CN114467283B - Identity authentication method, device, terminal, storage medium and program product - Google Patents

Identity authentication method, device, terminal, storage medium and program product Download PDF

Info

Publication number
CN114467283B
CN114467283B CN202180003552.6A CN202180003552A CN114467283B CN 114467283 B CN114467283 B CN 114467283B CN 202180003552 A CN202180003552 A CN 202180003552A CN 114467283 B CN114467283 B CN 114467283B
Authority
CN
China
Prior art keywords
password
character
identity authentication
background server
voiceprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202180003552.6A
Other languages
Chinese (zh)
Other versions
CN114467283A (en
Inventor
李岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bigo Technology Pte Ltd
Original Assignee
Bigo Technology Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bigo Technology Pte Ltd filed Critical Bigo Technology Pte Ltd
Publication of CN114467283A publication Critical patent/CN114467283A/en
Application granted granted Critical
Publication of CN114467283B publication Critical patent/CN114467283B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/22Interactive procedures; Man-machine interfaces
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/22Interactive procedures; Man-machine interfaces
    • G10L17/24Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Acoustics & Sound (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

An identity authentication method, an identity authentication device, a terminal, a storage medium and a program product belong to the technical field of cloud security. The method comprises the following steps: displaying password conversion prompt information (201) in response to the authentication instruction; voice recognition is carried out on the voice signals collected by the microphone, and an instant password (202) is obtained; voiceprint feature extraction is carried out on the voice signal to obtain voiceprint feature data (203); performing password conversion on the instant password based on a password character conversion mode to obtain an original password (204); identity authentication is performed based on the original password and voiceprint feature data (205). By adopting the method, the device, the terminal, the storage medium and the program product, the user identity authentication flow can be simplified, the user password is ensured not to be revealed in the voice input stage, and the voiceprint verification is protected from being attacked by counterfeit voiceprints.

Description

Identity authentication method, device, terminal, storage medium and program product
Technical Field
The embodiment of the application relates to the technical field of cloud security, in particular to an identity authentication method, an identity authentication device, a terminal, a storage medium and a program product.
Background
The double-factor identity authentication (Two-factor Authentication,2 FA) refers to a method for authenticating the identity of a user by combining Two different types of authentication factors (such as account passwords, short message verification codes, biological characteristics and the like). In the authentication process, the user needs to provide two different authentication factors to prove the identity of the user, and compared with the authentication mode adopting a single factor, the authentication method has the advantages of better protecting the user certificate and accessing the resource.
In the related art, two factor identity authentication generally adopts two of the following three authentication factors: 1. user private information such as user password (password), personal identification code (Personal Identification Number, PIN); 2. user biometric information such as voiceprint features, facial features, fingerprint features, etc.; 3. user personal items such as short message service (Short Message Service, SMS) authentication codes, electronic tokens, etc.
However, the identity authentication method in the related art, whether it is a method based on two biological characteristics, a method based on password and password, or a method based on biological characteristics and private information of the user, requires the user to perform at least two rounds of input authentication operations, such as inputting voiceprints and fingerprints respectively, or inputting fingerprints and passwords respectively, and the authentication operations are complicated and the authentication process is long.
Disclosure of Invention
The embodiment of the application provides an identity authentication method, an identity authentication device, a terminal, a storage medium and a program product. The technical scheme is as follows:
in one aspect, an embodiment of the present application provides an identity authentication method, where the method includes:
responding to the identity verification instruction, displaying password conversion prompt information, wherein the password conversion prompt information is used for prompting the conversion of password characters in an original password, and the password character conversion mode indicated by the password conversion prompt information is randomly generated;
Voice recognition is carried out on the voice signals collected by the microphone, and an instant password is obtained;
extracting voiceprint characteristics of the human voice signals to obtain voiceprint characteristic data;
performing password conversion on the instant password based on the password character conversion mode to obtain the original password;
and carrying out identity authentication based on the original password and the voiceprint feature data.
In another aspect, an embodiment of the present application provides an identity authentication device, including:
the first display module is used for responding to the identity verification instruction and displaying password conversion prompt information, wherein the password conversion prompt information is used for prompting the conversion of password characters in an original password, and the password character conversion mode indicated by the password conversion prompt information is randomly generated;
the voice recognition module is used for carrying out voice recognition on the voice signals acquired by the microphone to obtain an instant password;
the characteristic extraction module is used for extracting voiceprint characteristics of the human voice signals to obtain voiceprint characteristic data;
the password conversion module is used for performing password conversion on the instant password based on the password character conversion mode to obtain the original password;
And the identity authentication module is used for carrying out identity authentication based on the original password and the voiceprint feature data.
In another aspect, an embodiment of the present application provides a terminal, where the terminal includes a processor and a memory; the memory stores at least one instruction, at least one program, a set of codes, or a set of instructions, which are loaded and executed by the processor to implement the authentication method as described in the above aspect.
In another aspect, embodiments of the present application provide a computer readable storage medium having at least one computer program stored therein, the computer program being loaded and executed by a processor to implement the identity authentication method as described in the above aspect.
According to one aspect of the present application, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the terminal reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions so that the terminal performs the identity authentication method provided in various alternative implementations of the above aspect.
The technical scheme provided by the embodiment of the application at least comprises the following beneficial effects:
in the embodiment of the application, an identity authentication mechanism based on two authentication factors of a user password and voiceprint characteristics is provided, and a user can complete the input of the password and the voiceprint at the same time by only one voice input, so that the user identity authentication flow can be simplified, and the identity authentication efficiency is improved; the random password character conversion mode is provided, so that the user inputs the instant password obtained after the original password is converted, on one hand, the original password of the user can be prevented from being revealed in the voice input stage, on the other hand, the authentication can be successful only by the instant password obtained based on the correct original password, and voiceprint authentication can be protected from being attacked by counterfeit voiceprints, so that the safety and accuracy of identity authentication are improved.
Drawings
FIG. 1 is a schematic diagram of an implementation environment shown in an exemplary embodiment of the present application;
FIG. 2 illustrates a flow chart of an identity authentication method provided by an exemplary embodiment of the present application;
FIG. 3 illustrates a flow chart of an identity authentication method provided in another exemplary embodiment of the present application;
FIG. 4 is a schematic diagram of a virtual keyboard shown in an exemplary embodiment of the present application;
FIG. 5 illustrates a flow chart of an identity authentication method provided in another exemplary embodiment of the present application;
FIG. 6 illustrates a flowchart of an identity authentication method provided in another exemplary embodiment of the present application;
fig. 7 is a block diagram illustrating an identity authentication device according to an exemplary embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
References herein to "a plurality" means two or more. "and/or", describes an association relationship of an association object, and indicates that there may be three relationships, for example, a and/or B, and may indicate: a exists alone, A and B exist together, and B exists alone. The character "/" generally indicates that the context-dependent object is an "or" relationship.
In the related art, two factor identity authentication generally adopts two of the following three authentication factors: 1. user privacy information such as user password, PIN;2. user biometric information such as voiceprint features, facial features, fingerprint features, etc.; 3. user personal items such as SMS verification codes, electronic tokens, etc. However, the related art identity authentication method, the 2FA method based on voiceprints and other biological features (e.g., fingerprint, face) requires the user equipment to be provided with additional special sensors (e.g., fingerprint sensors) or external software and hardware tokens; the 2FA scheme based on passwords and graphic codes tends to require the user to make multiple rounds of information input. Whether the method is based on two biological characteristics, the method based on passwords and passwords or the method based on the biological characteristics and private information of the user, the user is required to input verification operations for at least two rounds, such as inputting voiceprints and fingerprints respectively, or inputting fingerprints and passwords respectively, and the like, the verification operations are complicated and the verification process is long.
In order to solve the technical problems, improve the efficiency of 2FA and simplify the flow, the embodiment of the application provides an identity verification method. FIG. 1 illustrates a schematic diagram of an implementation environment provided by one embodiment of the present application. The implementation environment may include: a terminal 110 and a background server 120.
The terminal 110 includes a password conversion module 111 and a feature extraction module 112. Upon receiving the authentication instruction, the password conversion module 111 generates a password character conversion manner, which is randomly generated. The terminal 110 displays a password character conversion mode through an interface, a user converts an original password according to the mode, the user inputs an instant password through voice, and the terminal 110 performs voice recognition on a voice signal acquired by a microphone. The password conversion module 111 restores the instant password obtained by recognition based on the password character conversion mode to obtain the original password; the feature extraction module 112 performs voiceprint feature extraction on the human voice signal to obtain voiceprint feature data. The terminal 110 transmits the original password and voiceprint feature data to the background server 120 for identity authentication. Thus, the user data can be input into two authentication factors once, and the user operation flow is simplified.
After receiving the original password and voiceprint feature data, the background server 120 performs identity authentication based on the database, and returns an authentication result to the terminal 110. Only one terminal 110 is shown in fig. 1, and in the practical application process, more terminals may also communicate with the background server 120 to perform identity authentication. The background server 120 stores therein the original password and voiceprint feature data corresponding to each account.
The following describes schematically an application scenario of the identity authentication method provided in the embodiment of the present application.
1. Online payment
The identity authentication method can realize the online payment function in the application programs such as shopping application programs, online payment application programs and the like or web pages, and realizes the completion of a double-factor identity authentication flow through one-time input. When the payment operation is received, the terminal randomly generates a password character conversion mode, displays the password character conversion mode through an interface, and starts the microphone to collect sound signals. The user converts the original password of the self account into an instant password based on the password character conversion mode displayed by the terminal, and inputs the instant password through voice. After the terminal restores the instant password to obtain the original password, the terminal performs identity authentication based on the original password and voiceprint characteristics, and finishes payment operation when the authentication is successful due to the double authentication.
2. Account login
For some user accounts related to important information or resources of the user, the identity authentication method can be adopted for identity authentication during login. When receiving the account login operation, the user inputs an account identifier and starts an identity authentication flow, and the user inputs an original password and voiceprint features at one time through voice input of an instant password to perform identity authentication. The identity authentication method can be applied to account login of an application program in the terminal, and can also be applied to account login scenes in a webpage.
Fig. 2 shows a flowchart of an identity authentication method according to an exemplary embodiment of the present application. The embodiment is described by taking the example that the method is applied to a terminal with voice acquisition and voice recognition functions as an example, and the method comprises the following steps.
In step 201, in response to the authentication instruction, password conversion prompt information is displayed.
The password conversion prompt information is used for prompting the conversion of password characters in the original password, and the password character conversion mode indicated by the password conversion prompt information is randomly generated.
In a possible implementation manner, in order to simplify user operation, the embodiment of the application adopts a mode of inputting the user password by voice to realize one-time input of the two authentication factors. However, if the user directly inputs the original password through voice, the original password is leaked when other people exist nearby, so that the terminal provides a random password character conversion mode. When the terminal receives the identity verification instruction, a password character conversion mode is provided for a user by displaying password conversion prompt information, and the user needs to convert the original password of the self account into an instant password and then record the instant password by voice according to the password character conversion mode provided by the terminal. The password character conversion mode is randomly generated and is not fixed, so that the password character conversion mode cannot be cracked, and the terminal is provided in an interface display mode, so that leakage of the conversion mode can be avoided.
Alternatively, the password character conversion mode may implement conversion between characters of the same type, for example, mapping each number in a certain range to other random numbers in the range, or mapping each letter to other letters; the password character conversion mode can also realize conversion among different types of characters, such as mapping numbers into Chinese characters, mapping letters into numbers, and the like. The password character conversion mode can convert one character into a corresponding character, so that the instant password is consistent with the character number of the original password; the password character conversion mode can also convert one character into a plurality of characters, so that the number of characters of the instant password is inconsistent with that of the original password. The embodiments of the present application are not limited in this regard.
Step 202, voice recognition is carried out on the voice signals collected by the microphone, and an instant password is obtained.
After the terminal displays the password conversion prompt information, a sound signal is collected through a microphone. After the sound signal collection is finished, the terminal carries out voice recognition on the voice signal in the sound signal to obtain an instant password input by the voice of the user.
Optionally, after receiving the authentication instruction, the terminal automatically starts the microphone to collect the voice signal, or the terminal displays password conversion prompt information and starts the microphone to collect the voice signal when receiving password entry confirmation operation (such as triggering operation on a voice entry control). The terminal turns off the microphone to finish voice acquisition when the microphone on duration reaches a duration threshold, or turns off the microphone when receiving password input completion operation (such as trigger operation of a voice input completion control), or carries out voice recognition on the acquired voice signal in real time, and automatically turns off the microphone when no voice signal is detected in the target duration. The embodiments of the present application are not limited in this regard.
And 203, extracting voiceprint characteristics of the voice signal to obtain voiceprint characteristic data.
After the terminal acquires the instant password, voiceprint feature extraction is carried out on the voice signal corresponding to the instant password, and voiceprint feature data are obtained. In a possible implementation manner, the voiceprint features of the user on different characters may be different, so that in order to improve the accuracy of voiceprint recognition, the terminal performs feature extraction on the voice signals of the password characters respectively to obtain voiceprint feature data corresponding to the password characters.
Step 204, performing password conversion on the instant password based on the password character conversion mode to obtain the original password.
After the terminal acquires the instant password, the instant password is reversely converted (namely, the password is restored, and which character or characters are converted according to the password character conversion mode is determined to obtain the characters in the instant password) based on the password character conversion mode provided by the identity authentication, so that the original password is obtained.
Here not converted again in a password character conversion manner. For example, if the terminal randomly generates password characters in a mode of converting "1" into "3", "2" into "9" and "3" into "4", the terminal converts "3" in the instant password into "1" instead of converting "3" into "4".
It should be noted that fig. 2 only shows one possible method execution flow, but the step 203 and the step 204 are not strictly sequential, and the terminal may execute the step 203 first, may execute the step 204 first, or may execute both steps simultaneously.
And step 205, performing identity authentication based on the original password and the voiceprint feature data.
The terminal performs identity authentication based on the original password and the voiceprint feature data, and only when the original password is consistent with the registered password corresponding to the account and the voiceprint feature data is consistent with the registered voiceprint feature data corresponding to the account, the terminal can confirm that the identity authentication is successful, and if one factor is inconsistent, the terminal can confirm that the identity authentication is failed.
Optionally, after the terminal obtains the original password and the voiceprint feature data, identity authentication is performed locally, or the terminal sends the original password and the voiceprint feature data to the cloud, and the cloud server performs identity authentication and feeds back an identity authentication result.
In summary, in the embodiment of the application, an identity authentication mechanism based on two authentication factors, namely a user password and voiceprint features is provided, and a user can complete input of the password and input of the voiceprint at the same time only by voice input once, so that the user identity authentication process can be simplified, and the identity authentication efficiency can be improved; the random password character conversion mode is provided, so that the user inputs the instant password obtained after the original password is converted, on one hand, the original password of the user can be prevented from being revealed in the voice input stage, on the other hand, the authentication can be successful only by the instant password obtained based on the correct original password, and voiceprint authentication can be protected from being attacked by counterfeit voiceprints, so that the safety and accuracy of identity authentication are improved.
In one possible implementation, the terminal determines the password character conversion mode based on a random mapping function, and displays the password character conversion mode by means of a virtual keyboard. Fig. 3 shows a flowchart of an identity authentication method according to another exemplary embodiment of the present application. The embodiment is described by taking the example that the method is applied to a terminal with voice acquisition and voice recognition functions as an example, and the method comprises the following steps.
In step 301, a target random mapping function is generated in response to an authentication instruction.
The random mapping function is a function of randomly mapping a character to another character. The expression of the randomization map function is: h rand (X) =y. Wherein X is a character before mapping, Y is a character after mapping, that is, X is mapped to Y, and the function is randomly generated by the terminal. In one possible implementation, the pre-mapped character and the post-mapped character may be identical, and the random mapping function may be understood as mapping each character in one character set to each character in another character set, with the two character sets being equal.
Illustratively, the characters used to set the password are numbers 0 through 9, and the terminal generates a target random mapping function:
H rand (1)=0,H rand (2)=4,H rand (3)=8,H rand (4)=1,H rand (5)=5,H rand
(6)=3,H rand (7)=6,H rand (8)=9,H rand (9)=2,H rand (0)=7。
Step 302, displaying a virtual keyboard based on the random mapping function, wherein password conversion prompt information corresponding to the random mapping function is displayed in the virtual keyboard.
The terminal displays password conversion prompt information in the form of a virtual keyboard, and the mapping relation of a group of characters is displayed in the same key position of the virtual keyboard. The user can find the character in the original password based on the original password, and then enter the character mapped by the character in the random mapping function through voice.
In one possible implementation, step 302 includes the steps of:
step 302a, determining a character pair based on the random mapping function, wherein the character pair comprises a first character and a second character corresponding to the first character in the random mapping function.
The terminal determines a character pair consisting of a first character and a second character based on a random mapping function. The user converts the original password into an instant password composed of the second characters based on the first character in the original password and the character pair displayed by the terminal.
Based on the example in step 301, the terminal determines that the character pair includes (1, 0), (2, 4), (3, 8), (4, 1), (5, 5), (6, 3), (7, 6), (8, 9), (9, 2), (0, 7).
In another possible embodiment, the character pair may further include a first character and a plurality of second characters.
Step 302b, displaying the character pair in the virtual keyboard according to the first display mode corresponding to the first character and the second display mode corresponding to the second character, wherein the first display mode and the second display mode are different.
In one possible implementation manner, in order to distinguish the first character from the second character, the situation that a password is input in error due to confusion of a user when the first character and the second character are displayed according to the same display mode is avoided, and the terminal displays the first character and the second character according to different display modes. Wherein the first display mode and the second display mode are different from each other including at least one of the following:
the display color of the first character is different from the display color of the second character; the display font of the first character is different from the display font of the second character; the display word size of the first character is different from the display word size of the second character; the display effect of the first character is different from the display effect of the second character.
Schematically, fig. 4 shows a schematic diagram of a virtual keyboard. The virtual keyboard comprises 10 key positions, wherein each key position is provided with a character pair, the left side of each character pair is provided with a first character, and the right side of each character pair is provided with a second character. In the virtual keyboard, compared with the first character, the second character is additionally provided with two display special effects, namely a thickening effect and an underline effect. In particular, the second character may also be a different color than the first character, e.g. the first character is black and the second character is red.
Fig. 4 illustrates a virtual keyboard by taking a virtual number key as an example, in other possible embodiments, the virtual keyboard may also be a virtual letter keyboard, in which a pair of letters having a mapping relationship is displayed in each key position, or a chinese character keyboard, in which a pair of chinese characters having a mapping relationship is displayed in each key position, or the like.
In one possible implementation manner, the first character and the second character may be displayed in the virtual keyboard synchronously, and the step 302b may specifically include the following steps:
step one, a first keyboard position of a first character in a virtual keyboard is determined.
And step two, displaying character pairs corresponding to the first characters in the virtual keyboard according to the first keyboard position based on the first display mode and the second display mode.
In one possible implementation, the display position of the first character in the virtual keyboard is fixed, the terminal first determines a first keyboard position of the first character in the virtual keyboard, and then displays a character pair corresponding to the first character at the first keyboard position.
For example, for the virtual keyboard shown in fig. 4, the first character displays the numbers 1 through 0 each time in a top-to-bottom and left-to-right order. The terminal first determines the first keyboard positions of the 10 first characters based on the sequence, then displays 10 character pairs corresponding to the 10 first characters at the corresponding first keyboard positions, namely, the character pair (1, 0) corresponding to the number 1 is displayed at the upper left corner, and the character pair (2, 4) corresponding to the number 2 is displayed at the middle position of the first row.
Because the processes of memorizing the original password, searching the display position of each first character in the original password, determining the second character corresponding to each first character and the like all need to be observed, calculated and executed by the user, if the terminal displays the first character and the second character simultaneously, more characters in the virtual keyboard can be caused, and the user is confused. In another possible implementation manner, the terminal may display the first character in the virtual keyboard, and display the second character after the user confirms that the password conversion may be started, where the step 302b may further include the following steps:
and thirdly, displaying the first character in the virtual keyboard based on the first keyboard position of the first character in the virtual keyboard and the first display mode.
Similarly, the terminal displays the first characters at the first keyboard positions in the virtual keyboard according to the default sequence, so that the user can quickly determine the display positions of the first characters in the original password at familiar positions, and the instant password can be conveniently and quickly determined later.
And step four, responding to the display operation of the conversion mode, and determining a second keyboard position of the second character in the virtual keyboard based on the first character corresponding to the second character in the character pair.
When the user makes password conversion preparation, conversion mode display operation is executed, so that the terminal displays a second character in the virtual keyboard, and display of character pairs is completed.
Alternatively, the conversion mode display operation may be a trigger operation to a conversion confirmation control, or may be a user voice input of a conversion password, such as "password conversion", or the like. The embodiments of the present application are not limited in this regard.
After receiving the conversion mode display operation, the terminal determines the second keyboard position of each second character based on the first character corresponding to the second character in the character pair and the first keyboard position of the first character.
For example, for the virtual keyboard in fig. 4, the terminal first displays the first character on the left side of each key position, and after receiving the conversion mode display operation, displays the second character that is bolded and underlined on the right side. For the second character "1", the corresponding character pair is (4, 1), the terminal determines the first keyboard position of the first character "4" as the second keyboard position of the second character "1", for the second character "2", the corresponding character pair is (9, 2), and the terminal determines the first keyboard position of the first character "9" in the character pair as the second keyboard position of the second character "2".
And fifthly, displaying a second character in the virtual keyboard according to the second keyboard position based on a second display mode.
And after the second keyboard positions of all the second characters are determined, the terminal displays the second characters in the virtual keyboard so that the user can determine the instant password.
The virtual keyboard is displayed in a mode of fixing the display position of the first character, namely the display position of the character pair is determined by the first keyboard position of the first character, and the first keyboard position is a fixed position, so that a user can conveniently and quickly determine an instant password according to the familiar keyboard position. In the practical application process, the first keyboard position may also be random.
Step 303, performing voice recognition on the voice signal collected by the microphone to obtain an instant password.
And step 304, extracting voiceprint characteristics of the human voice signals to obtain voiceprint characteristic data.
For the specific embodiments of steps 303 to 304, reference may be made to steps 202 to 203, which are not described herein.
In step 305, the instant password is password converted based on the random mapping function, and the original password is obtained.
After the terminal speech recognition of the instant password, performing inverse conversion (restoration) on each second character in the instant password according to the random mapping function generated at the time to obtain a first character corresponding to each second character, and further determining the original password.
Illustratively, taking the password character conversion mode in the virtual keyboard shown in fig. 4 as an example, if the original password is "123456", the user determines that the instant password is "048153" and performs voice input, and after the terminal voice recognition obtains "048153", the original password is "123456" based on a random mapping function.
And 306, performing identity authentication based on the original password and the voiceprint feature data.
For a specific embodiment of step 306, reference may be made to step 205 described above, and the embodiments of the present application are not repeated here.
In the embodiment of the application, the terminal generates the random mapping function, determines the conversion mode of the password characters, intuitively displays the character pairs indicated by the random mapping function in the form of the virtual keyboard, is convenient for a user to quickly and correctly convert the password, and improves the password input efficiency and the password input accuracy.
The above embodiments illustrate the process of the terminal determining and exposing the password character conversion mode and obtaining the original password based on the instant password conversion. For the step of identity authentication, specifically, the terminal may send the obtained original password and voiceprint feature data to the background server, and the background server determines an identity authentication result based on the database. Before the identity authentication stage, the user first needs to enter own voiceprint features and an original password to enable the background server to store. Fig. 5 shows a flowchart of an identity authentication method according to another exemplary embodiment of the present application. The embodiment is described by taking the example that the method is applied to a terminal with voice acquisition and voice recognition functions as an example, and the method comprises the following steps.
In step 501, in response to a voiceprint entry instruction, a character set is displayed, the character set including all characters usable to set a password.
In one possible implementation, the user needs to enter his voice print in advance to be able to start the above-mentioned two-factor authentication function. In consideration of the identity authentication stage, the terminal may randomly convert the first character in the original password into any character in the character set, and the sounding characteristics of the user for different characters, that is, the voiceprint characteristics may be different, so that in order to improve the accuracy of voiceprint recognition, the terminal needs to acquire the voices of the user for all the characters. When a voiceprint input order is received, the terminal displays a character set, wherein the character set contains all characters which can be used for setting a password.
For example, if the application scenario only supports using 0 to 9 ten digits to set the password, the terminal displays 0 to 9 ten digits, and displays prompt information for indicating to input the ten digits by voice, and the user needs to input the ten digits by voice according to the prompt information and the character display sequence. If the current application scenario only supports the use of 26 English letters to set the password, the terminal displays 26 English letters, and the user also needs to sequentially input the 26 characters according to the display sequence of the terminal.
Step 502, extracting features of the voice signals collected by the microphone to obtain voice print feature data.
And in the voiceprint feature registration stage, the terminal also performs feature extraction on the collected voice signals to obtain voiceprint feature data. Or the terminal can also directly send the collected voice signals to a background server, and the background server performs feature extraction and stores voice print feature data.
Step 503, the voiceprint feature data and the account identifier are sent to a background server, where the background server is used to update a database containing the corresponding relation between the account and the voiceprint feature data and between the account and the original password.
The terminal sends the voiceprint feature data and the account identification to a background server, and the background server adds the corresponding relation between the account identification and the voiceprint feature data in a database after receiving the voiceprint feature data and the account identification. The data stores the account identification, voiceprint characteristic data, original password and other information of each account. The method is used for carrying out identity authentication based on the database and the received authentication information in the subsequent identity authentication stage.
Of course, if the above two-factor authentication mechanism is to be adopted, the user also needs to enter the original password. The original password can be entered through voice or manually. And the entry of the original password can be performed before the entry of the voiceprint characteristic data, or can be performed after the entry of the voiceprint characteristic data. The embodiments of the present application are not limited in this regard.
In step 504, in response to the authentication instruction, a password conversion prompt is displayed.
Step 505, performing voice recognition on the voice signal collected by the microphone to obtain the instant password.
And step 506, extracting voiceprint characteristics of the voice signal to obtain voiceprint characteristic data.
And 507, performing password conversion on the instant password based on the password character conversion mode to obtain an original password.
For the specific embodiments of step 504 to step 507, reference may be made to step 201 to step 204, which are not described herein.
And step 508, the original password and the voiceprint feature data are sent to a background server, and the background server is used for carrying out identity authentication based on the original password and the voiceprint feature data.
In one possible implementation, the terminal sends the instant password in addition to the original password and the voiceprint feature data, so that the background server obtains the voiceprint feature data of the corresponding character from the database based on the instant password for voiceprint comparison.
Optionally, after acquiring the original password and voiceprint feature data input by the identity authentication person, the terminal synchronously sends two kinds of authentication information to the background server, so that the background server simultaneously performs two kinds of authentication, and determines a final identity authentication result based on the two kinds of authentication results; after the terminal acquires the original password and voiceprint feature data recorded by the identity identifier, one type of authentication information can be sent to the background server, when the background server confirms that authentication based on the one type of authentication information is successful, the terminal sends the other type of authentication information to the background server, if the authentication of the first type of authentication information fails, the terminal does not need to send the second type of authentication information again, and authentication failure is directly confirmed, so that the accuracy and the safety of identity authentication are improved, and the authentication efficiency is improved.
After the terminal obtains the original password and voiceprint characteristic data of the identity verifier, one authentication information is sent first, and after the authentication information is successfully authenticated, the other authentication information is sent. In one possible implementation, the terminal first sends the original password for password authentication, and step 508 may include the steps of:
step 508a, the original password and the account identifier of the current login account are sent to a background server, where the background server is configured to determine a first identity authentication result based on the target original password corresponding to the current login account in the database.
And the terminal sends the account identifier (such as a user name) of the current login account and the converted original password to a background server. The background server inquires a database based on the received account identifier to obtain a target original password corresponding to the account identifier, compares the target original password with an original password sent by the terminal, confirms that the password authentication is successful if the target original password is completely consistent with the original password sent by the terminal, and confirms that the password authentication is failed if the target original password is not completely consistent with the original password. The background server sends a first identity authentication result to the terminal.
Step 508b, in response to receiving the first identity authentication result sent by the background server, where the first identity authentication result indicates that the password authentication is successful, sending voiceprint feature data to the background server, where the background server is configured to determine a second identity authentication result based on the target voiceprint feature data corresponding to the current login account in the database.
And after receiving a first identity authentication result for indicating that password authentication is successful, the terminal sends voiceprint feature data to a background server. The background server queries a database based on the account identification to obtain target voiceprint feature data corresponding to the account identification. And the background server performs characteristic comparison on the target voiceprint characteristic data and voiceprint characteristic data of the identity authentication person sent by the terminal, and determines a second identity authentication result.
In a possible implementation manner, a similarity threshold is set in the background server, if the similarity between the target voiceprint feature data and voiceprint feature data of the identity identifier sent by the terminal is higher than the similarity threshold, the voiceprint authentication is confirmed to be successful, and if the similarity between the target voiceprint feature data and the voiceprint feature data of the identity identifier sent by the terminal is lower than the similarity threshold, the voiceprint authentication is confirmed to be failed. And the background server sends a second identity authentication result to the terminal.
After step 508a, the identity authentication method provided in the embodiment of the present application further includes the following steps:
and responding to the received first identity authentication result sent by the background server, wherein the first identity authentication result indicates password authentication failure, and determining that the identity authentication fails and stopping sending voiceprint feature data.
When the first identity authentication result indicates that password authentication fails, the terminal does not send voiceprint feature data any more, and the final result is directly confirmed to be authentication failure, so that the transmission data quantity is reduced, and the identity authentication efficiency is improved.
In another possible implementation manner, the terminal may first send voiceprint feature data for voiceprint authentication, and step 508 may further include the following steps:
and 508c, transmitting the voiceprint feature data and the account identifier of the current login account to a background server, wherein the background server is used for determining a third identity authentication result based on the target voiceprint feature data corresponding to the current login account in the database.
And the terminal sends the account identification (such as a user name) of the current login account and the extracted voiceprint feature data to a background server. The background server queries a database based on the received account identification to obtain target voiceprint feature data corresponding to the account identification. And the background server performs characteristic comparison on the target voiceprint characteristic data and voiceprint characteristic data of the identity authentication person sent by the terminal, and determines a third identity authentication result.
And step 508d, responding to the received third identity authentication result sent by the background server, wherein the third identity authentication result indicates that the voiceprint authentication is successful, and sending an original password to the background server, wherein the background server is used for determining a fourth identity authentication result based on a target original password corresponding to the current login account in the database.
And after receiving a third identity authentication result for indicating that voiceprint authentication is successful, the terminal sends the original password to the background server. The background server inquires a database based on the account number identification to obtain a target original password corresponding to the account number identification, compares the target original password with an original password sent by the terminal, confirms that the password authentication is successful if the target original password is completely consistent with the original password sent by the terminal, and confirms that the password authentication is failed if the target original password is not completely consistent with the original password. And the background server sends a fourth identity authentication result to the terminal.
After step 508c, the identity authentication method provided in the embodiment of the present application further includes the following steps:
and in response to receiving a third identity authentication result sent by the background server, wherein the third identity authentication result indicates voiceprint authentication failure, determining that the identity authentication fails and stopping sending the original password.
Step 509, receiving an identity authentication result sent by the background server, where the identity authentication result is used to indicate authentication success or authentication failure.
If the terminal synchronously sends the voiceprint feature data and the original password to the background server, the terminal determines authentication success or authentication failure based on the identity authentication result returned by the background server at one time. If the terminal sends an authentication information first, the terminal immediately determines that the authentication fails when receiving the first authentication result or the third authentication result and indicating that the authentication fails, or determines that the authentication succeeds or fails based on the second authentication result or the fourth authentication result.
In the embodiment of the application, the terminal sends the original password and voiceprint feature data to the background server, so that the background server performs identity authentication based on the database to improve the safety and confidentiality of user information; in addition, the terminal can firstly send one kind of authentication information to the background server, judge whether to send the second kind of authentication information based on the authentication result of the first kind of authentication information, directly determine the authentication result when the authentication of the first kind of authentication information fails, reduce the transmission and leakage of data as much as possible, and improve the identity authentication efficiency.
In connection with the above embodiment, in an illustrative example, the flow of performing the two-factor authentication task by the terminal and the background server is shown in fig. 6, and the flow includes the following steps:
step 601, displaying a virtual keyboard based on a password character conversion mode.
Step 602, collecting a human voice signal through a microphone.
And 603, performing voice recognition on the collected voice signals to obtain an original password, and extracting voice print characteristic data of the voice signals.
Step 604, sending the original password, voiceprint feature data and account identification to a background server.
Step 605, identity authentication is performed based on voiceprint feature data and the original password.
Step 606, the identity authentication result is sent to the terminal.
Fig. 7 is a block diagram of a cell selection apparatus according to an exemplary embodiment of the present application, where the apparatus includes:
the first display module 701 is configured to respond to the authentication instruction, and display password conversion prompt information, where the password conversion prompt information is used to prompt conversion of password characters in the original password, and a password character conversion mode indicated by the password conversion prompt information is randomly generated;
the voice recognition module 702 is configured to perform voice recognition on the voice signal collected by the microphone to obtain an instant password;
The feature extraction module 703 is configured to perform voiceprint feature extraction on the voice signal to obtain voiceprint feature data;
a password conversion module 704, configured to perform password conversion on the instant password based on the password character conversion manner, so as to obtain the original password;
and the identity authentication module 705 is configured to perform identity authentication based on the original password and the voiceprint feature data.
Optionally, the first display module 701 includes:
a generation unit for generating a target random mapping function in response to the authentication instruction, wherein the random mapping function is a function for randomly mapping a character to another character;
the display unit is used for displaying a virtual keyboard based on the random mapping function, and the password conversion prompt information corresponding to the random mapping function is displayed in the virtual keyboard;
the password conversion module 704 includes:
and the conversion unit is used for carrying out password conversion on the instant password based on the random mapping function to obtain the original password.
Optionally, the display unit is further configured to:
determining a character pair based on a random mapping function, wherein the character pair comprises a first character and a second character corresponding to the first character in the random mapping function;
And displaying the character pairs in the virtual keyboard based on a first display mode corresponding to the first character and a second display mode corresponding to the second character, wherein the first display mode is different from the second display mode.
Optionally, the display unit is further configured to:
determining a first keyboard position of the first character in the virtual keyboard;
and displaying character pairs corresponding to the first characters in the virtual keyboard according to the first keyboard position based on the first display mode and the second display mode.
Optionally, the display unit is further configured to:
displaying the first character in the virtual keyboard based on a first keyboard position of the first character in the virtual keyboard and the first display mode;
determining a second keyboard position of the second character in the virtual keyboard based on the first character corresponding to the second character in the character pair in response to a conversion mode display operation;
and displaying the second character in the virtual keyboard according to the second keyboard position based on the second display mode.
Optionally, the difference between the first display mode and the second display mode includes at least one of:
The display color of the first character is different from the display color of the second character;
the display font of the first character is different from the display font of the second character;
the display word size of the first character is different from the display word size of the second character;
the display effect of the first character is different from the display effect of the second character.
Optionally, the apparatus further includes:
the second display module is used for responding to the voiceprint input instruction and displaying a character set, wherein the character set comprises all characters which can be used for setting a password;
the characteristic acquisition module is used for carrying out characteristic extraction on the voice signals acquired by the microphone to obtain voice print characteristic data;
the information sending module is used for sending the voiceprint feature data and the account identification to a background server, and the background server is used for updating a database containing the corresponding relation between the account and the voiceprint feature data and the original password.
Optionally, the identity authentication module 705 includes:
the information sending unit is used for sending the original password and the voiceprint feature data to the background server, and the background server is used for carrying out identity authentication based on the original password and the voiceprint feature data;
The information receiving unit is used for receiving an identity authentication result sent by the background server, and the identity authentication result is used for indicating authentication success or authentication failure.
Optionally, the information sending unit is further configured to:
the original password and the account identifier of the current login account are sent to the background server, and the background server is used for determining a first identity authentication result based on a target original password corresponding to the current login account in the database;
responding to the first identity authentication result sent by the background server, wherein the first identity authentication result indicates that password authentication is successful, the voiceprint feature data is sent to the background server, and the background server is used for determining a second identity authentication result based on target voiceprint feature data corresponding to the current login account in the database;
the apparatus further comprises:
and the first determining module is used for responding to the received first identity authentication result sent by the background server, and the first identity authentication result indicates password authentication failure, determining identity authentication failure and stopping sending the voiceprint feature data.
Optionally, the information sending unit is further configured to:
the voiceprint feature data and the account identifier of the current login account are sent to the background server, and the background server is used for determining a third identity authentication result based on target voiceprint feature data corresponding to the current login account in the database;
responding to the third identity authentication result sent by the background server, wherein the third identity authentication result indicates that voiceprint authentication is successful, the original password is sent to the background server, and the background server is used for determining a fourth identity authentication result based on a target original password corresponding to the current login account in the database;
the apparatus further comprises:
and the second determining module is used for responding to the third identity authentication result sent by the background server, and the third identity authentication result indicates voiceprint authentication failure, determining identity authentication failure and stopping sending the original password.
In summary, in the embodiment of the application, an identity authentication mechanism based on two authentication factors, namely a user password and voiceprint features is provided, and a user can complete input of the password and input of the voiceprint at the same time only by voice input once, so that the user identity authentication process can be simplified, and the identity authentication efficiency can be improved; the random password character conversion mode is provided, so that the user inputs the instant password obtained after the original password is converted, on one hand, the original password of the user can be prevented from being revealed in the voice input stage, on the other hand, the authentication can be successful only by the instant password obtained based on the correct original password, and voiceprint authentication can be protected from being attacked by counterfeit voiceprints, so that the safety and accuracy of identity authentication are improved.
In an exemplary embodiment, there is also provided a terminal including a processor and a memory having stored therein at least one instruction, at least one program, code set, or instruction set loaded and executed by the processor to implement the identity authentication method performed by the terminal as provided in the above embodiments.
Embodiments of the present application also provide a computer readable storage medium storing at least one instruction that is loaded and executed by a processor to implement the identity authentication method described in the above embodiments.
According to one aspect of the present application, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the terminal reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions so that the terminal performs the identity authentication method provided in various alternative implementations of the above aspect.
It will be appreciated that in the specific embodiments of the present application, related data relating to user passwords, voiceprint features, etc. are required to obtain user permissions or consent when the present application is applied to a specific product or technology in the case of marketing examples, and that the mobile, use and handling of the related data is required to comply with relevant laws and regulations and standards in the relevant countries and regions.
Those skilled in the art will appreciate that in one or more of the examples described above, the functions described in the embodiments of the present application may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, these functions may be stored on or transmitted over as one or more instructions or code on a computer-readable storage medium. Computer-readable storage media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The foregoing description of the preferred embodiments is merely exemplary in nature and is in no way intended to limit the invention, since it is intended that all modifications, equivalents, improvements, etc. that fall within the spirit and scope of the invention.

Claims (8)

1. An identity authentication method, wherein the method comprises:
responding to a voiceprint input instruction, displaying a character set, wherein the character set comprises all characters which can be used for setting a password;
extracting characteristics of the voice signals collected by the microphone to obtain voice print characteristic data;
the voiceprint feature data and the account identification are sent to a background server, and the background server is used for updating a database containing the corresponding relation between the account and the voiceprint feature data as well as the original password;
generating a target random mapping function in response to the authentication instruction, wherein the random mapping function is a function for randomly mapping a character to another character;
determining a character pair based on the target random mapping function, wherein the character pair comprises a first character and a second character corresponding to the first character in the target random mapping function;
displaying the first character in the virtual keyboard based on a first keyboard position and a first display mode of the first character in the virtual keyboard; the first keyboard position is a fixed position of the first character in the virtual keyboard;
determining a second keyboard position of the second character in the virtual keyboard based on the first character corresponding to the second character in the character pair in response to a conversion mode display operation; the first keyboard position and the second keyboard position are located in the same key position;
Based on a second display mode, displaying the second character in the virtual keyboard according to the second keyboard position, wherein the first display mode is different from the second display mode, and password conversion prompt information corresponding to the target random mapping function is displayed in the virtual keyboard; the password conversion prompt information is used for prompting the conversion of password characters in the original password, and the password character conversion mode indicated by the password conversion prompt information is randomly generated;
voice recognition is carried out on the voice signals collected by the microphone, and an instant password is obtained;
extracting voiceprint characteristics of the human voice signals to obtain voiceprint characteristic data;
performing password conversion on the instant password based on the target random mapping function to obtain the original password; and carrying out identity authentication based on the original password and the voiceprint feature data.
2. The method of claim 1, wherein the first display mode and the second display mode differ by at least one of:
the display color of the first character is different from the display color of the second character;
the display font of the first character is different from the display font of the second character;
The display word size of the first character is different from the display word size of the second character;
the display effect of the first character is different from the display effect of the second character.
3. The method of claim 1, wherein the authenticating based on the original password and the voiceprint feature data comprises:
the original password and the voiceprint feature data are sent to the background server, and the background server is used for carrying out identity authentication based on the original password and the voiceprint feature data;
and receiving an identity authentication result sent by the background server, wherein the identity authentication result is used for indicating authentication success or authentication failure.
4. A method according to claim 3, wherein said sending the original password and the voiceprint feature data to a background server comprises:
the original password and an account identifier of the current login account are sent to the background server, and the background server is used for determining a first identity authentication result based on a target original password corresponding to the current login account in the database;
responding to the first identity authentication result sent by the background server, wherein the first identity authentication result indicates that password authentication is successful, the voiceprint feature data is sent to the background server, and the background server is used for determining a second identity authentication result based on target voiceprint feature data corresponding to the current login account in the database;
The method further comprises the steps of:
and in response to receiving the first identity authentication result sent by the background server, wherein the first identity authentication result indicates password authentication failure, determining identity authentication failure and stopping sending the voiceprint feature data.
5. A method according to claim 3, wherein said sending the original password and the voiceprint feature data to a background server comprises:
the voiceprint feature data and an account identifier of the current login account are sent to the background server, and the background server is used for determining a third identity authentication result based on target voiceprint feature data corresponding to the current login account in the database;
responding to the third identity authentication result sent by the background server, wherein the third identity authentication result indicates that voiceprint authentication is successful, the original password is sent to the background server, and the background server is used for determining a fourth identity authentication result based on a target original password corresponding to the current login account in the database;
the method further comprises the steps of:
and in response to receiving the third identity authentication result sent by the background server, wherein the third identity authentication result indicates voiceprint authentication failure, determining identity authentication failure and stopping sending the original password.
6. An identity authentication device, wherein the device comprises:
the second display module is used for responding to the voiceprint input instruction and displaying a character set, wherein the character set comprises all characters which can be used for setting a password;
the characteristic acquisition module is used for carrying out characteristic extraction on the voice signals acquired by the microphone to obtain voice print characteristic data;
the information sending module is used for sending the voiceprint feature data and the account identification to a background server, and the background server is used for updating a database containing the corresponding relation between the account and the voiceprint feature data and between the account and the original password;
the first display module is used for responding to the identity verification instruction and generating a target random mapping function, wherein the random mapping function is a function for randomly mapping characters into another character;
the first display module is used for determining character pairs based on the target random mapping function, wherein the character pairs comprise a first character and a second character corresponding to the first character in the target random mapping function;
the first display module is used for displaying the first character in the virtual keyboard based on a first keyboard position and a first display mode of the first character in the virtual keyboard; the first keyboard position is a fixed position of the first character in the virtual keyboard;
The first display module is used for responding to a conversion mode display operation, and determining a second keyboard position of the second character in the virtual keyboard based on the first character corresponding to the second character in the character pair; the first keyboard position and the second keyboard position are located in the same key position;
the first display module is configured to display, based on a second display manner, the second character in the virtual keyboard according to the second keyboard position, where the first display manner is different from the second display manner, and password conversion prompt information corresponding to the target random mapping function is displayed in the virtual keyboard; the password conversion prompt information is used for prompting the conversion of password characters in the original password, and the password character conversion mode indicated by the password conversion prompt information is randomly generated;
the voice recognition module is used for carrying out voice recognition on the voice signals acquired by the microphone to obtain an instant password;
the characteristic extraction module is used for extracting voiceprint characteristics of the human voice signals to obtain voiceprint characteristic data;
the password conversion module is used for performing password conversion on the instant password based on the target random mapping function to obtain the original password;
And the identity authentication module is used for carrying out identity authentication based on the original password and the voiceprint feature data.
7. A terminal, wherein the terminal comprises a processor and a memory; the memory stores at least one instruction, at least one program, code set, or instruction set that is loaded and executed by the processor to implement the authentication method of any of claims 1 to 5.
8. A computer readable storage medium having stored therein at least one computer program that is loaded and executed by a processor to implement the identity authentication method of any one of claims 1 to 5.
CN202180003552.6A 2021-11-24 2021-11-24 Identity authentication method, device, terminal, storage medium and program product Active CN114467283B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2021/132871 WO2023092345A1 (en) 2021-11-24 2021-11-24 Identity authentication method and apparatus, and terminal, storage medium and program product

Publications (2)

Publication Number Publication Date
CN114467283A CN114467283A (en) 2022-05-10
CN114467283B true CN114467283B (en) 2024-02-09

Family

ID=81407889

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202180003552.6A Active CN114467283B (en) 2021-11-24 2021-11-24 Identity authentication method, device, terminal, storage medium and program product

Country Status (2)

Country Link
CN (1) CN114467283B (en)
WO (1) WO2023092345A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115565539B (en) * 2022-11-21 2023-02-07 中网道科技集团股份有限公司 Data processing method for realizing self-help correction terminal anti-counterfeiting identity verification

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964792A (en) * 2010-09-27 2011-02-02 华南理工大学 Multimode mapping based strong authentication method
CN102354419A (en) * 2011-06-20 2012-02-15 上海拉手信息技术有限公司 Authentication terminal of group buying voucher, authentication system thereof and authentication method thereof
CN103546622A (en) * 2012-07-12 2014-01-29 百度在线网络技术(北京)有限公司 Control method, device and system for identifying login on basis of voiceprint
CN104158664A (en) * 2014-08-11 2014-11-19 北京唐桓科技发展有限公司 Identity authentication method and system
CN105553962A (en) * 2015-12-10 2016-05-04 黄信开 Information storage and downloading method for smart phone
CN105991280A (en) * 2015-02-02 2016-10-05 ***通信集团湖北有限公司 User authentication method and system
CN107634834A (en) * 2017-09-05 2018-01-26 四川中电启明星信息技术有限公司 A kind of trusted identity authentication method based on the more scenes in multiple terminals
CN110769419A (en) * 2019-10-21 2020-02-07 南京创维信息技术研究院有限公司 Voice network distribution method and system for intelligent equipment
CN112751838A (en) * 2020-12-25 2021-05-04 中国人民解放军陆军装甲兵学院 Identity authentication method, device and system
CN113051536A (en) * 2021-03-23 2021-06-29 深圳市声扬科技有限公司 Voice authentication method and device, electronic equipment and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060277043A1 (en) * 2005-06-06 2006-12-07 Edward Tomes Voice authentication system and methods therefor
EP1963986A2 (en) * 2005-09-28 2008-09-03 Ontela Inc. Method and system for establishing a service- application execution environment in a hetergoneous, distributed computing system nad a user-friendly data-transfer service application executing within the service-application execution environment
TR201500128A1 (en) * 2015-01-06 2016-07-21 Netas Telekomuenikasyon Anonim Sirketi Crypto hopping webrtc based, voice and / or video communication method.
KR102443632B1 (en) * 2017-12-18 2022-09-15 삼성전자주식회사 Electronic apparatus, electronic system and control method thereof

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101964792A (en) * 2010-09-27 2011-02-02 华南理工大学 Multimode mapping based strong authentication method
CN102354419A (en) * 2011-06-20 2012-02-15 上海拉手信息技术有限公司 Authentication terminal of group buying voucher, authentication system thereof and authentication method thereof
CN103546622A (en) * 2012-07-12 2014-01-29 百度在线网络技术(北京)有限公司 Control method, device and system for identifying login on basis of voiceprint
CN104158664A (en) * 2014-08-11 2014-11-19 北京唐桓科技发展有限公司 Identity authentication method and system
CN105991280A (en) * 2015-02-02 2016-10-05 ***通信集团湖北有限公司 User authentication method and system
CN105553962A (en) * 2015-12-10 2016-05-04 黄信开 Information storage and downloading method for smart phone
CN107634834A (en) * 2017-09-05 2018-01-26 四川中电启明星信息技术有限公司 A kind of trusted identity authentication method based on the more scenes in multiple terminals
CN110769419A (en) * 2019-10-21 2020-02-07 南京创维信息技术研究院有限公司 Voice network distribution method and system for intelligent equipment
CN112751838A (en) * 2020-12-25 2021-05-04 中国人民解放军陆军装甲兵学院 Identity authentication method, device and system
CN113051536A (en) * 2021-03-23 2021-06-29 深圳市声扬科技有限公司 Voice authentication method and device, electronic equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Adaptive Random Key Scheme for Authentication and Key Agreement (ARKS-AKA) for efficient LTE security";Kuljit Kaur; Ajay Shiv Sharma; Harwinder Singh Sohal; Arpandeep Kaur;《 2015 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS)》;全文 *
"基于"声纹+"的无监督可信身份认证";张慧;王钰;成舸;向银杉;郑方;《信息安全研究》;全文 *

Also Published As

Publication number Publication date
WO2023092345A1 (en) 2023-06-01
CN114467283A (en) 2022-05-10

Similar Documents

Publication Publication Date Title
CN107800672B (en) Information verification method, electronic equipment, server and information verification system
CN111241517B (en) Method and device for constructing biological feature verification question-answer library
CN104540129B (en) The registering and logging method and system of third-party application
CN110178179A (en) Voice signature for being authenticated to electronic device user
US11663306B2 (en) System and method for confirming a person's identity
CN109104430B (en) Identity authentication method, identity authentication device and computer readable storage medium
CN108512660B (en) Virtual card verification method
CN111611976A (en) Payment method and device based on face recognition
CN114467283B (en) Identity authentication method, device, terminal, storage medium and program product
CN107517180A (en) Login method and device
CN108766442B (en) Identity authentication method and device based on voiceprint graphic identification
CN105138887B (en) A kind of input method of log-on message, device and terminal device
CN114731280B (en) Identity authentication method, device, terminal and storage medium
CN116777441A (en) Information verification method, device, equipment and computer readable storage medium
CN111598577B (en) Resource transfer method, device, computer equipment and storage medium
CN111181981A (en) Processing method and device and computer equipment
CN113032755A (en) Nuclear power equipment operator verification method, device, equipment and storage medium
US20200120091A1 (en) Online verification method and system for verifying the identity of a subject
CN111414592A (en) AR scene authentication interaction method, device, equipment and readable storage medium
CN115952482B (en) Medical equipment data management system and method
CN109274693B (en) Morse code-based data registering method and user equipment
CN114186209B (en) Identity verification method and system
CN116881887A (en) Application program login method, device, equipment, storage medium and program product
CN112950832B (en) Password verification method and device
CN112150740B (en) Non-inductive secure payment system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant