CN114614980A - Service processing method and device, electronic equipment and computer readable medium - Google Patents

Service processing method and device, electronic equipment and computer readable medium Download PDF

Info

Publication number
CN114614980A
CN114614980A CN202210143017.7A CN202210143017A CN114614980A CN 114614980 A CN114614980 A CN 114614980A CN 202210143017 A CN202210143017 A CN 202210143017A CN 114614980 A CN114614980 A CN 114614980A
Authority
CN
China
Prior art keywords
voice
verification code
verification
voice file
basic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210143017.7A
Other languages
Chinese (zh)
Inventor
李文轩
程浩
胡向军
刘秀芹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN202210143017.7A priority Critical patent/CN114614980A/en
Publication of CN114614980A publication Critical patent/CN114614980A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L13/00Speech synthesis; Text to speech systems
    • G10L13/08Text analysis or generation of parameters for speech synthesis out of text, e.g. grapheme to phoneme translation, prosody generation or stress or intonation determination
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses a business processing method, a business processing device, electronic equipment and a computer readable medium, which relate to the technical field of cloud computing security service, wherein one specific implementation mode comprises the steps of receiving a business processing request and acquiring a corresponding language identifier and a corresponding terminal identifier; generating a verification code, and then calling a basic voice library to generate a voice file based on the verification code and the language identification; calling a voice broadcast interface corresponding to the terminal identification to perform corresponding voice broadcast based on the voice file; and receiving verification information returned by the user based on the broadcasted voice, and further processing corresponding services based on the verification information. The method can support multi-language voice broadcast, so that the vision-impaired client can accurately perform safety verification of the graphic verification code, better service is provided for the vision-impaired client, and the vision-impaired client can complete transaction service by self.

Description

Service processing method and device, electronic equipment and computer readable medium
Technical Field
The present application relates to the technical field of cloud computing security services, and in particular, to a method and an apparatus for processing a service, an electronic device, and a computer-readable medium.
Background
Currently, most websites require a user to identify a graphical verification code when logging in or performing an accounting transaction, so as to avoid an attack by a hacker or a third party. This strategy may make online transactions more secure, but at the same time sacrifice some convenience. The verification code picture is usually complex and fuzzy in order to avoid being recognized by a machine, even if a normal client is in use, the input can be ensured to be correct once, and the verification code picture is more difficult to recognize for a vision-impaired client.
In the process of implementing the present application, the inventor finds that at least the following problems exist in the prior art:
the colors and the ground colors of verification codes in the existing graphic verification codes are very close, and the shape difference of the verification codes is large, so that visually impaired customers can hardly recognize the true contents of the verification codes, and websites and transactions needing to be subjected to the safety verification of the graphic verification codes cannot provide normal services for the customers.
Disclosure of Invention
In view of this, embodiments of the present application provide a service processing method, an apparatus, an electronic device, and a computer readable medium, which can solve the problems that colors and bottom colors of verification codes in existing graphical verification codes are very close, and shapes of the verification codes are very different, so that it is difficult for visually impaired customers to identify the true contents of the verification codes, which results in that websites and transactions requiring security verification of the graphical verification codes cannot provide normal services for such customers.
In order to achieve the above object, according to an aspect of the embodiments of the present application, there is provided a service processing method, including:
receiving a service processing request, and acquiring a corresponding language identifier and a terminal identifier;
generating a verification code, and then calling a basic voice library to generate a voice file based on the verification code and the language identification;
calling a voice broadcast interface corresponding to the terminal identification to perform corresponding voice broadcast based on the voice file;
and receiving verification information returned by the user based on the broadcasted voice, and further processing corresponding services based on the verification information.
Optionally, before generating the verification code, the method further comprises:
in response to detecting a user interaction event with the authentication dialog, an authentication process is triggered.
Optionally, after generating the verification code, the method further comprises:
and encrypting the verification code to generate an encrypted string.
Optionally, generating the voice file based on the verification code and the language identification includes:
acquiring a basic voice file in a basic voice library corresponding to the language identification;
and matching the encrypted string with the basic voice files, and assembling all the basic voice files obtained through matching to generate a complete voice file.
Optionally, before calling the voice broadcast interface corresponding to the terminal identifier, the method further includes:
and generating a verification code picture corresponding to the voice file based on the encrypted string.
Optionally, the corresponding voice broadcast is performed based on a voice file, including:
and responding to the detected interaction event of the user to the verification code picture, and carrying out voice broadcasting on the voice file corresponding to the verification code picture.
Optionally, processing the corresponding service based on the verification information includes:
matching the verification information with the verification code, and executing the service processing corresponding to the service processing request in response to successful matching;
and responding to the matching failure, and returning request failure information.
In addition, the present application also provides a service processing apparatus, including:
the receiving unit is configured to receive the service processing request and acquire a corresponding language identifier and a terminal identifier;
a voice file generating unit configured to generate a verification code, and further to invoke a basic voice library to generate a voice file based on the verification code and the language identification;
the voice broadcasting unit is configured to call a voice broadcasting interface corresponding to the terminal identifier so as to perform corresponding voice broadcasting based on the voice file;
and the service processing unit is configured to receive verification information returned by the user based on the broadcasted voice, and further process the corresponding service based on the verification information.
Optionally, the receiving unit is further configured to:
in response to detecting a user interaction event with the authentication dialog, an authentication process is triggered.
Optionally, the apparatus further comprises an encryption unit configured to:
and encrypting the verification code to generate an encrypted string.
Optionally, the voice file generating unit is further configured to:
acquiring a basic voice file in a basic voice library corresponding to the language identification;
and matching the encrypted string with the basic voice files, and assembling all the basic voice files obtained through matching to generate a complete voice file.
Optionally, the apparatus further comprises a verification code picture generation unit configured to:
and generating a verification code picture corresponding to the voice file based on the encrypted string.
Optionally, the voice broadcasting unit is further configured to:
and responding to the detected interaction event of the user to the verification code picture, and performing voice broadcasting on the voice file corresponding to the verification code picture.
Optionally, the service processing unit is further configured to:
matching the verification information with the verification code, and executing the service processing corresponding to the service processing request in response to the successful matching;
and responding to the matching failure, and returning request failure information.
In addition, the present application also provides a service processing electronic device, including: one or more processors; a storage device for storing one or more programs which, when executed by one or more processors, cause the one or more processors to implement the business process method as described above.
In addition, the present application also provides a computer readable medium, on which a computer program is stored, which when executed by a processor implements the service processing method as described above.
To achieve the above object, according to still another aspect of embodiments of the present application, there is provided a computer program product.
A computer program product according to an embodiment of the present application includes a computer program, and when the computer program is executed by a processor, the computer program implements a service processing method according to an embodiment of the present application.
One embodiment of the above invention has the following advantages or benefits: the method comprises the steps of receiving a service processing request to obtain a corresponding language identifier and a corresponding terminal identifier; generating a verification code, and then calling a basic voice library to generate a voice file based on the verification code and the language identification; calling a voice broadcast interface corresponding to the terminal identification to perform corresponding voice broadcast based on the voice file; and receiving verification information returned by the user based on the broadcasted voice, and further processing corresponding services based on the verification information. The method can support multi-language voice broadcast, so that the vision-impaired client can accurately perform safety verification of the graphic verification code, better service is provided for the vision-impaired client, and the vision-impaired client can complete transaction service by self.
Further effects of the above-mentioned non-conventional alternatives will be described below in connection with the embodiments.
Drawings
The drawings are included to provide a further understanding of the application and are not to be construed as limiting the application. Wherein:
fig. 1 is a schematic diagram of a main flow of a business processing method according to a first embodiment of the present application;
fig. 2 is a schematic diagram of a main flow of a service processing method according to a second embodiment of the present application;
fig. 3 is a schematic diagram of a main flow of a service processing method according to a third embodiment of the present application;
fig. 4 is a schematic view of an application scenario of a service processing method according to a fourth embodiment of the present application;
fig. 5 is a schematic diagram of the main elements of a traffic processing apparatus according to an embodiment of the present application;
FIG. 6 is an exemplary system architecture diagram to which embodiments of the present application may be applied;
fig. 7 is a schematic structural diagram of a computer system suitable for implementing the terminal device or the server according to the embodiment of the present application.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness. According to the technical scheme, the data acquisition, storage, use, processing and the like meet relevant regulations of national laws and regulations.
Fig. 1 is a schematic diagram of a main flow of a service processing method according to a first embodiment of the present application, and as shown in fig. 1, the service processing method includes:
step S101, receiving a service processing request, and acquiring a corresponding language identifier and a terminal identifier.
In this embodiment, an execution main body (for example, a server) of the service processing method may receive the service processing request through a wired connection or a wireless connection. The service processing request may be, for example, a login service, a registration service, and the like. And triggering the business processing process by triggering the login button control or the registration button control on the current page by the user, and sending a business processing request to the execution main body. The execution main body receives the service processing request, and can acquire the language identifier and the terminal identifier carried in the request. The language identification corresponds to a language selection button control on the current page clicked by the user. The user selects the language by clicking on the language selection button control. The terminal identifier is an identifier corresponding to a carrier on which the current page depends, and may be, for example, an identifier corresponding to a PC terminal of a personal computer, an identifier corresponding to a browser of a mobile phone, an identifier corresponding to a client of the mobile phone, an identifier corresponding to a tablet PC terminal, and the like.
Specifically, before generating the verification code, the method further comprises:
in response to detecting a user interaction event with the authentication dialog, an authentication process is triggered.
The user may interact with the execution subject by clicking on the verification dialog. And when the execution main body detects that the user clicks the verification dialog box, namely the execution main body detects that the interaction event corresponding to the verification dialog box is triggered, triggering the verification process. Specifically, the verification process may present a graphical verification code to the user for the execution subject, and determine whether to process the service processing request initiated by the user by verifying whether the graphical verification code input by the user is consistent with the verification code copy retained in the background. And if so, processing the service processing request initiated by the user, such as allowing the user to log in or allowing the user to register. And if not, returning request failure information to the user.
Step S102, generating a verification code, and then calling a basic voice library to generate a voice file based on the verification code and the language identification.
As shown in fig. 4, after the verification process passes the verification, the execution main body may invoke a verification code program (verification code servlet) to generate a verification code encryption string with 5 bits (for example only, 6 bits, n bits, and the like may also be used, and the number of bits of the verification code is not specifically limited in this embodiment of the present application, and the verification code may be a pure letter, a pure number, or a combination of a letter and a number, and the form of the verification code is not limited in this embodiment of the present application), and then invoke a voice program (voice servlet) to decrypt the encryption string, and match the voice file in the basic voice library, thereby generating a complete verification code voice file. For example, the server randomly generates a 5-bit (the number of bits is not limited in this embodiment of the present application) verification code (including numbers and letters), and encrypts the character string. The encryption string can be simultaneously applied to voice streams and image streams, and the consistency of verification code pictures and voice broadcast contents can be ensured. The voice servlet decrypts the verification code encrypted string and obtains 5-bit verification code information. And matching the voice files corresponding to the five characters in the basic voice library (capable of distinguishing multiple languages), and integrating the voice files into a complete voice stream to be output. The front-end system calls the voice servlet and uploads the corresponding voice identification, so that the corresponding verification code voice file can be obtained, and the barrier-free broadcasting function can be realized.
And step S103, calling a voice broadcast interface corresponding to the terminal identification so as to perform corresponding voice broadcast based on the voice file.
After generating a complete verification code voice file, the execution main body can initiate a page request through a front-end calling party, call a voice servlet to obtain the voice file, and play the sound of the voice file when detecting that the voice file is triggered by the outside world so as to perform voice broadcast on the voice file.
And step S104, receiving verification information returned by the user based on the broadcasted voice, and processing corresponding services based on the verification information.
After hearing the verification information corresponding to the voice file broadcasted by the voice, the user can input the heard verification information in the verification dialog box, so that the execution main body can verify the verification information based on the received verification information input by the user.
Specifically, processing a corresponding service based on the verification information includes:
matching the verification information with a verification code (namely a verification code text copy stored in a background), and executing the processing of the service corresponding to the service processing request in response to the successful matching; and responding to the matching failure, and returning request failure information.
After receiving the verification information returned by the user based on the broadcasted voice, the execution main body can verify the verification information and the verification code text copy stored in the background, judge whether the verification information and the verification code text copy are consistent, and if the verification information and the verification code text copy are consistent, perform corresponding business processing, such as executing registration business processing, executing login business processing and the like. If not, returning request failure information, such as returning registration failure information, returning login failure information, etc.
In the embodiment, the corresponding language identifier and the terminal identifier are acquired by receiving the service processing request; generating a verification code, and then calling a basic voice library to generate a voice file based on the verification code and the language identification; calling a voice broadcast interface corresponding to the terminal identification to perform corresponding voice broadcast based on the voice file; and receiving verification information returned by the user based on the broadcasted voice, and further processing corresponding services based on the verification information. The method can support multi-language voice broadcast, so that the vision-impaired client can accurately perform safety verification of the graphic verification code, better service is provided for the vision-impaired client, and the vision-impaired client can complete transaction service by self.
Fig. 2 is a schematic main flow diagram of a service processing method according to a second embodiment of the present application, and as shown in fig. 2, the service processing method includes:
step S201, receiving a service processing request, and acquiring a corresponding language identifier and a terminal identifier.
Step S202, generating a verification code, encrypting the verification code and generating an encryption string.
Specifically, the execution principal may encrypt the verification code by a Message-Digest Algorithm (MD 5) to generate an encrypted string (i.e., a hash value). The principle of the MD5 algorithm is: the MD5 code processes incoming information (i.e., the authentication code) in 512-bit packets, and each packet is divided into 16 32-bit sub-packets, and after a series of processing, the output of the algorithm is composed of four 32-bit packets, and the four 32-bit packets are concatenated to generate a 128-bit hash value.
Step S203, calling a basic voice library to generate a voice file based on the verification code and the language identification.
And after the execution main body obtains the encryption string corresponding to the verification code, the execution main body can call the basic voice library. And positioning each basic voice corresponding to the language identifier in the basic voice library according to the language identifier carried in the service processing request, and if the language identifier corresponds to English (or Chinese, the type of the language corresponding to the language identifier is not specifically limited in the embodiment of the application), matching the English (or Chinese) basic voice in the basic voice library with each byte code in the encrypted string.
Specifically, generating a voice file based on the verification code and the language identification includes: acquiring a basic voice file in a basic voice library corresponding to the language identification; and matching the encrypted string with the basic voice files, and assembling all the basic voice files obtained through matching to generate a complete voice file.
Step S204, generating a verification code picture corresponding to the voice file based on the encrypted string.
The execution main body generates a voice file based on the encryption string and the basic voice library, and simultaneously generates a verification code picture corresponding to the generated voice file so as to ensure that the voice file of the voice broadcast is consistent with the content of the verification code picture displayed to the user.
Step S205, in response to detecting the interaction event of the user with the verification code picture, calling a voice broadcast interface corresponding to the terminal identifier, and performing voice broadcast on the voice file corresponding to the verification code picture.
When the click operation for the verification code picture is detected, the execution main body can determine that the interaction between the user and the verification code picture triggers an interaction event, and the execution main body can call a voice broadcast interface corresponding to the terminal identifier (if the terminal identifier corresponds to the mobile phone terminal, a playing device of the mobile phone terminal is called, for example, a microphone of the mobile phone terminal) to perform voice broadcast on the voice file.
And step S206, receiving verification information returned by the user based on the broadcasted voice, and further processing corresponding services based on the verification information.
The execution main body can receive the verification information input by the user in the verification dialog box, match the verification information with the verification code text copy reserved in the background, and execute the corresponding service processing according to the matching result.
The embodiment of the application provides a method for generating verification code voice broadcast based on file stream in service processing, which can be realized by the following three steps: 1. the server randomly generates a 5-bit verification code (comprising numbers and letters) and generates an encryption string; 2. the servlet of the voice verification code acquires the verification code encryption string, decrypts the verification code encryption string and generates a corresponding voice file; 3. the front end calls the request voice servlet, so that the voice file can be obtained and broadcasted through the player of the front end. Among other things, servlets provide a number of utility routines such as automatically parsing and decoding HTML form data, reading and setting HTTP headers, processing cookies, tracking session state, and the like. servlets are able to interact directly with a Web server. servlets are also able to share data among programs, making functions such as a pool of database connections easy to implement. servlets are small programs that run on a server, typically intended to run on a client, resulting in services such as computing for the user or positioning graphics based on user interactions.
In the embodiment of the application, js is named JavaScript, and is a lightweight, interpreted or just-in-time compiled programming language with function priority; it is a high-level script language belonging to network, mainly used for Web, and is commonly used for adding various dynamic functions to Web page. And (4) pattern verification code: the abbreviation for CAPTCHA (CAPTCHA), which is "complete Automated piping test to tell Computers and Humans" is a Public, fully Automated program that distinguishes between a user and a computer or a human. It is possible to prevent: the password is cracked maliciously, the ticket is swiped, and the forum is irrigated, so that a hacker is effectively prevented from making continuous login attempts for a certain specific registered user in a brute force cracking mode of a specific program. And (3) barrier-free: the Web Content Accessibility guide wcag (Web Content Accessibility guides) covers various suggestions that make Web Content more accessible. Following these criteria will make it easier for more disabled people to access web site content, including those with blindness and amblyopia, deafness and hearing loss, limited movement, speech impairment, photosensitivity and a combination of multiple disabilities, as well as those with learning disabilities and cognitive limitations; but will not meet all of the needs of these disabled users.
The voice broadcast function of the embodiment of the application can be called in a js loading or target link (a user can trigger voice broadcast by clicking the target link), can be flexibly used in a plurality of scenes such as a PC (personal computer) end browser, a mobile phone browser and a mobile phone client, and improves the application capability of the system. Meanwhile, the function well makes up the defect of barrier-free function, provides better service for the vision-impaired customers and embodies the humanistic spirit of the system. The embodiment of the application synthesizes the voice file through the voice file, can support multiple languages to play, and supports multiple combination modes of letters and arrays. And various devices are supported, and the voice stream can be obtained through the request string without the limitation of a platform. The independent servlet generates an encrypted voice stream, and the background reserves a text copy of the verification code for verification, so that the method is safe and reliable. Provides better service for the vision-impaired customers and embodies the humanistic spirit of the system.
Fig. 3 is a schematic main flow diagram of a service processing method according to a third embodiment of the present application, and as shown in fig. 3, the service processing method includes:
step S301, receiving a service processing request, and acquiring a corresponding language identifier and a terminal identifier.
The service processing request may be, for example, a login authentication request or a registration authentication request, and the specific content of the service processing request is not limited in this embodiment of the application.
The service processing request may carry a language identifier and a terminal identifier. The language identification is used for representing the language type based on the business processing. The number of the terminal identifications can be one or more, when the number of the terminal identifications is multiple, the service processing method can be used for service processing requests initiated by the multiple terminals through the same interface, namely the service processing method can be suitable for various terminals and has strong universality.
Step S302, generating a verification code, encrypting the verification code and generating an encryption string.
The generation of the verification code may be randomly generated by the execution agent. The verification code can be encrypted by adopting a symmetric encryption algorithm (AES, DES and 3DES), wherein the symmetric encryption algorithm is that the encryption and decryption adopt the same key and are reversible (namely, can decrypt) to generate an encryption string.
Step S303, a basic voice library is called, and a basic voice file in the basic voice library corresponding to the language identifier is obtained.
The basic speech library may store basic speech of various languages, basic speech of various sound colors, basic speech of various accents, and the like.
And step S304, matching the encrypted string with the basic voice files, and assembling the matched basic voice files to generate a complete voice file.
For example, after matching the basic speech in english (or chinese) in the basic speech library with each bytecode in the encrypted string, the execution body may assemble the matched basic speech in english (or chinese) in the basic speech library based on the arrangement order of the bytecodes in the encrypted string to obtain a final speech file, such as ASJ 3.
Step S305, calling a voice broadcast interface corresponding to the terminal identification so as to perform corresponding voice broadcast based on the voice file.
And step S306, receiving verification information returned by the user based on the broadcast voice, and processing corresponding services based on the verification information.
As another implementation manner of the embodiment of the present application, the execution main body may further obtain an accent identifier in the service processing request, determine a matched basic voice from the basic voice library according to the accent identifier, and further assemble each basic voice file obtained by matching to generate a complete voice file. Therefore, the scheme of the application can be suitable for clients with various accents, the clients can more accurately determine the corresponding picture verification codes through the voice files broadcasted through the voice, and the verification dialog box is input to conduct verification, so that the user experience is greatly improved.
Fig. 5 is a schematic diagram of main units of a service processing apparatus according to an embodiment of the present application. As shown in fig. 5, the service processing apparatus 500 includes a receiving unit 501, a voice file generating unit 502, a voice broadcasting unit 503, and a service processing unit 504.
A receiving unit 501, configured to receive a service processing request, and obtain a corresponding language identifier and a terminal identifier;
a voice file generating unit 502 configured to generate a verification code, thereby calling a basic voice library to generate a voice file based on the verification code and a language identification;
the voice broadcasting unit 503 is configured to call a voice broadcasting interface corresponding to the terminal identifier, so as to perform corresponding voice broadcasting based on the voice file;
a service processing unit 504 configured to receive verification information returned by the user based on the broadcasted voice, and further process the corresponding service based on the verification information
In some embodiments, the receiving unit 501 is further configured to: in response to detecting a user interaction event with the authentication dialog, an authentication process is triggered.
In some embodiments, the apparatus further comprises an encryption unit, not shown in fig. 5, configured to: and encrypting the verification code to generate an encrypted string.
In some embodiments, the speech file generating unit 502 is further configured to: acquiring a basic voice file in a basic voice library corresponding to the language identification; and matching the encrypted string with the basic voice files, and assembling all the basic voice files obtained through matching to generate a complete voice file.
In some embodiments, the apparatus further comprises a verification code picture generation unit, not shown in fig. 5, configured to: and generating a verification code picture corresponding to the voice file based on the encrypted string.
In some embodiments, the voice announcement unit 503 is further configured to: and responding to the detected interaction event of the user to the verification code picture, and carrying out voice broadcasting on the voice file corresponding to the verification code picture.
In some embodiments, the traffic processing unit 504 is further configured to: matching the verification information with the verification code, and executing the service processing corresponding to the service processing request in response to successful matching; and responding to the matching failure, and returning request failure information.
It should be noted that, in the present application, the service processing method and the service processing apparatus have corresponding relation in the specific implementation content, so the repeated content is not described again.
Fig. 6 shows an exemplary system architecture 600 to which the service processing method or the service processing apparatus according to the embodiment of the present application can be applied.
As shown in fig. 6, the system architecture 600 may include terminal devices 601, 602, 603, a network 604, and a server 605. The network 604 serves to provide a medium for communication links between the terminal devices 601, 602, 603 and the server 605. Network 604 may include various types of connections, such as wire, wireless communication links, or fiber optic cables, to name a few.
A user may use the terminal devices 601, 602, 603 to interact with the server 605 via the network 604 to receive or send messages or the like. The terminal devices 601, 602, 603 may have installed thereon various communication client applications, such as shopping applications, web browser applications, search applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 601, 602, 603 may be various electronic devices having a business process screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 605 may be a server providing various services, such as a background management server (for example only) providing support for tasks submitted by users using the terminal devices 601, 602, 603. The background management server can receive the service processing request and acquire the corresponding language identification and the terminal identification; generating a verification code, and then calling a basic voice library to generate a voice file based on the verification code and the language identification; calling a voice broadcast interface corresponding to the terminal identification to perform corresponding voice broadcast based on the voice file; and receiving verification information returned by the user based on the broadcasted voice, and further processing corresponding services based on the verification information. The method can support multi-language voice broadcast, so that the vision-impaired client can accurately perform safety verification of the graphic verification code, better service is provided for the vision-impaired client, and the vision-impaired client can complete transaction service by self.
It should be noted that the service processing method provided in the embodiment of the present application is generally executed by the server 605, and accordingly, the service processing apparatus is generally disposed in the server 605.
It should be understood that the number of terminal devices, networks, and servers in fig. 6 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to FIG. 7, shown is a block diagram of a computer system 700 suitable for use in implementing a terminal device of an embodiment of the present application. The terminal device shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 7, the computer system 700 includes a Central Processing Unit (CPU)701, which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. In the RAM703, various programs and data necessary for the operation of the computer system 700 are also stored. The CPU701, the ROM702, and the RAM703 are connected to each other via a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
The following components are connected to the I/O interface 705: an input portion 706 including a keyboard, a mouse, and the like; an output section 707 including a display such as a Cathode Ray Tube (CRT), a liquid crystal credit authorization query processor (LCD), and the like, and a speaker and the like; a storage section 708 including a hard disk and the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. A drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read out therefrom is mounted into the storage section 708 as necessary.
In particular, according to embodiments disclosed herein, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, embodiments disclosed herein include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 709, and/or installed from the removable medium 711. The computer program executes the above-described functions defined in the system of the present application when executed by the Central Processing Unit (CPU) 701.
It should be noted that the computer readable medium shown in the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may include, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software or hardware. The described units may also be provided in a processor, and may be described as: a processor includes a receiving unit, a voice file generating unit, a voice broadcast and a service processing unit. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs, and when the one or more programs are executed by one of the devices, the device receives a service processing request and acquires a corresponding language identifier and a corresponding terminal identifier; generating a verification code, and then calling a basic voice library to generate a voice file based on the verification code and the language identification; calling a voice broadcast interface corresponding to the terminal identification to perform corresponding voice broadcast based on the voice file; and receiving verification information returned by the user based on the broadcasted voice, and further processing corresponding services based on the verification information.
The computer program product of the present application includes a computer program, and the computer program realizes the service processing method in the embodiment of the present application when being executed by a processor.
According to the technical scheme of the embodiment of the application, multi-language voice broadcasting can be supported, so that vision-impaired clients can accurately perform safety verification on the graphic verification codes, better service is provided for the vision-impaired clients, and the vision-impaired clients can complete transaction services by themselves.
The above-described embodiments should not be construed as limiting the scope of the present application. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may occur depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (16)

1. A method for processing a service, comprising:
receiving a service processing request, and acquiring a corresponding language identifier and a terminal identifier;
generating a verification code, and then calling a basic voice library to generate a voice file based on the verification code and the language identification;
calling a voice broadcast interface corresponding to the terminal identification to perform corresponding voice broadcast based on the voice file;
and receiving verification information returned by the user based on the broadcasted voice, and processing corresponding services based on the verification information.
2. The method of claim 1, wherein prior to said generating the verification code, the method further comprises:
in response to detecting a user interaction event with the authentication dialog, an authentication process is triggered.
3. The method of claim 1, wherein after the generating the verification code, the method further comprises:
and encrypting the verification code to generate an encrypted string.
4. The method of claim 3, wherein generating a voice file based on the verification code and the language identification comprises:
acquiring a basic voice file in the basic voice library corresponding to the language identifier;
and matching the encrypted string with the basic voice files, and assembling the matched basic voice files to generate a complete voice file.
5. The method according to claim 3, wherein before the calling the voice broadcast interface corresponding to the terminal identifier, the method further comprises:
and generating a verification code picture corresponding to the voice file based on the encrypted string.
6. The method according to claim 5, wherein the performing the corresponding voice broadcast based on the voice file comprises:
and responding to the detected interaction event of the user to the verification code picture, and carrying out voice broadcasting on the voice file corresponding to the verification code picture.
7. The method according to any one of claims 1 to 6, wherein the processing the corresponding service based on the verification information comprises:
matching the verification information with the verification code, and executing the service processing corresponding to the service processing request in response to the successful matching;
and responding to the matching failure, and returning request failure information.
8. A traffic processing apparatus, comprising:
the receiving unit is configured to receive the service processing request and acquire a corresponding language identifier and a terminal identifier;
a voice file generating unit configured to generate a verification code and further call a basic voice library to generate a voice file based on the verification code and the language identification;
the voice broadcasting unit is configured to call a voice broadcasting interface corresponding to the terminal identifier so as to perform corresponding voice broadcasting based on the voice file;
and the service processing unit is configured to receive verification information returned by the user based on the broadcasted voice and further process the corresponding service based on the verification information.
9. The apparatus of claim 8, wherein the receiving unit is further configured to:
in response to detecting a user interaction event with the authentication dialog, an authentication process is triggered.
10. The apparatus of claim 8, further comprising an encryption unit configured to:
and encrypting the verification code to generate an encrypted string.
11. The apparatus of claim 10, wherein the voice file generating unit is further configured to:
acquiring a basic voice file in the basic voice library corresponding to the language identifier;
and matching the encrypted string with the basic voice files, and assembling the matched basic voice files to generate a complete voice file.
12. The apparatus according to claim 10, wherein the apparatus further comprises a verification code picture generation unit configured to:
and generating a verification code picture corresponding to the voice file based on the encrypted string.
13. The apparatus of claim 12, wherein the voice announcement unit is further configured to:
and responding to the detected interaction event of the user to the verification code picture, and carrying out voice broadcasting on the voice file corresponding to the verification code picture.
14. A transaction processing electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-7.
15. A computer-readable medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-7.
16. A computer program product comprising a computer program, wherein the computer program, when executed by a processor, implements the method of any one of claims 1-7.
CN202210143017.7A 2022-02-16 2022-02-16 Service processing method and device, electronic equipment and computer readable medium Pending CN114614980A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210143017.7A CN114614980A (en) 2022-02-16 2022-02-16 Service processing method and device, electronic equipment and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210143017.7A CN114614980A (en) 2022-02-16 2022-02-16 Service processing method and device, electronic equipment and computer readable medium

Publications (1)

Publication Number Publication Date
CN114614980A true CN114614980A (en) 2022-06-10

Family

ID=81859695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210143017.7A Pending CN114614980A (en) 2022-02-16 2022-02-16 Service processing method and device, electronic equipment and computer readable medium

Country Status (1)

Country Link
CN (1) CN114614980A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420305A (en) * 2008-11-28 2009-04-29 重庆大学 Speech identifying code implementing method
US20150188915A1 (en) * 2013-12-30 2015-07-02 Tencent Technology (Shenzhen) Company Limited System And Method For Verifying Identity Information Using A Social Networking Application
CN105024816A (en) * 2014-04-25 2015-11-04 腾讯科技(深圳)有限公司 Information verification method based on audio frequency and device
CN112948788A (en) * 2021-04-13 2021-06-11 网易(杭州)网络有限公司 Voice verification method, device, computing equipment and medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101420305A (en) * 2008-11-28 2009-04-29 重庆大学 Speech identifying code implementing method
US20150188915A1 (en) * 2013-12-30 2015-07-02 Tencent Technology (Shenzhen) Company Limited System And Method For Verifying Identity Information Using A Social Networking Application
CN105024816A (en) * 2014-04-25 2015-11-04 腾讯科技(深圳)有限公司 Information verification method based on audio frequency and device
CN112948788A (en) * 2021-04-13 2021-06-11 网易(杭州)网络有限公司 Voice verification method, device, computing equipment and medium

Similar Documents

Publication Publication Date Title
CN107249004B (en) Identity authentication method, device and client
US10033741B2 (en) Scalable and dynamic content obfuscation
CN109214196B (en) Data interaction method, device and equipment
US11303596B2 (en) Method and a device for processing information
KR102279582B1 (en) Conferencing apparatus and method for switching access terminal thereof
CN112187702A (en) Method and device for verifying client
WO2015032281A1 (en) Method and system for generating and processing challenge-response tests
US9830599B1 (en) Human interaction detection
US8892647B1 (en) System and method for associating a cookie with a device identifier
CN114266033A (en) Verification code generation method and device, verification code login system and electronic equipment
EP3667527A1 (en) Client server system
US20200110868A1 (en) Augmented push authentication
CN106254226A (en) A kind of information synchronization method and device
CN113422758B (en) Data encryption method and device, internet of things system, electronic equipment and storage medium
JP7276737B2 (en) Identity verification system and identity verification method
CN115996140A (en) Access content acquisition method, device, equipment and storage medium
CN114614980A (en) Service processing method and device, electronic equipment and computer readable medium
CN111131284B (en) Information verification method and device, electronic equipment and computer readable storage medium
CN111416711B (en) Transaction message processing method and device
CN108549808B (en) Password management method and device
CN113761566A (en) Data processing method and device
CN112598810A (en) Exhibition entrance processing method and device
JP2022528366A (en) Computer systems and methods including the HTML browser approval approach
CN114915462B (en) Cross-station request forgery attack defense method and device, electronic equipment and medium
CN116112172B (en) Android client gRPC interface security verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination