IDENTITY AUTHENTICATION SYSTEM AND METHOD
First Claim
1. An identity authentication system to be connected to an external storage device storing a first voice model, comprising:
- a terminal comprising;
a voice input unit; and
a first processor comprising;
an information obtaining module to obtain the first voice model from the external storage device when determining that the external storage device is inserted into the terminal;
a voice receiving module to receive voice signals input through the voice input unit;
an extracting module to extract voice features from the received voice signals; and
an identifying module to determine whether the extracted voice features matches the first voice model, and determine that the verification result of the input voice signals is successful when the extracted voice features matches the first voice model; and
an information server comprising;
a database storing at least one second voice model of at least one authorized user; and
a second processor comprising;
an information receiving module to receive the first voice model from the terminal; and
a determining module to determine whether the first voice model matches one of the at least one second voice model, and transmit a verification result of the first voice model to the terminal;
wherein the identifying module further to determine that the identity authentication is successful when the verification result of the input voice signals and the verification result of the first voice model are both successful.
1 Assignment
0 Petitions
Accused Products
Abstract
An identity authentication method is applied on a system. The system is connected to an external storage device storing a first voice model. The system includes an information server and a terminal. The information server includes a database. The information server executes the following steps. First, receiving the first voice model transmitted by the terminal. Second, determining whether the first voice model matches one second voice model, and transmitting the verification result to the terminal. The terminal executes the following steps. First, generating a prompt to prompt the user to input voice signals. Second, receiving the input voice signals. Third, extracting voice features from the input voice signals. Fourth, determining whether the extracted voice features matches the first voice model. Fifth, determining the verification result is successful when matches, and determining the identity authentication is success only when two verification results are both successful. A related system is also provided.
-
Citations
13 Claims
-
1. An identity authentication system to be connected to an external storage device storing a first voice model, comprising:
-
a terminal comprising; a voice input unit; and a first processor comprising; an information obtaining module to obtain the first voice model from the external storage device when determining that the external storage device is inserted into the terminal; a voice receiving module to receive voice signals input through the voice input unit; an extracting module to extract voice features from the received voice signals; and an identifying module to determine whether the extracted voice features matches the first voice model, and determine that the verification result of the input voice signals is successful when the extracted voice features matches the first voice model; and an information server comprising; a database storing at least one second voice model of at least one authorized user; and a second processor comprising; an information receiving module to receive the first voice model from the terminal; and a determining module to determine whether the first voice model matches one of the at least one second voice model, and transmit a verification result of the first voice model to the terminal; wherein the identifying module further to determine that the identity authentication is successful when the verification result of the input voice signals and the verification result of the first voice model are both successful. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An identity authentication method, the identity authentication method for being applied on an identity authentication system, the system being connected to an external storage device storing a first voice model, and comprising an information server and a terminal, the information server comprising a database storing at least one second voice model of the at least one authorized user, the terminal comprising a voice input unit, wherein the method comprising:
-
the information server executing the following steps; receiving the first voice model transmitted by the terminal; determining whether the received first voice model matches one of the at least one second voice model stored in the database, and transmitting a verification result of the first voice model to the terminal; and the terminal executing the following steps; receiving the input voice signals input through the voice input unit; extracting voice features from the input voice signals; determining whether the extracted voice features matches the obtained first voice model; determining that the verification result of the input voice signals is successful when the extracted voice features matches the obtained first voice model; determining that the identity authentication is success when the verification result of the external storage device and the verification result of the input voice are both successful. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
Specification