authentication encryption method, voiceprint authentication equipment and controlled equipment Download PDF

Info

Publication number
CN113612738A
CN113612738A CN202110821062.9A CN202110821062A CN113612738A CN 113612738 A CN113612738 A CN 113612738A CN 202110821062 A CN202110821062 A CN 202110821062A CN 113612738 A CN113612738 A CN 113612738A
Authority
CN
China
Prior art keywords
audio
voiceprint
information
real
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110821062.9A
Other languages
Chinese (zh)
Other versions
CN113612738B (en
Inventor
周珺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhanyun Technology Co ltd
Original Assignee
Shenzhen Zhanyun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhanyun Technology Co ltd filed Critical Shenzhen Zhanyun Technology Co ltd
Priority to CN202110821062.9A priority Critical patent/CN113612738B/en
Publication of CN113612738A publication Critical patent/CN113612738A/en
Application granted granted Critical
Publication of CN113612738B publication Critical patent/CN113612738B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention is suitable for the voiceprint authentication field, and provides a voiceprint real-time authentication encryption method, a computer readable storage medium, voiceprint authentication equipment and controlled equipment, which comprise: receiving audio input by a user; analyzing the audio locally or sending the audio to a server for analysis, authenticating the voiceprint information after the audio is analyzed and authorized voiceprint information to judge whether the audio is a legal voiceprint, or receiving an authentication result which is sent by the server and authenticates the analyzed voiceprint information in the server to judge whether the audio is a legal voiceprint; if the audio frequency is a legal voiceprint, carrying out dislocation phase weighting processing on the voiceprint information analyzed by the audio frequency and the audio frequency to obtain encrypted audio information; and sending the encrypted audio information to the controlled equipment so that the controlled equipment processes the audio information and then executes instruction operation. The invention improves the confidentiality of man-machine interaction.

Description

Voiceprint real-time authentication encryption method, voiceprint authentication equipment and controlled equipment
Technical Field
The invention belongs to the field of voiceprint authentication, and particularly relates to a voiceprint real-time authentication encryption method, a computer readable storage medium, voiceprint authentication equipment and controlled equipment.
Background
In the sound technology commonly applied in the industry at present, different people all say the same words are received and executed by the equipment. The use of this voice technology does not provide the present voiceprint authentication technology. For example, in the current market products, "love, love", "degree, degree", everyone can be received by the device by speaking the key word. Such voice recognition techniques are not unique, and a human can control and operate the device as long as the device is known to receive the key sentences.
After the existing voiceprint authentication technology passes through once, all subsequent instruction operations are not monitored any more even if the instruction operations are illegal. And the use of the one-time authentication technology is easy to be embezzled by lawless persons to make false by legal voice information of other persons, and the confidentiality of man-machine interaction is poor.
Disclosure of Invention
The invention aims to provide a method for real-time voiceprint authentication and encryption, a computer readable storage medium, voiceprint authentication equipment and controlled equipment, and aims to solve the problems that voiceprint identification is not unique and the voiceprint authentication confidentiality is poor.
In a first aspect, the present invention provides a method for real-time authentication and encryption of voiceprint, including:
receiving audio input by a user;
analyzing the audio locally or sending the audio to a server for analysis, authenticating the voiceprint information after the audio is analyzed and authorized voiceprint information to judge whether the audio is a legal voiceprint, or receiving an authentication result which is sent by the server and authenticates the analyzed voiceprint information in the server to judge whether the audio is a legal voiceprint;
if the audio frequency is a legal voiceprint, carrying out dislocation phase weighting processing on the voiceprint information analyzed by the audio frequency and the audio frequency to obtain encrypted audio information;
and sending the encrypted audio information to the controlled equipment so that the controlled equipment processes the audio information and then executes instruction operation.
Further, if the audio is not a legal voiceprint, the audio is not processed and the step of receiving the audio input by the user is returned.
Further, the method also includes sending the encrypted audio information to a server.
Furthermore, the staggered phase weighting process is to extract a plurality of sine wave signals from the voiceprint information after the audio analysis to synthesize a voiceprint file, and synthesize a sound data stream with the audio after delaying for a predetermined time.
Further, the performing of the instruction operation after the controlled device processes the audio information is specifically that the controlled device parses the received audio information in a sound data stream to extract the plurality of sine wave signals delayed for a predetermined time, separates out the voiceprint information and the audio after the audio parsing, and performs the instruction operation according to the audio.
In a second aspect, the present invention provides a computer readable storage medium storing a computer program which, when executed by a processor, implements the steps of the method for real-time authenticated encryption of voiceprints according to the first aspect.
In a third aspect, the present invention provides a voiceprint authentication device, including: one or more processors, a memory, and one or more computer programs, the processors and the memory being connected by a bus, wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors, which when executing the computer programs implement the steps of the method of voiceprint real time authenticated encryption as described in the first aspect.
In a fourth aspect, the present invention provides a method for voiceprint real-time authentication and encryption, including:
receiving encrypted audio information sent by voiceprint authentication equipment by adopting the voiceprint real-time authentication encryption method in the first aspect;
analyzing and extracting the received audio information in a sound data stream, separating the voiceprint information and the audio after the audio is analyzed, and executing instruction operation according to the audio.
In a fifth aspect, the present invention provides a computer readable storage medium storing a computer program which, when executed by a processor, implements the steps of the method for real-time authenticated encryption of voiceprints according to the fourth aspect.
In a sixth aspect, the present invention provides a controlled device, comprising: one or more processors, a memory, and one or more computer programs, the processors and the memory being connected by a bus, wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors, which when executing the computer programs implement the steps of the method of voiceprint real-time authenticated encryption as described in the fourth aspect.
In the invention, the audio input by a user is compared with authorized voiceprint information after being analyzed and authenticated, whether the audio is a legal voiceprint is judged, then the voiceprint information after being analyzed and the audio which are determined to be the legal voiceprint are sent to controlled equipment after being subjected to dislocation phase weighting processing, and the controlled equipment executes an instruction; that is, each sent instruction is authenticated and proved to be legal; abnormal files are transmitted between the voiceprint authentication device and the controlled device if the files are intercepted by a malicious device, so that the confidentiality of man-machine interaction is improved.
Drawings
Fig. 1 is a flowchart of a method for real-time authentication and encryption of voiceprint according to an embodiment of the present invention.
Fig. 2 is a block diagram of a specific structure of a voiceprint authentication device according to an embodiment of the present invention.
Fig. 3 is a flowchart of a method for real-time authentication and encryption of voiceprint according to another embodiment of the present invention.
Fig. 4 is a block diagram of a specific structure of a controlled device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more clearly apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
Referring to fig. 1, a method for real-time authentication and encryption of voiceprint according to an embodiment of the present invention includes the following steps: it should be noted that the method for real-time authentication and encryption of voiceprint according to the present invention is not limited to the flow sequence shown in fig. 1 if the result is substantially the same.
S011, receiving audio input by a user;
s012, analyzing the audio locally, or sending the audio to a server for analysis, authenticating the voiceprint information after the audio is analyzed and authorized voiceprint information to judge whether the audio is a legal voiceprint, or receiving an authentication result which is sent by the server and authenticates the analyzed voiceprint information in the server to judge whether the audio is a legal voiceprint;
s013, if the audio is a legal voiceprint, carrying out dislocation phase weighting processing on the voiceprint information after the audio is analyzed and the audio to obtain encrypted audio information;
and S014, sending the encrypted audio information to the controlled equipment so that the controlled equipment processes the audio information and then executes instruction operation.
In an embodiment of the present invention, if the audio is not a valid voiceprint, the step of receiving the audio input by the user is not performed.
In an embodiment of the present invention, when the analysis operation of the local device is not sufficient, the method further includes sending the encrypted audio information to a server, and performing analysis operation processing by the server.
In an embodiment of the present invention, the staggered phase weighting processing is to extract a plurality of sine wave signals from the voiceprint information after the audio analysis to synthesize a voiceprint file, and synthesize a sound data stream with the audio after delaying for a predetermined time.
In an embodiment of the present invention, the performing the instruction operation after the controlled device processes the audio information is specifically that the controlled device parses the received audio information in a sound data stream to extract the plurality of sine wave signals delayed by the predetermined time, separates out the voiceprint information and the audio after the audio parsing, and performs the instruction operation according to the audio.
For example: and selecting the third to eighth sine wave signals extracted from the voiceprint information after audio analysis to synthesize a voiceprint file, and synthesizing the voiceprint file with the audio after delaying for 100ms (of course, delaying for other time lengths, such as between 80ms and 120 ms). Therefore, the device is suitable for normal operation of equipment and does not influence use; and after the appointed mechanism is determined, the controlled equipment extracts the execution instruction according to the mechanism.
The controlled device analyzes and extracts the received audio information in the sound data stream, extracts the third to eighth sine wave signals delayed by 100ms, separates the voiceprint information and the audio after audio analysis, and executes instruction operation according to the audio.
An embodiment of the present invention provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the steps of the method for real-time authentication and encryption of voiceprints according to an embodiment of the present invention.
Fig. 2 is a block diagram showing a specific structure of a voiceprint authentication device according to an embodiment of the present invention, where a router 100 includes: one or more processors 101, a memory 102, and one or more computer programs, wherein the processors 101 and the memory 102 are connected by a bus, the one or more computer programs are stored in the memory 102 and configured to be executed by the one or more processors 101, and the steps of the method for voiceprint real-time authenticated encryption according to an embodiment of the invention are implemented when the computer programs are executed by the processors 101.
In an embodiment of the present invention, the voiceprint authentication device may be a headset.
Referring to fig. 3, another embodiment of the present invention provides a method for real-time authentication and encryption of voiceprint, including:
s021, receiving encrypted audio information sent by voiceprint authentication equipment by using the voiceprint real-time authentication encryption method in the embodiment of the invention;
s022, analyzing and extracting the received audio information in a sound data stream, separating voiceprint information and the audio after audio analysis, and executing instruction operation according to the audio.
An embodiment of the present invention provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program implements the steps of the method for real-time authentication and encryption of voiceprints according to another embodiment of the present invention.
Fig. 4 shows that an embodiment of the present invention provides a controlled device 200, including: one or more processors 201, a memory 202, and one or more computer programs, wherein the processors 201 and the memory 202 are connected by a bus, the one or more computer programs are stored in the memory 202 and configured to be executed by the one or more processors 201, and the steps of the method for real-time authenticated encryption of voiceprints according to another embodiment of the present invention are implemented when the computer programs are executed by the processors 201.
In an embodiment of the present invention, the controlled device is built in a unit of the authentication device or various wireless electronic devices and intelligent wireless devices.
In the embodiment of the invention, the audio input by a user is compared with authorized voiceprint information after being analyzed and authenticated, whether the audio is a legal voiceprint is judged, then the voiceprint information after being analyzed and the audio which are determined to be the legal voiceprint are sent to controlled equipment after being subjected to dislocation phase weighting processing, and the controlled equipment executes an instruction; that is, each sent instruction is authenticated and proved to be legal; abnormal files are transmitted between the voiceprint authentication device and the controlled device if the files are intercepted by a malicious device, so that the confidentiality of man-machine interaction is improved.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable storage medium, and the storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (10)

1. A method for voiceprint real-time authentication encryption is characterized by comprising the following steps:
receiving audio input by a user;
analyzing the audio locally or sending the audio to a server for analysis, authenticating the voiceprint information after the audio is analyzed and authorized voiceprint information to judge whether the audio is a legal voiceprint, or receiving an authentication result which is sent by the server and authenticates the analyzed voiceprint information in the server to judge whether the audio is a legal voiceprint;
if the audio frequency is a legal voiceprint, carrying out dislocation phase weighting processing on the voiceprint information analyzed by the audio frequency and the audio frequency to obtain encrypted audio information;
and sending the encrypted audio information to the controlled equipment so that the controlled equipment processes the audio information and then executes instruction operation.
2. The method of claim 1, wherein if the audio is not a legitimate voiceprint, then not processing the audio and returning to the step of receiving audio input by a user.
3. The method of claim 1, further comprising sending the encrypted audio information to a server.
4. The method of claim 1, wherein the staggered phase weighting process is to extract a plurality of sine wave signals from the audio parsed voiceprint information to synthesize a voiceprint file, and to synthesize a sound data stream with the audio after a predetermined delay.
5. The method as claimed in claim 1, wherein the performing of the command operation after the audio information is processed by the controlled device is specifically that the controlled device parses the received audio information in a sound data stream to extract the plurality of sine wave signals delayed for the predetermined time, separates the audio parsed voiceprint information and the audio, and performs the command operation according to the audio.
6. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method for real-time authenticated encryption of voiceprints according to any one of claims 1 to 5.
7. A voiceprint authentication device comprising: one or more processors, a memory and one or more computer programs, the processors and the memory being connected by a bus, wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors, characterized in that the steps of the method of voiceprint real-time authenticated encryption according to any one of claims 1 to 5 are implemented when the computer programs are executed by the processors.
8. A method for voiceprint real-time authentication encryption is characterized by comprising the following steps:
receiving encrypted audio information sent by a voiceprint authentication device by adopting the voiceprint real-time authentication encryption method of any one of claims 1 to 5;
analyzing and extracting the received audio information in a sound data stream, separating the voiceprint information and the audio after the audio is analyzed, and executing instruction operation according to the audio.
9. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method for real-time authenticated encryption of voiceprints according to claim 8.
10. A controlled device, comprising: one or more processors, a memory, and one or more computer programs, the processors and the memory being connected by a bus, wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors, characterized in that the steps of the method of voiceprint real-time authenticated encryption according to claim 8 are implemented when the computer programs are executed by the processors.
CN202110821062.9A 2021-07-20 2021-07-20 Voiceprint real-time authentication encryption method, voiceprint authentication equipment and controlled equipment Active CN113612738B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110821062.9A CN113612738B (en) 2021-07-20 2021-07-20 Voiceprint real-time authentication encryption method, voiceprint authentication equipment and controlled equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110821062.9A CN113612738B (en) 2021-07-20 2021-07-20 Voiceprint real-time authentication encryption method, voiceprint authentication equipment and controlled equipment

Publications (2)

Publication Number Publication Date
CN113612738A true CN113612738A (en) 2021-11-05
CN113612738B CN113612738B (en) 2023-05-16

Family

ID=78304882

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110821062.9A Active CN113612738B (en) 2021-07-20 2021-07-20 Voiceprint real-time authentication encryption method, voiceprint authentication equipment and controlled equipment

Country Status (1)

Country Link
CN (1) CN113612738B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117354797A (en) * 2023-12-04 2024-01-05 深圳市华粤世通软件科技有限公司 A mobile communication system and terminal based on information encryption

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1547191A (en) * 2003-12-12 2004-11-17 北京大学 Speaker Identification System Combining Semantic and Voiceprint Information
US20060287863A1 (en) * 2005-06-16 2006-12-21 International Business Machines Corporation Speaker identification and voice verification for voice applications
CN102073829A (en) * 2011-01-10 2011-05-25 杭州电子科技大学 Document encrypting method and document decrypting method on basis of voice print
CN103093761A (en) * 2011-11-01 2013-05-08 腾讯科技(深圳)有限公司 Audio fingerprint retrieval method and retrieval device
CN103824353A (en) * 2012-11-19 2014-05-28 五甲(大连)计算机系统研发有限公司 Door key system using cell phone as voiceprint encrypted recognition terminal
CN105390143A (en) * 2015-08-27 2016-03-09 中国航空工业集团公司西安飞行自动控制研究所 Voiceprint recognition-based intelligent program control method
CN109887509A (en) * 2019-01-25 2019-06-14 广州富港万嘉智能科技有限公司 A kind of control method of ordering, electronic equipment and storage medium based on vocal print
CN110084014A (en) * 2019-03-21 2019-08-02 深圳壹账通智能科技有限公司 Data inputting method, device, computer equipment and storage medium
CN110574103A (en) * 2018-06-29 2019-12-13 华为技术有限公司 A voice control method, wearable device and terminal
CN110677260A (en) * 2019-09-29 2020-01-10 京东方科技集团股份有限公司 An authentication method, device, electronic device and storage medium
CA3129358A1 (en) * 2019-02-22 2020-08-27 Banks And Acquirers International Holding Method for managing the access of a user to a voice service, corresponding device, system and programs
CN111785285A (en) * 2020-05-22 2020-10-16 南京邮电大学 Voiceprint recognition method for home multi-feature parameter fusion

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1547191A (en) * 2003-12-12 2004-11-17 北京大学 Speaker Identification System Combining Semantic and Voiceprint Information
US20060287863A1 (en) * 2005-06-16 2006-12-21 International Business Machines Corporation Speaker identification and voice verification for voice applications
CN102073829A (en) * 2011-01-10 2011-05-25 杭州电子科技大学 Document encrypting method and document decrypting method on basis of voice print
CN103093761A (en) * 2011-11-01 2013-05-08 腾讯科技(深圳)有限公司 Audio fingerprint retrieval method and retrieval device
CN103824353A (en) * 2012-11-19 2014-05-28 五甲(大连)计算机系统研发有限公司 Door key system using cell phone as voiceprint encrypted recognition terminal
CN105390143A (en) * 2015-08-27 2016-03-09 中国航空工业集团公司西安飞行自动控制研究所 Voiceprint recognition-based intelligent program control method
CN110574103A (en) * 2018-06-29 2019-12-13 华为技术有限公司 A voice control method, wearable device and terminal
CN109887509A (en) * 2019-01-25 2019-06-14 广州富港万嘉智能科技有限公司 A kind of control method of ordering, electronic equipment and storage medium based on vocal print
CA3129358A1 (en) * 2019-02-22 2020-08-27 Banks And Acquirers International Holding Method for managing the access of a user to a voice service, corresponding device, system and programs
CN110084014A (en) * 2019-03-21 2019-08-02 深圳壹账通智能科技有限公司 Data inputting method, device, computer equipment and storage medium
CN110677260A (en) * 2019-09-29 2020-01-10 京东方科技集团股份有限公司 An authentication method, device, electronic device and storage medium
CN111785285A (en) * 2020-05-22 2020-10-16 南京邮电大学 Voiceprint recognition method for home multi-feature parameter fusion

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ZHANGTING YU、DAJIAN LI、LIANGYUAN CHEN、HAIJUN YAN: ""The research on transformer fault diagnosis method based on vibration and noise voiceprint imaging technology"", 《2019 14TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA)》 *
张重远、罗世豪、岳浩天、王博闻、刘云鹏: ""基于Mel时频谱-卷积神经网络的变压器铁芯声纹模式识别方法"", 《高电压技术》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117354797A (en) * 2023-12-04 2024-01-05 深圳市华粤世通软件科技有限公司 A mobile communication system and terminal based on information encryption

Also Published As

Publication number Publication date
CN113612738B (en) 2023-05-16

Similar Documents

Publication Publication Date Title
US20190013026A1 (en) System and method for efficient liveness detection
US11038907B2 (en) System and method for malware detection learning
CN109450850B (en) Identity authentication method, identity authentication device, computer equipment and storage medium
CN106778179B (en) An identity authentication method based on ultrasonic lip recognition
CN105933272A (en) Voiceprint recognition method capable of preventing recording attack, server, terminal, and system
JP2016511475A (en) Method and system for distinguishing humans from machines
CN105702263A (en) Voice playback detection method and device
CN108319829B (en) Voiceprint verification method and device
US20220358934A1 (en) Spoofing detection apparatus, spoofing detection method, and computer-readable storage medium
CN102377729A (en) User registration and logon method by combining speaker speech identity authentication and account code protection in network games
CN113612738B (en) Voiceprint real-time authentication encryption method, voiceprint authentication equipment and controlled equipment
WO2023172936A1 (en) Systems and apparatus for multifactor authentication using bone conduction and audio signals
Alegre et al. Evasion and obfuscation in automatic speaker verification
Mubeen et al. Detection of impostor and tampered segments in audio by using an intelligent system
EP4047496B1 (en) Processing input data
CN118841023B (en) Audio optimization method, system and equipment based on artificial intelligence
CN115314268A (en) Malicious encrypted traffic detection method and system based on traffic fingerprints and behaviors
Beekhof et al. Content authentication and identification under informed attacks
CN115346532A (en) Optimization method, terminal equipment and storage medium of voiceprint recognition system
Wu et al. HVAC: Evading Classifier-based Defenses in Hidden Voice Attacks
KR20010019772A (en) User Password Verification System and Method by Speech for Reinforced Security
KR102506123B1 (en) Deep Learning-based Key Generation Mechanism using Sensing Data collected from IoT Devices
Das et al. Comparison of DTW score and warping path for text dependent speaker verification system
CN119182533B (en) Security management method and system based on communication networking
CN120600034A (en) Sound recognition processing method and device for smart power applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载