Method and apparatus for generating voiceprint information comprised of reference pieces each used for authentication
First Claim
Patent Images
1. A method for generating voiceprint information, comprising:
- acquiring a plurality of historical voice files generated by a plurality of calls between a first user and one or more second users;
executing filtering processing on the plurality of historical voice files to obtain voice information of the first user, wherein the voice information includes a plurality of pieces of reference voiceprint information of the first user;
executing text recognition processing on the plurality of pieces of reference voiceprint information to obtain text information corresponding to the plurality of pieces of reference voiceprint information; and
storing an identifier of the first user and the plurality of pieces of reference voiceprint information and the corresponding text information;
wherein a randomly selected piece of the reference voiceprint information is sufficient for authenticating the first user.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for generating voiceprint information is provided. The method includes acquiring a historical voice file generated by a call between a first user and a second user; executing text recognition processing on the voice information to obtain text information corresponding to the voice information; and storing the voice information and the corresponding text information as reference voiceprint information of the first user, and storing an identifier of the first user. Furthermore each voiceprint information comprises a plurality of pieces of reference voiceprint information, each of which is sufficient to authenticate a user.
22 Citations
24 Claims
-
1. A method for generating voiceprint information, comprising:
-
acquiring a plurality of historical voice files generated by a plurality of calls between a first user and one or more second users; executing filtering processing on the plurality of historical voice files to obtain voice information of the first user, wherein the voice information includes a plurality of pieces of reference voiceprint information of the first user; executing text recognition processing on the plurality of pieces of reference voiceprint information to obtain text information corresponding to the plurality of pieces of reference voiceprint information; and storing an identifier of the first user and the plurality of pieces of reference voiceprint information and the corresponding text information; wherein a randomly selected piece of the reference voiceprint information is sufficient for authenticating the first user. - View Dependent Claims (2, 3, 4)
-
-
5. A system for generating voiceprint information, comprising:
-
a voice filter configured to acquire a plurality of historical voice files generated by a plurality of calls between a first user and one or more second users and execute filtering processing on the plurality of historical voice files to obtain voice information of the first user, wherein the voice information includes a plurality of pieces of reference voiceprint information of the first user; a text recognizer configured to execute text recognition processing on the plurality of pieces of reference voiceprint information to obtain text information corresponding to the plurality of pieces of reference voiceprint information; and a voiceprint generator configured to store the plurality of pieces of reference voiceprint information and the corresponding text information; wherein a randomly selected piece of the reference voiceprint information is sufficient for authenticating the first user. - View Dependent Claims (6, 7, 8)
-
-
9. An identity authentication method, comprising:
-
acquiring a plurality of historical voice files generated by a call between a first user and one or more second users; filtering processing on the plurality of historical voice files to obtain voice information of the first user wherein the voice information includes a plurality of pieces of reference voiceprint information of the first user; text recognition processing on the plurality of pieces of reference voiceprint information of the first user to obtain text information corresponding to the plurality of pieces of reference voiceprint information of the first user; storing an identifier of the first user and the plurality of pieces of reference voiceprint information and the corresponding text information; acquiring one of the plurality of pieces of reference voiceprint information corresponding to an identifier of a user to be authenticated; outputting text information in the acquired reference voiceprint information, and receiving voice information to be authenticated; comparing voice information in the acquired reference voiceprint information with the voice information to be authenticated; in response to the voice information in the acquired reference voiceprint information matching with the voice information to be authenticated, determining that the authentication of the user succeeds; and in response to the voice information in the acquired reference voiceprint information not matching with the voice information to be authenticated, determining that the authentication of the user fails; wherein a randomly selected piece of the reference voiceprint information is sufficient for authenticating the first user. - View Dependent Claims (10, 11, 12)
-
-
13. An identity authentication system, comprising:
-
a voice filter configured to acquire a plurality of historical voice files generated by a plurality of calls between a first user and one or more second users, and execute filtering processing on the plurality of historical voice files to obtain voice information of the first user, wherein the voice information includes a plurality of pieces of reference voiceprint information of the first user; a text recognizer configured to execute text recognition processing on the plurality of pieces of reference voiceprint information to obtain text information corresponding to the plurality of pieces of reference voiceprint information; a voiceprint generator configured to store the plurality of pieces of reference voiceprint information and the corresponding text information, and store an identifier of the first user; a voiceprint extractor configured to acquire one of the plurality of pieces of reference voiceprint information corresponding to an identifier of a user to be authenticated; a user interface configured to output text information in the acquired reference voiceprint information, and receive voice information to be authenticated; and a voiceprint matcher configured to compare voice information in the acquired reference voiceprint information with the voice information to be authenticated, the voiceprint matcher further configured to determine that the authentication of the user succeeds if the voice information in the acquired reference voiceprint information matches with the voice information to be authenticated, and determine that the authentication of the user fails if the voice information in the acquired reference voiceprint information does not match with the voice information to be authenticated; wherein a randomly selected piece of the reference voiceprint information is sufficient for authenticating the first user. - View Dependent Claims (14, 15, 16)
-
-
17. A non-transitory computer readable medium that stores a set of instructions that is executable by at least one processor of a system to cause the system to perform a method for generating voiceprint information, the method comprising:
-
acquiring a plurality of historical voice files generated by a plurality of calls between a first user and one or more second users; executing filtering processing on the plurality of historical voice files to obtain voice information of the first user, wherein the voice information includes a plurality of pieces of reference voiceprint information of the first user; executing text recognition processing on the plurality of pieces of reference voiceprint information to obtain text information corresponding to the plurality of pieces of reference voiceprint information; and storing an identifier of the first user and the plurality of pieces of reference voiceprint information and the corresponding text information; wherein a randomly selected piece of the reference voiceprint information is sufficient for authenticating the first user. - View Dependent Claims (18, 19, 20)
-
-
21. A non-transitory computer readable medium that stores a set of instructions that is executable by at least one processor of a system to cause the system to perform a method for identity authentication, the method comprising:
-
acquiring a plurality of historical voice files generated by a plurality of calls between a first user and one or more second users; filtering processing on the plurality of historical voice files to obtain voice information of the first user, wherein the voice information includes a plurality of pieces of reference voiceprint information of the first user; text recognition processing on the plurality of pieces of reference voiceprint information of the first user to obtain text information corresponding to the plurality of pieces of reference voiceprint information of the first user; storing an identifier of the first user and the plurality of pieces of reference voiceprint information and the corresponding text information; acquiring one of the plurality of pieces of reference voiceprint information corresponding to an identifier of a user to be authenticated; outputting text information in the acquired reference voiceprint information, and receiving voice information to be authenticated; comparing voice information in the acquired reference voiceprint information with the voice information to be authenticated; in response to the voice information in the acquired reference voiceprint information matching with the voice information to be authenticated, determining that the authentication of the user succeeds; and in response to the voice information in the acquired reference voiceprint information not matching with the voice information to be authenticated, determining that the authentication of the user fails; wherein a randomly selected piece of the reference voiceprint information is sufficient for authenticating the first user. - View Dependent Claims (22, 23, 24)
-
Specification