1. Technical Field
The present disclosure relates to identity authentication systems and methods and, particularly, to an identity authentication system which executes double identity authentication and a method thereof.
2. Description of Related Art
Speech recognition systems are widely used in identity authentication. In such a identity authentication system, it generally determines whether features extracted from input voice signals matches voice models stored in the system. However, others may easily intercept voice signals of authorized users, which may result in unauthorized use of the voice signals, and thus the identity authentication system may be fooled by illegitimate use of the voice signals. Furthermore, in the identity authentication system, a user terminal generally serves as an input unit to receive the voice of the user, and the authenticating work is all done by an information server, which may get overloaded. Therefore, it is desirable to have a new identity authentication system and method to overcome the above shortcomings.
The components of the drawings are not necessarily drawn to scale, the emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Moreover, in the drawings, like reference numerals designate corresponding parts throughout several views.
The embodiments of the present disclosure are now described in detail, with reference to the accompanying drawings.
Referring to
The information server 10 further includes a first processor 12. The first processor 12 includes an information receiving module 121 and a determining module 122. The information receiving module 121 receives a first voice model from the terminal 20. The determining module 122 determines whether the received first voice model matches one of the at least one second voice models stored in the database 11, and transmits a verification result of the first voice model to the terminal 20. If the first voice model matches one of the at least one second voice models, the determining module 122 transmits a successful verification result of the first voice model to the terminal 20. If the first voice model does not match any one of the at least one second voice models, the determining module 122 transmits an unsuccessful verification result of the first voice model to the terminal 20.
The terminal 20 includes a voice input unit 21 and a second processor 22. The voice input unit 21 is to receive voice signals of the user. In the embodiment, the voice input unit 21 is a microphone.
The second processor 22 includes an information obtaining module 221, a prompting module 222, a voice receiving module 223, an extracting module 224, and an identifying module 225. The information obtaining module 221 obtains the first voice model from the external storage device 30 when determining that the external storage device 30 is inserted into the terminal 20. The prompting module 222 generates a prompt to prompt a user to input voice signals. In the embodiment, the terminal 20 further includes a display unit 23. The prompting module 222 displays a prompt interface on the display unit 23 to prompt a user to input voice signals. The voice receiving module 223 receives the input voice signals from the voice input unit 21. The extracting module 224 extracts voice features from the input voice signals. The identifying module 225 determines whether the extracted voice features matches the obtained first voice model, and determines if the verification result of the input voice signals is successful if the extracted voice feature matches the obtained first voice model. The identifying module 225 further determines that an identity authentication of the user is successful when the verification result of the first voice model and the verification result of the input voice are both successful.
In a first embodiment, a process of the identity authentication of the user is described as follows. First, the information obtaining module 221 transmits the obtained first voice model to the information server 10 once the information obtaining module 224 obtains the first voice model from the external storage device 30, and the determining module 122 determines whether the obtained first voice model matches one of the second voice models stored in the database 11. When the obtained first voice model matches one of the second voice models, the determining module 122 transmits the successful verification result to the terminal 20. Second, the prompting module 222 generates a prompt to prompt the user to input voice signals upon receiving a successful verification result of the first voice model from the information server 10. Third, the voice receiving module 223 receives voice signals and the extracting module 224 extracts voice features from the input voice signals. Fourth, the identifying module 225 determines that the verification result of the input voice signal is successful when the extracted voice features matches the first voice model, and further determines that the identity authentication is successful when the verification result of the input voice signals is successful.
In a second embodiment, a process of the identity authentication of the user is described as follows. First, the prompting module 222 generates a prompt to prompt the user to input voice signals once determining that the external storage device 30 is inserted into the terminal 20. Second, the voice receiving module 223 receives the voice signals and the extracting module 224 extracts the voice features from the input voice signals. Third, the identifying module 225 determines that the verification result of the input voice signal is successful when the extracted voice features matches the obtained first voice model, and transmits the obtained first voice model to the information server 10 when the verification result of the input voice signals is successful. Fourth, the information server 10 determines whether the obtained first voice model matches one of the second voice models stored in the database 11, and transmits the verification result of the first voice model to the terminal 20. Fifth, the identifying module 225 determines that the identity authentication is successful upon receiving a successful verification of the first voice model.
In a third embodiment, a process of the identity authentication steps of the user is described as follow. First, the information obtaining module 221 transmits the obtained first voice model to the information server 10 once the information obtaining module 221 obtains the first voice model. The prompting module 222 simultaneously generates a prompt to prompt the user to input a voice signal when the information obtaining module 221 determines that the external storage device 30 is inserted into the terminal 10. Second, the identifying module 225 determines that the identity authentication is successful when the verification result of the first voice model and the verification result of the input voice signals are both successful.
In this way, the identity authentication uses double authentication, namely, the identity authentication is successful not only when the verification result of the input voice signals is successful, but also when the verification result of the first voice model is successful, which prevents an illegal user from using an unregistered voice model stored in the external storage device 30 or unregistered voice signals.
Referring to
In step S301, the information obtaining module 221 obtains a first voice model from the external storage device 30 and transmits the obtained first voice model to the information server 10 when determining that the external storage device 30 is inserted into the terminal 20.
In step S302, the information receiving module 121 receives the first voice model transmitted by the terminal 20.
In step S303, the determining module 122 determines whether the received first voice model matches one of the at least second voice model stored in the database 11 and transmits a verification result of the first voice model to the terminal 20. If there is a match, the determining module 122 transmits a successful verification result of the first voice model to the terminal. If there is no match, the determining module 122 transmits an unsuccessful verification result of the first voice model to the terminal.
In step S304, the prompting module 222 generates a prompt to prompt the user to input voice signals upon receiving a successful verification of the first voice model. When receiving an unsuccessful verification of the first voice model, the procedure stops in step S304.
In step S305, the voice receiving module 223 receives user voice signals input through the voice input unit 22.
In step S306, the extracting module 224 extracts voice features from the received user voice signals.
In step S307, the identifying module 225 determines whether the extracted voice features matches the obtained first voice model. If there is a match, the procedure goes to step S308. If there is no match, the procedure stops in step S307.
In step S308, the identifying module 225 determines that the verification result of the input voice signals is successful, and further determines that the identity authentication is successful.
The difference between the method applied on the system as described in the second embodiment and the method applied on the system as described in the first embodiment is described as follow. The information obtaining module 221 obtains first voice model from the external storage device 30 when determining that the external storage device 30 is inserted into the terminal 20. The prompting module 222 simultaneously generates a prompt to prompt the user to input voice signals. The identifying module 225 transmits the obtained first voice model to the information server 10 when determining that the verification result of the input voice signals is success. The information server 10 determines whether the obtained first voice model matches one of the second voice models stored in the database 11, and transmits the verification result of the first voice model to the terminal 20. The identifying module 225 determines that the identity authentication is successful upon receiving a successful verification of the first voice model.
The difference between the method applied on the system as described in the third embodiment and the method applied on the system as described in the first embodiment is described as follow. The prompting module 222 generates a prompt to prompt the user to input voice signals when determining that the external storage device 30 is inserted into the terminal 20. The identifying module 225 determines that the identity authentication is successful when the verification result of the input voice signals and the verification result of the first voice model are both successful.
Although the present disclosure has been specifically described on the basis of the exemplary embodiment thereof, the disclosure is not to be construed as being limited thereto. Various changes or modifications may be made to the embodiment without departing from the scope and spirit of the disclosure.
Number | Date | Country | Kind |
---|---|---|---|
100122380 | Jun 2011 | TW | national |