CN113053397A - Recording attack prevention identity authentication method, device and system - Google Patents
Recording attack prevention identity authentication method, device and system Download PDFInfo
- Publication number
- CN113053397A CN113053397A CN202110238179.4A CN202110238179A CN113053397A CN 113053397 A CN113053397 A CN 113053397A CN 202110238179 A CN202110238179 A CN 202110238179A CN 113053397 A CN113053397 A CN 113053397A
- Authority
- CN
- China
- Prior art keywords
- audio signal
- low
- frequency
- signal
- frequency signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/02—Preprocessing operations, e.g. segment selection; Pattern representation or modelling, e.g. based on linear discriminant analysis [LDA] or principal components; Feature selection or extraction
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/06—Decision making techniques; Pattern matching strategies
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/22—Interactive procedures; Man-machine interfaces
- G10L17/24—Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L21/00—Speech or voice signal processing techniques to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
- G10L21/02—Speech enhancement, e.g. noise reduction or echo cancellation
- G10L21/0208—Noise filtering
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L25/00—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00
- G10L25/48—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use
- G10L25/51—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use for comparison or discrimination
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L21/00—Speech or voice signal processing techniques to produce another audible or non-audible signal, e.g. visual or tactile, in order to modify its quality or its intelligibility
- G10L21/02—Speech enhancement, e.g. noise reduction or echo cancellation
- G10L21/0208—Noise filtering
- G10L2021/02082—Noise filtering the noise being echo, reverberation of the speech
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computational Linguistics (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Computer Networks & Wireless Communication (AREA)
- Game Theory and Decision Science (AREA)
- Business, Economics & Management (AREA)
- Quality & Reliability (AREA)
- Telephone Function (AREA)
Abstract
The invention relates to the field of voiceprint recognition, in particular to a method, a device and a system for identity authentication for preventing recording attack, which comprise the following steps: acquiring an audio signal of a password access text of a user to be verified; carrying out low-frequency signal detection on the audio signal; judging whether the audio signal contains a low-frequency signal with a preset frequency, if so, judging that the audio signal is recorded and replayed, and verifying that the audio signal does not pass; if the audio signal does not contain the low-frequency signal with the preset frequency, judging that the audio signal is not recorded and replayed, and performing conventional authentication; and when the audio signal of the password text of the user to be verified is obtained, playing a low-frequency signal with a preset frequency. The invention integrates the low-frequency encryption sound wave technology into the identity authentication to enhance the anti-recording attack technology, effectively improves the reliability of the voiceprint identity authentication method, and has concealment, convenience and low cost.
Description
Technical Field
The invention belongs to the field of voiceprint recognition, and particularly relates to a method, a device and a system for identity authentication for preventing recording attack.
Background
Speaker recognition is one of biological recognition technologies, has the characteristics of simplicity, high efficiency and convenience, and has the main principle that the identity of a speaker can be automatically judged through a computer and a signal processing technology on the basis that voice information contains information capable of representing the characteristics of the speaker. In recent years, with the rapid development of information technology, voice signals are used as a non-contact identity information carrier, people can collect voice information from the ground through various mobile terminal devices at any time, the voice information is rapidly transmitted to a background server through a mobile network which widely exists nowadays, and convenient and fast identity authentication is realized through operation.
In the prior art, fig. 1 is a block diagram of a conventional speaker recognition system. FIG. 2 is a flow chart of a playback attack speaker authentication system in which (one) password text is read for a user and the system determines if the user is the principal. And (II) recording the password text for authenticating the user in the authentication process. And (III) the attacker takes the audio segment which is recorded in the graph II and contains secret password to attack the speaker authentication system.
The speaker recognition technology is widely applied to various identity authentication scenes, but in some scenes, risk factors exist: the voice of the speaker is easy to be recorded, and then the voice recording attack authentication system is used to be recorded and replayed in a financial payment scene and an entrance guard authentication scene, so that the important risk problem exists.
Disclosure of Invention
In order to solve the problem of serious risk of an authentication system in the prior art, the embodiment of the invention provides the following technical scheme:
in a first aspect, a method for identity authentication for preventing voice recording attack, includes:
sending a password text to a user to be verified;
acquiring an audio signal of the password text read by a user to be verified;
judging whether the audio signal contains a low-frequency signal with a preset frequency, if so, judging that the audio signal is recorded and replayed, and verifying that the audio signal does not pass;
if the audio signal does not contain the low-frequency signal with the preset frequency, judging that the audio signal is not recorded or replayed, and performing conventional authentication;
and when waiting to acquire the audio signal of the password text read by the user to be verified, playing a low-frequency signal with a preset frequency.
Further, the low-frequency signal detection of the audio signal includes:
carrying out feature extraction on the audio signal to obtain a feature extraction result;
and according to the feature extraction result, carrying out low-frequency signal detection on the feature extraction result.
Further, if the audio signal does not include the low-frequency signal with the preset frequency, it is determined that the audio signal is not a playback sound, and a normal authentication is performed, where the normal authentication includes:
judging whether the audio signal is a speaker to obtain a judgment result;
if the judgment result is the speaker, the authentication is passed;
and if the judgment result is that the speaker is not the speaker, refusing to pass the authentication.
Further, the determining whether the audio signal is a speaker to obtain a determination result includes:
comparing the audio signal with the registered voice, and scoring the spoken audio signal according to a preset threshold value to obtain a scoring result;
if the scoring result is higher than a preset threshold value, judging that the audio signal is a speaker;
and if the scoring result is lower than a preset threshold value, judging that the audio signal is a non-speaker.
Further, the audio signal includes time information and position information.
In a second aspect, an identity authentication apparatus for preventing a voice recording attack includes:
the sending module is used for sending the password text to the user to be verified;
the obtaining module is used for obtaining an audio signal of the password text read by a user to be verified;
the encrypted low-frequency signal detection module is used for detecting the low-frequency signal of the audio signal;
the judging module is used for judging whether the audio signal contains an encrypted low-frequency signal or not, if the audio signal contains the encrypted low-frequency signal, the audio signal is judged to be recorded and replayed, and the verification is not passed;
if the audio signal does not contain the encrypted low-frequency sound wave, judging that the audio signal is not recorded and replayed, and performing conventional authentication;
the low-frequency signal playing module is used for playing a low-frequency signal with a preset frequency when the audio signal of the password access text of the user to be verified is obtained;
and the echo cancellation module is used for canceling the low-frequency signal played by the current low-frequency signal playing module.
In a third aspect, a voice recording attack prevention identity authentication system comprises a voice recording attack prevention identity authentication device.
The embodiment of the invention provides a method, a device and a system for identity authentication for preventing recording attack, which comprise the following steps: acquiring an audio signal of a password access text of a user to be verified; carrying out low-frequency signal detection on the audio signal; judging whether the audio signal contains a low-frequency signal with a preset frequency, if so, judging that the audio signal is recorded and replayed, and verifying that the audio signal does not pass; if the audio signal does not contain the low-frequency signal with the preset frequency, judging that the audio signal is not recorded and replayed, and performing conventional authentication; and when the audio signal of the password text of the user to be verified is obtained, playing a low-frequency signal with a preset frequency. The invention integrates the low-frequency encryption sound wave technology into the identity authentication to enhance the anti-recording attack technology, effectively improves the reliability of the voiceprint identity authentication method, and has concealment, convenience and low cost.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a block diagram of a conventional speaker recognition system.
Fig. 2 is a flow diagram of a playback attack speaker authentication system.
Fig. 3 is a flowchart of the identity authentication method for preventing the record attack according to the embodiment of the present invention.
Fig. 4 is a structural diagram of an identity authentication device for preventing a recording attack in an embodiment of the present invention.
Reference numerals:
1-a sending module; 2-an acquisition module; 3-encrypting the low-frequency signal detection module; 4-a judging module; 5-a low frequency signal playing module; 6-echo cancellation module.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be described in detail below. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without any inventive step, are within the scope of the present invention.
As shown in fig. 3, a step diagram of an identity authentication method for preventing a recording attack in an embodiment of the present invention is shown, including:
step S11, sending password text to the user to be verified;
step S12, acquiring an audio signal of a password text read by a user to be verified;
step S13, low-frequency signal detection is carried out on the audio signal;
step S14, determining whether the audio signal includes a low frequency signal with a predetermined frequency,
step S15, if the audio signal contains a low-frequency signal with a preset frequency, the audio signal is judged to be recorded and replayed, and the verification is not passed;
step S16, if the audio signal does not contain the low-frequency signal with the preset frequency, judging that the audio signal is not the recording playback, and performing conventional authentication;
and when waiting to acquire the audio signal of the password text read by the user to be verified, playing a low-frequency signal with a preset frequency.
It should be noted that, since the range of the sound frequency perceived by the human ear is approximately in the range of 500-4000Hz, that is, above or below this frequency range, the human ear cannot easily perceive the sound wave, and if the sound wave below this frequency range is played, the sound wave is hidden because it exceeds the range of the human ear.
Therefore, the low-frequency signal of preset frequency is played in the application, so that the human ears cannot perceive the low-frequency signal.
It can be understood that the identity authentication method for preventing the record attack provided by the embodiment of the invention comprises the following steps: acquiring an audio signal of a password access text of a user to be verified; carrying out low-frequency signal detection on the audio signal; judging whether the audio signal contains a low-frequency signal with a preset frequency, if so, judging that the audio signal is recorded and replayed, and verifying that the audio signal does not pass; if the audio signal does not contain the low-frequency signal with the preset frequency, judging that the audio signal is not recorded and replayed, and performing conventional authentication; and when the audio signal of the password text of the user to be verified is obtained, playing a low-frequency signal with a preset frequency. The invention integrates the low-frequency encryption sound wave technology into the identity authentication to enhance the anti-recording attack technology, effectively improves the reliability of the voiceprint identity authentication method, and has concealment, convenience and low cost.
As a further improvement of the above method, in some embodiments,
low frequency signal detection of an audio signal, comprising:
carrying out feature extraction on the audio signal to obtain a feature extraction result;
and according to the feature extraction result, carrying out low-frequency signal detection on the feature extraction result.
In one embodiment, if the audio signal does not include a low-frequency signal with a preset frequency, it is determined that the audio signal is not a playback sound, and performing a normal authentication, where the normal authentication includes:
judging whether the audio signal is a speaker to obtain a judgment result;
if the judgment result is that the speaker is the speaker, the authentication is passed;
if the judgment result is that the speaker is not the speaker, the authentication is refused to pass.
In some embodiments, determining whether the audio signal is a speaker and obtaining the determination result includes:
comparing the audio signal with the registered voice, and scoring the spoken audio signal according to a preset threshold value to obtain a scoring result;
if the scoring result is higher than a preset threshold value, judging that the audio signal is a speaker;
and if the scoring result is lower than a preset threshold value, judging that the audio signal is a non-speaker.
It should be noted that the speaker identification means to confirm the identity of the speaker by using known audio and voice information. The method mainly comprises speaker confirmation and speaker identification:
speaker identification (Automatic speaker identification): confirming whether a student A speaks from a group of people;
speaker verification (Automatic speaker verification): it was confirmed whether or not the word was a student.
Speaker recognition, commonly known as "voiceprint recognition," is one of biometric technologies, and is mainly used in authentication scenarios because of uniqueness and stability of these biometrics, like fingerprint recognition and iris recognition. For example, after the public security organization extracts the recording clues of the telecommunication fraud case, the voiceprint recognition technology can be used for judging whether the person is a fleeing person or a rescissing person; the unlocking can be verified by using the voiceprint recognition technology on the smart phone as well as the fingerprint.
In some embodiments, the audio signal includes time information and location information.
The system also comprises a step of analyzing time information and position information in the audio to enhance the technology of preventing the record attack, thereby effectively improving the reliability of the voiceprint identity authentication method.
As shown in fig. 4, a structure diagram of an identity authentication device for preventing record attack in an embodiment of the present invention includes:
the sending module 1 is used for sending a password text to a user to be verified;
the acquisition module 2 is used for acquiring an audio signal of a password text read by a user to be verified;
the encrypted low-frequency signal detection module 3 is used for detecting the low-frequency signal of the audio signal;
the judging module 4 is used for judging whether the audio signal contains the encrypted low-frequency signal, if the audio signal contains the encrypted low-frequency signal, the audio signal is judged to be recorded and replayed, and the verification is not passed;
if the audio signal does not contain the encrypted low-frequency sound wave, judging that the audio signal is not recorded and replayed, and performing conventional authentication;
the low-frequency signal playing module 5 is used for playing a low-frequency signal with a preset frequency when the audio signal of the password access text of the user to be verified is obtained;
and the echo cancellation module 6 is used for canceling the low-frequency signal played by the current low-frequency signal playing module.
It can be understood that, in the present invention, the low frequency signal playing module is separately installed on the application device, and the low frequency signal playing module continuously plays the low frequency signal with the preset frequency in the using process. After a password is read by a user and an audio signal is input into the system, a low-frequency sound wave detection process is carried out, if the input audio signal is detected to have a low-frequency signal with past preset frequency, recording and replaying are judged, if the input audio signal is not detected, a conventional authentication process is carried out, and whether the input audio signal is a speaker or not is judged.
When the user inputs audio, the device plays low-frequency sound waves, and the sound waves are prevented from being recognized as recording by the system by mistake. Therefore, the echo cancellation module is additionally arranged and is a hardware module, and the echo cancellation module can offset low-frequency sound waves emitted by the system, so that system misjudgment is effectively avoided.
Compared with the conventional identity authentication process, the identity authentication device for preventing the record attack is additionally provided with three modules, one module is a low-frequency signal playing module, the other module is an encrypted low-frequency signal detecting module, and the echo eliminating module is used for eliminating the currently played confidential signal, and the low-frequency signal detecting module only detects the historical encrypted signal and ignores the influence of the currently played encrypted signal on the system. If the audio is detected to have historical encrypted low-frequency signals, the audio is considered to be recorded and replayed, and the authentication failure is directly judged.
The invention also provides an identity authentication system for preventing the record attack, which comprises an identity authentication device for preventing the record attack.
The invention provides a recording attack prevention identity authentication system, which is different from the traditional identity authentication method in that a low-frequency encryption sound wave watermark-based recording attack prevention identity authentication method is adopted, and the low-frequency encryption sound wave technology is integrated into identity authentication to enhance the recording attack prevention technology, so that the reliability of the voiceprint identity authentication method is effectively improved, and the voiceprint identity authentication system has the advantages of concealment, convenience and low cost.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present application, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware that is related to instructions of a program, and the program may be stored in a computer-readable storage medium, and when executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.
Claims (7)
1. A recording attack prevention identity authentication method is characterized by comprising the following steps:
sending a password text to a user to be verified;
acquiring an audio signal of the password text read by a user to be verified;
carrying out low-frequency signal detection on the audio signal;
judging whether the audio signal contains a low-frequency signal with a preset frequency, if so, judging that the audio signal is recorded and replayed, and verifying that the audio signal does not pass;
if the audio signal does not contain the low-frequency signal with the preset frequency, judging that the audio signal is not recorded or replayed, and performing conventional authentication;
and when waiting to acquire the audio signal of the password text read by the user to be verified, playing a low-frequency signal with a preset frequency.
2. The method of claim 1, wherein the low frequency signal detection of the audio signal comprises:
carrying out feature extraction on the audio signal to obtain a feature extraction result;
and according to the feature extraction result, carrying out low-frequency signal detection on the feature extraction result.
3. The method of claim 1, wherein if the audio signal does not include a low-frequency signal of the preset frequency, determining that the audio signal is not a playback sound, and performing a normal authentication, wherein the normal authentication includes:
judging whether the audio signal is a speaker to obtain a judgment result;
if the judgment result is the speaker, the authentication is passed;
and if the judgment result is that the speaker is not the speaker, refusing to pass the authentication.
4. The method of claim 3, wherein said determining whether the audio signal is a speaker, obtaining a determination result, comprises:
comparing the audio signal with the registered voice, and scoring the audio signal according to a preset threshold value to obtain a scoring result;
if the scoring result is higher than a preset threshold value, judging that the audio signal is a speaker;
and if the scoring result is lower than a preset threshold value, judging that the audio signal is a non-speaker.
5. The method of claim 1, wherein the audio signal comprises time information and location information.
6. An identity authentication device for preventing record attack, comprising:
the sending module is used for sending the password text to the user to be verified;
the obtaining module is used for obtaining an audio signal of the password text read by a user to be verified;
the encrypted low-frequency signal detection module is used for detecting the low-frequency signal of the audio signal;
the judging module is used for judging whether the audio signal contains an encrypted low-frequency signal or not, if the audio signal contains the encrypted low-frequency signal, the audio signal is judged to be recorded and replayed, and the verification is not passed;
if the audio signal does not contain the encrypted low-frequency sound wave, judging that the audio signal is not recorded and replayed, and performing conventional authentication;
the low-frequency signal playing module is used for playing a low-frequency signal with a preset frequency when the audio signal of the password access text of the user to be verified is obtained;
and the echo cancellation module is used for canceling the low-frequency signal played by the current low-frequency signal playing module.
7. An anti-voice attack identity authentication system, comprising the anti-voice attack identity authentication device of claim 6.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202110238179.4A CN113053397A (en) | 2021-03-04 | 2021-03-04 | Recording attack prevention identity authentication method, device and system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202110238179.4A CN113053397A (en) | 2021-03-04 | 2021-03-04 | Recording attack prevention identity authentication method, device and system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN113053397A true CN113053397A (en) | 2021-06-29 |
Family
ID=76509793
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202110238179.4A Pending CN113053397A (en) | 2021-03-04 | 2021-03-04 | Recording attack prevention identity authentication method, device and system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN113053397A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114842882A (en) * | 2022-01-11 | 2022-08-02 | 恒安嘉新(北京)科技股份公司 | Audio and video detection method and device, electronic equipment and storage medium |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB201514943D0 (en) * | 2015-08-21 | 2015-10-07 | Validsoft Uk Ltd | Replay attack detection |
| CN106961418A (en) * | 2017-02-08 | 2017-07-18 | 北京捷通华声科技股份有限公司 | Identity identifying method and identity authorization system |
| CN108039176A (en) * | 2018-01-11 | 2018-05-15 | 广州势必可赢网络科技有限公司 | Voiceprint authentication method and device for preventing recording attack and access control system |
| US10079024B1 (en) * | 2016-08-19 | 2018-09-18 | Amazon Technologies, Inc. | Detecting replay attacks in voice-based authentication |
| CN109754812A (en) * | 2019-01-30 | 2019-05-14 | 华南理工大学 | A kind of voiceprint authentication method of the anti-recording attack detecting based on convolutional neural networks |
| CN110047184A (en) * | 2019-04-24 | 2019-07-23 | 厦门快商通信息咨询有限公司 | A kind of auth method and access control system of anti-recording attack |
| CN110459226A (en) * | 2019-08-19 | 2019-11-15 | 效生软件科技(上海)有限公司 | A method of voice is detected by vocal print engine or machine sound carries out identity veritification |
| CN111739561A (en) * | 2020-05-21 | 2020-10-02 | 浙江大学 | A living body detection method based on ultrasonic speech replay attack |
-
2021
- 2021-03-04 CN CN202110238179.4A patent/CN113053397A/en active Pending
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB201514943D0 (en) * | 2015-08-21 | 2015-10-07 | Validsoft Uk Ltd | Replay attack detection |
| US10079024B1 (en) * | 2016-08-19 | 2018-09-18 | Amazon Technologies, Inc. | Detecting replay attacks in voice-based authentication |
| CN106961418A (en) * | 2017-02-08 | 2017-07-18 | 北京捷通华声科技股份有限公司 | Identity identifying method and identity authorization system |
| CN108039176A (en) * | 2018-01-11 | 2018-05-15 | 广州势必可赢网络科技有限公司 | Voiceprint authentication method and device for preventing recording attack and access control system |
| CN109754812A (en) * | 2019-01-30 | 2019-05-14 | 华南理工大学 | A kind of voiceprint authentication method of the anti-recording attack detecting based on convolutional neural networks |
| CN110047184A (en) * | 2019-04-24 | 2019-07-23 | 厦门快商通信息咨询有限公司 | A kind of auth method and access control system of anti-recording attack |
| CN110459226A (en) * | 2019-08-19 | 2019-11-15 | 效生软件科技(上海)有限公司 | A method of voice is detected by vocal print engine or machine sound carries out identity veritification |
| CN111739561A (en) * | 2020-05-21 | 2020-10-02 | 浙江大学 | A living body detection method based on ultrasonic speech replay attack |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114842882A (en) * | 2022-01-11 | 2022-08-02 | 恒安嘉新(北京)科技股份公司 | Audio and video detection method and device, electronic equipment and storage medium |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11011178B2 (en) | Detecting replay attacks in voice-based authentication | |
| US10135818B2 (en) | User biological feature authentication method and system | |
| US8396711B2 (en) | Voice authentication system and method | |
| US20180146370A1 (en) | Method and apparatus for secured authentication using voice biometrics and watermarking | |
| Gałka et al. | Playback attack detection for text-dependent speaker verification over telephone channels | |
| US20080270132A1 (en) | Method and system to improve speaker verification accuracy by detecting repeat imposters | |
| CN106778179B (en) | An identity authentication method based on ultrasonic lip recognition | |
| WO2019010054A1 (en) | System and method for efficient liveness detection | |
| CN102142254A (en) | Voiceprint identification and voice identification-based recording and faking resistant identity confirmation method | |
| US7949535B2 (en) | User authentication system, fraudulent user determination method and computer program product | |
| Gong et al. | Protecting voice controlled systems using sound source identification based on acoustic cues | |
| EP3740949A1 (en) | Authenticating a user | |
| US9767266B2 (en) | Methods and systems for biometric-based user authentication by voice | |
| CN103678977A (en) | Method for protecting information security and electronic device thereof | |
| WO2008015956A1 (en) | Portable personal authentication method and electronic business transaction method | |
| CN108417216A (en) | Speech verification method, apparatus, computer equipment and storage medium | |
| CN103078828A (en) | Cloud-model voice authentication system | |
| Chang et al. | My voiceprint is my authenticator: A two-layer authentication approach using voiceprint for voice assistants | |
| CN113053397A (en) | Recording attack prevention identity authentication method, device and system | |
| CN112151038B (en) | Voice replay attack detection method, device, readable storage medium and electronic equipment | |
| US20190267009A1 (en) | Detection of a malicious attack | |
| CN108985035B (en) | Control method, device, storage medium and electronic device for user operation authority | |
| BR102014023647A2 (en) | method and system for fraud detection in voice processing based applications | |
| US20220122627A1 (en) | Voice replay attack detection method, medium, and device | |
| JP4239512B2 (en) | Personal identification device, personal identification method, information processing device, information processing method, information recording medium, identification method for user of information recording medium, personal identification system, program recording medium, and program |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210629 |