CN115514550A - Interactive verification method and device based on voice tone and electronic equipment - Google Patents

Interactive verification method and device based on voice tone and electronic equipment Download PDF

Info

Publication number
CN115514550A
CN115514550A CN202211131712.8A CN202211131712A CN115514550A CN 115514550 A CN115514550 A CN 115514550A CN 202211131712 A CN202211131712 A CN 202211131712A CN 115514550 A CN115514550 A CN 115514550A
Authority
CN
China
Prior art keywords
voice
verification
text content
characters
character
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202211131712.8A
Other languages
Chinese (zh)
Inventor
葛帅
司玄
肖尧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202211131712.8A priority Critical patent/CN115514550A/en
Publication of CN115514550A publication Critical patent/CN115514550A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04842Selection of displayed objects or displayed text elements

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The disclosure provides a voice tone-based interactive verification method and device, electronic equipment and a storage medium, and relates to the technical field of network and safety. The method comprises the following steps: responding to the verification request, and outputting text content to be verified and verification prompt information, wherein the text content comprises: the method comprises the steps that at least two pronunciations in the characters are characters with different tones, verification prompt information is used for displaying a preset tone which is randomly generated so as to prompt a user to perform touch operation according to the preset tone, and a touch result is obtained in response to the touch operation of a target user on text contents, wherein the touch result is one or more characters selected from the text contents by the target user according to the verification prompt information, and the touch result is verified to obtain a verification result. The difficulty that the artificial intelligence technology bypasses the interactive verification process can be increased through the characters of various tones in the text content, and the reliability of the verification process is improved.

Description

Interactive verification method and device based on voice tone and electronic equipment
Technical Field
The present disclosure relates to the field of network and security technologies, and in particular, to a method and an apparatus for interactive authentication based on voice tone, and an electronic device.
Background
With the continuous progress of internet technology, the internet brings great convenience to various industries and users, but in the process of interaction between users by setting a login interface, internet services often verify the authenticity of users for the safety of data and no waste of network resources.
With the improvement of artificial intelligence technology, the conventional verification mode is gradually difficult to identify the counterfeit request attack after the iterative upgrade of the analytic technology, the credibility of the man-machine interaction verification is gradually reduced, how to increase the machine identification cost and improve the verification credibility are problems to be solved urgently.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The utility model provides an interactive verification, device and electronic equipment based on pronunciation tone overcomes the problem that the credibility of verifying user's authenticity is low in the correlation technique, man-machine interaction verification process at least to a certain extent.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
In a first aspect, an embodiment of the present disclosure provides a voice tone-based interactive authentication method, where the method includes:
responding to the verification request, and outputting text content to be verified and verification prompt information; wherein, the text content comprises: a plurality of characters; at least two pronunciations in the characters are characters with different tones; the verification prompt information is used for displaying a preset tone generated randomly so as to prompt a user to perform touch operation according to the preset tone;
responding to the touch operation of the target user on the text content to obtain a touch result; the touch result is one or more characters selected from the text content by the target user according to the verification prompt information;
and verifying the touch result to obtain a verification result.
In an embodiment of the present disclosure, the outputting the text content to be verified and the verification prompt information in response to the verification request includes:
responding to a verification request, and randomly extracting a plurality of character samples from a pre-established text library to serve as text contents to be verified;
and randomly selecting a target character from the plurality of characters, determining a preset tone of the target character, and outputting the verification prompt message.
In an embodiment of the present disclosure, the verifying the touch result to obtain a verification result includes:
if the touch result is the characters with preset tones in the verification prompt information, returning verification passing indication information of the verification request;
and if the touch result comprises characters except for the characters with preset tone in the verification prompt information in the text content, returning verification failure indication information of the verification request, and prompting the target user to verify again.
In an embodiment of the present disclosure, after outputting the text content to be verified and the verification prompt information in response to the verification request, the method further includes:
outputting a voice playing icon;
responding to the operation of touching the voice playing icon by the target user, and outputting voice data; the voice data comprises pronunciation corresponding to each character in text content, so that the target user can select characters with preset tone from the text content according to the voice data.
In an embodiment of the present disclosure, the outputting the voice playing icon includes:
extracting a voice sample corresponding to each character in the text content from a voice library which is established in advance and has a corresponding relation with a character library;
and generating and obtaining the voice playing icon according to the voice sample corresponding to each character in the text content.
In an embodiment of the present disclosure, the generating the voice playing icon according to the voice sample corresponding to each word in the text content includes:
splicing the voice samples corresponding to each character in the text content to obtain voice information to be played;
and rendering the voice information to be played to obtain a voice playing icon.
In one embodiment of the present disclosure, the manner of establishing the speech library corresponding to the text library is as follows:
acquiring character samples of four tones, storing the character samples in a database, and establishing a character library;
and storing a voice sample corresponding to each character sample in the character library, creating a corresponding relation between the character sample and the voice sample, and establishing a voice library corresponding to the character library.
In a second aspect, an embodiment of the present disclosure provides an interactive authentication apparatus based on voice tones, including:
the acquisition unit is used for responding to the verification request and outputting the text content to be verified and verification prompt information; wherein, the text content comprises: a plurality of characters; at least two pronunciations in the characters are characters with different tones; the verification prompt information is used for displaying a preset tone generated randomly so as to prompt a user to perform touch operation according to the preset tone;
the touch control unit is used for responding to the touch control operation of the target user on the text content to obtain a touch control result; the touch result is one or more characters selected from the text content by the target user according to the verification prompt information;
and the verification unit is used for verifying the touch result to obtain a verification result.
In an embodiment of the present disclosure, the obtaining unit is further configured to:
responding to a verification request, and randomly extracting a plurality of character samples from a pre-established text library to serve as text contents to be verified;
randomly selecting a target character from the plurality of characters, determining a preset tone of the target character, and outputting the verification prompt information.
In an embodiment of the present disclosure, the verification unit is further configured to:
if the touch result is the characters with preset tones in the verification prompt information, returning verification passing indication information of the verification request;
if the touch result comprises characters except for the characters with preset tone in the verification prompt information in the text content, returning verification failure indication information of the verification request and prompting the target user to re-verify
In an embodiment of the present disclosure, the interactive authentication device based on voice tone further includes:
the voice prompt unit is used for outputting a voice playing icon;
responding to the operation of the target user for touching the voice playing icon, and outputting voice data; the voice data comprises pronunciation corresponding to each character in text content, so that the target user can select characters with preset tone from the text content according to the voice data.
In an embodiment of the present disclosure, the voice prompt unit is further configured to:
extracting a voice sample corresponding to each character in the text content from a voice library which is established in advance and has a corresponding relation with a character library;
and generating and obtaining the voice playing icon according to the voice sample corresponding to each character in the text content.
In an embodiment of the present disclosure, the voice prompt unit is further configured to:
splicing the voice samples corresponding to each character in the text content to obtain voice information to be played;
and rendering the voice information to be played to obtain a voice playing icon.
In an embodiment of the present disclosure, the interactive authentication device based on voice tone further includes:
the system comprises an establishing unit, a searching unit and a searching unit, wherein the establishing unit is used for acquiring character samples of four tones, storing the character samples in a database and establishing a character library;
and storing a voice sample corresponding to each character sample in the character library, creating a corresponding relation between the character sample and the voice sample, and establishing a voice library corresponding to the character library.
In a third aspect, an embodiment of the present disclosure provides an electronic device, including: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to perform the method of the first aspect described above via execution of the executable instructions.
In a fourth aspect, the present disclosure provides a computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the method described in the first aspect above.
In a fifth aspect, according to another aspect of the present disclosure, there is also provided a computer program product or a computer program comprising computer instructions, the computer instructions being stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions to cause the computer device to perform the method of any of the above.
The embodiment of the disclosure provides an interactive verification method based on voice tone, which responds to a verification request and outputs text content to be verified and verification prompt information; wherein, the text content comprises: a plurality of characters; at least two pronunciations in the characters are characters with different tones; the verification prompt information is used for displaying the preset tone generated randomly so as to prompt a user to perform touch operation according to the preset tone, and a touch result is obtained in response to the touch operation of the target user on the text content; and the touch result is one or more characters selected from the text content by the target user according to the verification prompt information, and the touch result is verified to obtain a verification result.
In the verification process, the user is verified by the verification prompt message which contains a plurality of text contents, corresponds to at least two different tones and is generated randomly. The character content comprises characters with various tones, the components in the verification process are subjected to confusion interference, verification prompt information is randomly generated every time, the reliability of the verification process can be increased, the characters are prevented from being directly prompted in the verification prompt information in the interactive verification process, artificial intelligence is enabled to identify the characters in the verification prompt information, the text content to be verified can be finally directly selected, the difficulty of bypassing the interactive verification by the artificial intelligence is increased, and the reliability of the interactive verification process is high.
Furthermore, the voice playing icon can be touched through the voice playing icon, the text content to be verified and the verification prompt information mode, so that a target user can carry out interactive verification operation according to voice data, the voice data comprises characters of various tones and is randomly spliced, artificial intelligence can be effectively prevented from acquiring effective information, the voice playing icon is provided for playing the voice data aiming at polyphones, and the user can be enabled to carry out verification more accurately. The method is more important, when the voice data is played, the tone of the played character pronunciation can be mixed with other characters in the voice data to confuse the text content to be verified, so that the voice recognition technology is prevented from recognizing and translating the voice, the tone of the character pronunciation is concerned, reference factors are increased, and the reliability of the verification process is increased.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty.
FIG. 1 is a schematic structural diagram illustrating an interactive verification system in an embodiment of the present disclosure;
FIG. 2 is a flow chart illustrating an interactive authentication method in an embodiment of the present disclosure;
FIG. 3 is a schematic diagram of an interface in an interactive verification process in an embodiment of the present disclosure;
FIG. 4 is a flow chart diagram illustrating another interactive authentication method in an embodiment of the present disclosure;
FIG. 5 is a second schematic diagram of an interface in an interactive authentication process according to an embodiment of the disclosure;
FIG. 6 is a third schematic diagram of an interface in an interactive verification process according to an embodiment of the disclosure;
FIG. 7 is a schematic structural diagram of an interactive authentication device in an embodiment of the present disclosure;
fig. 8 shows a schematic structural diagram of an electronic device in an embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
Because the mode for verifying the authenticity of the user is simple in the current internet, the technical scheme in the prior art is as follows: for example, the text is displayed in the prompt message to allow the user to perform authentication in the authentication content, so that the authentication content is easily identified by the image identification technology, and the authentication can be bypassed. Or, the voice is played by clicking, and the characters corresponding to the voice content are selected for verification, so that the simple voice recognition technology can pass the verification. By the method, the safety and the reliability of the man-machine interaction verification are low.
Based on the above, the present disclosure provides a voice tone-based interactive authentication method, which responds to an authentication request and outputs text content to be authenticated and authentication prompt information; wherein, the text content comprises: a plurality of characters; at least two pronunciations in the characters are characters with different tones; the verification prompt information is used for displaying the randomly generated preset tone to prompt a user to perform touch operation according to the preset tone; responding to the touch operation of the target user on the text content to obtain a touch result; the touch result is one or more characters selected from the text content by the target user according to the verification prompt information; the touch result is verified to obtain a verification result, and the interference of artificial intelligence to the verification process can be effectively prevented through the characters of various different tones and the verification prompt information. .
The interactive verification method based on the voice tone can be applied to electronic equipment, and the electronic equipment can be terminal equipment and can also be a server.
FIG. 1 shows a schematic diagram of an interactive proof system that may be applied to embodiments of the present disclosure.
As shown in fig. 1, interactive authentication system 100 may include terminal device 101, network 102, and server 103.
The medium of the network 102 for providing a communication link between the terminal device 101 and the server 103 may be a wired network or a wireless network.
Optionally, the wireless or wired networks described above use standard communication techniques and/or protocols. The Network is typically the Internet, but can be any Network including, but not limited to, a Local Area Network (LAN), a Metropolitan Area Network (MAN), a Wide Area Network (WAN), a mobile, wired or wireless Network, a private Network, or any combination of virtual private networks. In some embodiments, data exchanged over a network is represented using techniques and/or formats including Hypertext Mark-up Language (HTML), extensible markup Language (XML), and the like. All or some of the links may also be encrypted using conventional encryption techniques such as Secure Socket Layer (SSL), transport Layer Security (TLS), virtual Private Network (VPN), internet protocol Security (IPsec), and so on. In other embodiments, custom and/or dedicated data communication techniques may also be used in place of, or in addition to, the data communication techniques described above.
The terminal device 101 may be a variety of electronic devices including, but not limited to, a smartphone, a tablet, a laptop, a desktop computer, a wearable device, an augmented reality device, a virtual reality device, and the like.
Alternatively, the clients of the applications installed in different terminal apparatuses 101 are the same, or clients of the same type of application based on different operating systems. The specific form of the application client may also be different based on different terminal platforms, for example, the application client may be a mobile phone client, a PC client, or the like.
The server 103 may be a server that provides various services, such as a background management server that provides support for devices operated by the user with the terminal apparatus 101. The background management server can analyze and process the received data such as the request and feed back the processing result to the terminal equipment.
Optionally, the server may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a Network service, cloud communication, a middleware service, a domain name service, a security service, a CDN (Content Delivery Network), a big data and artificial intelligence platform, and the like. The terminal may be, but is not limited to, a smart phone, a tablet computer, a laptop computer, a desktop computer, a smart speaker, a smart watch, and the like. The terminal and the server may be directly or indirectly connected through wired or wireless communication, and the disclosure is not limited thereto.
Those skilled in the art will appreciate that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative, and that there may be any number of terminal devices, networks, and servers according to actual needs. The embodiments of the present disclosure are not limited thereto.
The present exemplary embodiment will be described in detail below with reference to the drawings and examples.
First, an interactive verification method based on voice tone is provided in the embodiments of the present disclosure, and the method may be executed by any electronic device with computing processing capability, and the following process takes the electronic device as a terminal device as an example.
Fig. 2 shows a flowchart of voice tone-based interactive authentication in an embodiment of the present disclosure, and as shown in fig. 2, the voice tone-based interactive authentication provided in the embodiment of the present disclosure includes the following steps:
s202: and responding to the verification request, and outputting the text content to be verified and verification prompt information.
Wherein, the text content comprises: a plurality of characters; at least two pronunciations in the characters are characters with different tones; and the verification prompt information is used for displaying the randomly generated preset tone so as to prompt the user to perform touch operation according to the preset tone.
In one possible embodiment, the authentication request in the disclosed embodiments refers to a request sent to distinguish whether the current user is a computer or a human. For example, when a user uses a terminal device to purchase a ticket or uses a mobile phone to log in some application programs, a login request may be sent to the terminal device, where the login request may be an authentication request, and the terminal device may present an authentication interface in response to the authentication request. For example, in response to operations such as user login, registration, and access, in order to verify whether an operator currently performing the operation is a real user, the terminal device may randomly extract some characters from a pre-established text library, and render the characters to obtain text content to be verified. As may be seen in particular in fig. 3. Fig. 3 includes text content to be verified and also includes verification prompt information.
The terminal equipment generates text content to be verified and also generates verification prompt information. It should be noted that the verification prompt information is randomly generated, and the verification prompt information generated each time is different.
Specifically, randomly generated preset tones are displayed in the randomly generated verification prompt information to prompt a user to perform touch operation according to the preset tones. As shown in fig. 3, the verification prompt message only prompts which preset tone should be selected, and no specific text is displayed. Through the mode, the text content to be verified comprises characters with different tones, and the preset tone is displayed in the verification prompt information, so that the verification of the target user can be prompted. The method can effectively avoid the means of character recognition technology and the like and pass the man-machine interaction verification process in an artificial intelligent mode.
Further, in the above method, when the word stock is established in advance, two sub word stocks may be established, wherein one sub word stock includes words with different tones, but it is ensured that polyphones do not exist, and the other sub word stock includes polyphones. During the process of verifying the authenticity of the user through the verification prompt information and the text content to be verified, the text content can be extracted from the text library which does not comprise polyphones, so that the situation that the extracted text content comprises polyphones as far as possible is avoided, and the user cannot select the text according to the preset tone.
In one possible embodiment, in response to a verification request, a plurality of text samples are randomly extracted from a pre-established text library to serve as text content to be verified, a target text is randomly selected from the plurality of texts, a preset tone of the target text is determined, and verification prompt information is output.
Illustratively, in response to a verification request, multiple word samples are walked from the word stock, assuming 4 words, zhao, qian, sun, zheng, are included. The terminal equipment needs to determine which character is selected, and through the verification process, zhao and Zheng are selected as target characters, and the verification prompt message can be displayed as 'selecting two characters with tone as a de-voicing character' or 'selecting a de-voicing character' and the like.
It should be noted that the process of establishing the character library in advance may be to establish a database and add various common characters to the database.
S204: and responding to the touch operation of the target user on the text content to obtain a touch result.
And the touch result is one or more characters selected from the text content by the target user according to the verification prompt information.
In a possible embodiment, the terminal device responds to the touch operation of the target user on the text content to be verified, and obtains a touch result. The manner of obtaining the touch result may be: rendering each character in the text content to be verified, displaying the rendered character on a display interface of the terminal device, recording coordinate information of each character in the display interface, for example, coordinate information of a character control, responding to an operation of a target user clicking the display interface of the terminal device, recording a position clicked by the target user, and synchronously calculating which text corresponds to the position, so that a touch result can be obtained.
S206: and verifying the touch result to obtain a verification result.
In one possible embodiment, there may be a verification result according to the touch result.
(1) If the touch result is the characters with preset tones in the verification prompt information, returning verification passing indication information of the verification request;
(2) And if the touch result comprises characters except the characters with preset tone in the verification prompt information in the text content, returning verification failure indication information of the verification request and prompting the target user to verify again.
In the above manner, if the target user wants to click on the word, the word is Zhao or Zheng. However, the two words do not appear in the verification prompt message, so that the attack of the word recognition technology on the verification process can be effectively avoided. By the method, the credibility of the man-machine interaction verification process can be increased.
In a possible implementation manner, after the text content to be verified and the verification prompt information are output in response to the verification request, the terminal device can also output other content to assist the human-computer interaction verification process, so that the reliability of the human-computer interaction verification process is further increased.
Fig. 4 shows a flow chart of an interactive authentication method based on voice tone, which includes the following steps:
s402: and responding to the verification request, and outputting the text content to be verified, the verification prompt information and the voice playing icon.
In one possible embodiment, in response to the verification request, the text content to be verified is extracted from the text library, and the voice sample corresponding to each text in the text content is extracted from the voice library. The pre-established speech library and the pre-established character library have corresponding relation, each character in the character library has clear pronunciation in the speech library, and the tone of the speech corresponding to the character is clear.
As shown in fig. 5, fig. 5 is a schematic diagram of an interface for interaction according to phonetic characters.
The voice playing method comprises the steps of responding to the fact that a user clicks the voice playing icon, playing voice, and prompting the user to select the text content played in the audio frequency in a display interface of the terminal device. This method can be easily broken by a speech recognition technique, for example, by recognizing speech data in audio by the speech recognition technique and selecting corresponding contents by a character recognition technique. The credibility is low, and the authenticity of the user in the interactive verification process cannot be ensured.
Based on this, fig. 6 in the present disclosure shows an interface schematic diagram of an interactive authentication method based on voice tones.
The display interface schematic diagram of fig. 6 is generated as follows:
after the voice samples corresponding to the characters in the text content are extracted, the voice playing icon can be generated and obtained according to the voice sample corresponding to each character in the text content.
The specific implementation mode of generating the voice playing icon according to the voice sample corresponding to each character in the text content is as follows:
and performing splicing processing on the voice sample corresponding to each character in the text content to obtain voice information to be played, and performing rendering processing on the voice information to be played to obtain a voice playing icon.
Illustratively, n words w _1, w _2.. W _ n are randomly extracted from a pre-established word library, and the corresponding speech samples may be: a _1, a _2.. A _ n, the tones corresponding to the n characters can be: k _1, k _2.. K _ n; the tones of k _1, k _2.. K _ n are not less than two, and the tones are divided into four types of yin-yang-yin, yang-yang, upward and downward.
The speech samples are spliced to obtain a series of continuous speech information to be played, for example: (t _1t _2k _1t _3t _1k _2t _3.. K _ nt _5t _2.), rendering the processed voice information to be played to a display interface of the terminal device, and outputting a voice playing icon.
In a possible embodiment, to further increase the reliability of the verification, the processing may be performed by obfuscating the voice data, as follows:
after the voice samples corresponding to each character in the text content to be verified are extracted, voice samples corresponding to some characters with non-preset tones can be randomly extracted, the voice samples corresponding to the characters with the non-preset tones are spliced with the voice samples corresponding to the characters in the text content to be verified, rendering is carried out, a voice playing icon is finally obtained, and in response to the operation that a target user clicks the voice playing icon, the played voice data also comprises other pronunciation besides the voice samples corresponding to the characters in the text content to be verified.
The display interface of the terminal equipment comprises a voice playing icon, verification prompt information and text content to be verified.
The voice data are played through the voice playing icon, the voice data comprise voice samples corresponding to all characters in the text content to be verified, after a user hears the voice samples, the user selects the voice samples according to verification prompt information, and the verification prompt information does not specifically indicate which character is selected. After the user hears the words, the preset tones can be directly selected according to the prompt. However, with the voice recognition technology, firstly, there is confusing voice in the voice data, secondly, the tones are uneven and the voices are not coherent and are spliced by the voice samples corresponding to the randomly extracted characters, and thirdly, a polyphone character can be selected for confusion, for example, a polyphone character has a silence and a flat sound, and it is desired to select silence this time, but the character is added to the text content to be verified, but only the voice data with the flat sound is played in the voice data, and there is a high possibility that an error will occur due to the voice recognition and the character recognition.
Through the mode, if the verification process of the mode is required to be bypassed through artificial intelligence, specific tones cannot be clearly identified through the voice identification technology, and in addition, the mode of voice playing and the mode of only displaying the preset tones in the preset prompt information cannot be identified through the artificial intelligence, so that the difficulty of bypassing the interactive verification method in the disclosure through the artificial intelligence is greatly improved, and the reliability is improved.
Further, in some cases, during the process of performing verification through the voice playing icon and the verification prompt message, polyphones can be selected, so that a touch result which can be finally verified is required to be selected, and the touch result is required to be realized through the voice playing icon.
S404: and responding to the operation of the target user for touching the voice playing icon, and outputting voice data.
The voice data can be understood as text voice played by the user touching the voice playing icon. The voice data comprises the pronunciation corresponding to each character in the text content, so that the target user can select the character with the preset tone from the text content according to the voice data.
In a possible embodiment, in response to an operation of a user touching the voice playing icon in fig. 6, a series of voice data may be played, where the voice data includes pronunciations corresponding to each character in the text content, and the pronunciations corresponding to at least two tones of characters are included in the voice data.
Further, if the verification reliability is to be increased, the text content to be verified can include characters with three different tones, and the pronunciation of the three different tones is played in the voice data, so that the target user selects one according to the verification prompt information to increase the reliability of the verification process.
S406: and responding to the touch operation of the target user on the text content according to the voice data and the verification prompt information to obtain a touch result.
S408: and verifying the touch result to obtain a verification result.
By the method, the man-machine interaction verification process is realized, the machine identification cost can be increased, and the reliability of the man-machine interaction verification is improved. Finally, the aim of human-computer interaction verification can be effectively fulfilled, namely the aim of verifying the authenticity of the user.
In one possible embodiment, after the text library is pre-established, the speech library may be established as follows:
and acquiring and storing a voice sample corresponding to each character sample in the character library, establishing a corresponding relation between the character samples and the voice samples, and establishing a voice library corresponding to the character library.
In a possible embodiment, a corresponding relationship between the characters in the character library and the voice samples in the voice library is established, and when a certain character is extracted, the voice sample corresponding to the character can be obtained directly according to the corresponding relationship.
It should be noted that, in the present disclosure, the process of establishing the text library and the speech library in advance may be implemented in the terminal device, or may be implemented in the server. After the word library and the voice library are established, the word library and the voice library may be stored in the terminal device or in the server. The above-mentioned word library and voice library may be stored in the server for security. After the terminal equipment receives the verification request of the target user, the verification request is forwarded to the server, the server extracts characters and voice samples corresponding to the characters from the character library and the voice library and sends the characters and the voice samples to the terminal equipment, and the terminal equipment processes the characters and the voice samples corresponding to the characters to obtain a verified display interface. Or the server processes the characters and the voice samples corresponding to the characters, renders the characters and the voice samples, and finally directly generates the characters and the voice samples in the terminal equipment.
Based on the same inventive concept, the embodiment of the present disclosure further provides an interactive authentication device based on voice tones, as in the following embodiments. Because the principle of the embodiment of the apparatus for solving the problem is similar to that of the embodiment of the method, the embodiment of the apparatus can be implemented by referring to the implementation of the embodiment of the method, and repeated details are not described again.
Fig. 7 is a schematic structural diagram of an interactive authentication device based on voice tone according to an embodiment of the present disclosure, and as shown in fig. 7, the interactive authentication device 70 based on voice tone includes:
an obtaining unit 701, configured to output, in response to a verification request, text content to be verified and verification prompt information; wherein, the text content comprises: a plurality of characters; at least two pronunciations in the characters are characters with different tones; the verification prompt information is used for displaying the randomly generated preset tone to prompt a user to perform touch operation according to the preset tone;
a touch unit 702, configured to obtain a touch result in response to a touch operation of a target user on text content; the touch result is one or more characters selected from the text content by the target user according to the verification prompt information;
the verification unit 703 is configured to verify the touch result to obtain a verification result.
In an embodiment of the present disclosure, the obtaining unit 701 is further configured to:
responding to a verification request, and randomly extracting a plurality of character samples from a pre-established text library to serve as text contents to be verified;
randomly selecting a target character from the plurality of characters, determining a preset tone of the target character, and outputting verification prompt information.
In an embodiment of the present disclosure, the verification unit 703 is further configured to:
if the touch result is the characters with preset tones in the verification prompt information, returning verification passing indication information of the verification request;
if the touch result comprises the characters except the characters with preset tone in the verification prompt information in the text content, returning verification failure indication information of the verification request and prompting the target user to re-verify
In one embodiment of the present disclosure, the interactive authentication device based on voice tone further includes:
the voice prompt unit is used for outputting a voice playing icon;
responding to the operation of the target user for touching the voice playing icon, and outputting voice data; the voice data comprises pronunciation corresponding to each character in the text content, so that a target user can select characters with preset tone from the text content according to the voice data.
In an embodiment of the present disclosure, the voice prompt unit is further configured to:
extracting a voice sample corresponding to each character in the text content from a voice library which is established in advance and has a corresponding relation with the character library;
and generating a voice playing icon according to the voice sample corresponding to each character in the text content.
In an embodiment of the present disclosure, the voice prompt unit is further configured to:
splicing the voice samples corresponding to each character in the text content to obtain voice information to be played;
and rendering the voice information to be played to obtain a voice playing icon.
In an embodiment of the present disclosure, the interactive authentication device based on voice tone further includes:
the establishing unit is used for acquiring character samples of four tones, storing the character samples in a database and establishing a character library;
and storing the voice sample corresponding to each character sample in the character library, creating a corresponding relation between the character samples and the voice samples, and establishing the voice library corresponding to the character library.
As will be appreciated by one skilled in the art, aspects of the present disclosure may be embodied as a system, method or program product. Accordingly, various aspects of the present disclosure may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
An electronic device 800 according to this embodiment of the disclosure is described below with reference to fig. 8. The electronic device 800 shown in fig. 8 is only an example and should not bring any limitations to the functionality and scope of use of the embodiments of the present disclosure.
As shown in fig. 8, electronic device 800 is in the form of a general purpose computing device. The components of the electronic device 800 may include, but are not limited to: the at least one processing unit 810, the at least one memory unit 820, and a bus 830 that couples various system components including the memory unit 820 and the processing unit 810.
Wherein the storage unit stores program code that is executable by the processing unit 810 to cause the processing unit 810 to perform steps according to various exemplary embodiments of the present disclosure as described in the "exemplary methods" section above in this specification. For example, the processing unit 810 may perform the following steps in the above method embodiments, for example: responding to the verification request, and outputting text content to be verified and verification prompt information; wherein, the text content comprises: a plurality of characters; at least two pronunciations in the characters are characters with different tones; the verification prompt information is used for displaying the randomly generated preset tone to prompt a user to perform touch operation according to the preset tone; responding to the touch operation of the target user on the text content to obtain a touch result; the touch result is one or more characters selected from the text content by the target user according to the verification prompt information; and verifying the touch result to obtain a verification result.
The storage unit 820 may include readable media in the form of volatile memory units such as a random access memory unit (RAM) 8201 and/or a cache memory unit 8202, and may further include a read only memory unit (ROM) 8203.
Storage unit 820 may also include a program/utility module 8204 having a set (at least one) of program modules 8205, such program modules 8205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 830 may be any one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 800 may also communicate with one or more external devices 840 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 800, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 800 to communicate with one or more other computing devices. Such communication may occur over input/output (I/O) interfaces 850. Also, the electronic device 800 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the internet) via the network adapter 860. As shown, the network adapter 860 communicates with the other modules of the electronic device 800 via the bus 830. It should be appreciated that although not shown, other hardware and/or software modules may be used in conjunction with the electronic device 800, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a terminal device, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
In particular, according to embodiments of the present disclosure, the processes described above with reference to the flow diagrams may be implemented as a computer program product or a computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions to cause the computer device to perform the interactive authentication method of any one of the above.
In an exemplary embodiment of the present disclosure, there is also provided a computer-readable storage medium, which may be a readable signal medium or a readable storage medium. On which a program product capable of implementing the above-described method of the present disclosure is stored. In some possible embodiments, various aspects of the disclosure may also be implemented in the form of a program product comprising program code for causing a terminal device to perform the steps according to various exemplary embodiments of the disclosure described in the "exemplary methods" section above of this specification, when the program product is run on the terminal device.
More specific examples of the computer-readable storage medium in the present disclosure may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
In the present disclosure, a computer readable storage medium may include a propagated data signal with readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Alternatively, program code embodied on a computer readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
In particular implementations, program code for carrying out operations of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + +, or the like, as well as conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
Moreover, although the steps of the methods of the present disclosure are depicted in the drawings in a particular order, this does not require or imply that the steps must be performed in this particular order, or that all of the depicted steps must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions, etc.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a mobile terminal, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice in the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (10)

1. A voice tone-based interactive authentication method is characterized by comprising the following steps:
responding to the verification request, and outputting text content to be verified and verification prompt information; wherein, the text content comprises: a plurality of characters; at least two pronunciations in the characters are characters with different tones; the verification prompt information is used for displaying a preset tone generated randomly so as to prompt a user to perform touch operation according to the preset tone;
responding to the touch operation of the target user on the text content to obtain a touch result; the touch result is one or more characters selected from the text content by the target user according to the verification prompt message;
and verifying the touch result to obtain a verification result.
2. The interactive authentication method based on voice tone of claim 1, wherein the outputting the text content to be authenticated and the authentication prompt information in response to the authentication request comprises:
responding to a verification request, and randomly extracting a plurality of character samples from a pre-established text library to serve as text contents to be verified;
randomly selecting a target character from the plurality of characters, determining a preset tone of the target character, and outputting the verification prompt information.
3. The interactive verification method based on voice tone of claim 1, wherein the verifying the touch result to obtain a verification result comprises:
if the touch result is the characters with preset tones in the verification prompt information, returning verification passing indication information of the verification request;
and if the touch result comprises characters except for the characters with preset tone in the verification prompt information in the text content, returning verification failure indication information of the verification request and prompting the target user to verify again.
4. The interactive authentication method based on voice tone of claim 1, wherein after the text content to be authenticated and the authentication prompt information are output in response to the authentication request, the method further comprises:
outputting a voice playing icon;
responding to the operation of the target user for touching the voice playing icon, and outputting voice data; and the voice data comprises pronunciation corresponding to each character in the text content.
5. The interactive authentication method based on voice tone of claim 4, wherein the outputting the voice playing icon comprises:
extracting a voice sample corresponding to each character in the text content from a voice library which is established in advance and has a corresponding relation with a character library;
and generating and obtaining the voice playing icon according to the voice sample corresponding to each character in the text content.
6. The interactive verification method based on voice tone according to claim 5, wherein the generating the voice playing icon according to the voice sample corresponding to each word in the text content comprises:
splicing the voice samples corresponding to each character in the text content to obtain voice information to be played;
and rendering the voice information to be played to obtain a voice playing icon.
7. The interactive verification method based on voice tone of claim 5, wherein the voice database corresponding to the text database is established as follows:
acquiring character samples of four tones, storing the character samples in a database, and establishing a character library;
and storing a voice sample corresponding to each character sample in the character library, creating a corresponding relation between the character sample and the voice sample, and establishing a voice library corresponding to the character library.
8. An interactive authentication apparatus based on voice tones, the apparatus comprising:
the acquisition unit is used for responding to the verification request and outputting the text content to be verified and verification prompt information; wherein, the text content comprises: a plurality of characters; at least two pronunciations in the characters are characters with different tones; the verification prompt information is used for displaying a preset tone generated randomly so as to prompt a user to perform touch operation according to the preset tone;
the touch control unit is used for responding to the touch control operation of the target user on the text content to obtain a touch control result; the touch result is one or more characters selected from the text content by the target user according to the verification prompt information;
and the verification unit is used for verifying the touch result to obtain a verification result.
9. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the method of any one of claims 1-7 via execution of the executable instructions.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method of any one of claims 1 to 7.
CN202211131712.8A 2022-09-15 2022-09-15 Interactive verification method and device based on voice tone and electronic equipment Withdrawn CN115514550A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211131712.8A CN115514550A (en) 2022-09-15 2022-09-15 Interactive verification method and device based on voice tone and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211131712.8A CN115514550A (en) 2022-09-15 2022-09-15 Interactive verification method and device based on voice tone and electronic equipment

Publications (1)

Publication Number Publication Date
CN115514550A true CN115514550A (en) 2022-12-23

Family

ID=84504742

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211131712.8A Withdrawn CN115514550A (en) 2022-09-15 2022-09-15 Interactive verification method and device based on voice tone and electronic equipment

Country Status (1)

Country Link
CN (1) CN115514550A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109493872A (en) * 2018-12-13 2019-03-19 北京三快在线科技有限公司 Voice messaging verification method and device, electronic equipment, storage medium
CN111341326A (en) * 2020-02-18 2020-06-26 RealMe重庆移动通信有限公司 Voice processing method and related product
KR20210087098A (en) * 2020-05-22 2021-07-09 바이두 온라인 네트웍 테크놀러지 (베이징) 캄파니 리미티드 Information verification method, apparatus, device, computer storage medium and computer program product based on voice interaction

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109493872A (en) * 2018-12-13 2019-03-19 北京三快在线科技有限公司 Voice messaging verification method and device, electronic equipment, storage medium
CN111341326A (en) * 2020-02-18 2020-06-26 RealMe重庆移动通信有限公司 Voice processing method and related product
KR20210087098A (en) * 2020-05-22 2021-07-09 바이두 온라인 네트웍 테크놀러지 (베이징) 캄파니 리미티드 Information verification method, apparatus, device, computer storage medium and computer program product based on voice interaction
EP3940693A1 (en) * 2020-05-22 2022-01-19 Baidu Online Network Technology (Beijing) Co., Ltd. Voice interaction-based information verification method and apparatus, and device and computer storage medium

Similar Documents

Publication Publication Date Title
CN109313665B (en) Creation of computer messaging robots
CN109087639B (en) Method, apparatus, electronic device and computer readable medium for speech recognition
EP3469491A1 (en) Computer proxy messaging bot
US20080228504A1 (en) Technique to Deflect Incident Ticket Submission in Real-Time
JP2020511804A (en) METHOD, DEVICE AND SERVER FOR PROVIDING VOICE SERVICE
US10938886B2 (en) Scripting support for data identifiers, voice recognition and speech in a telnet session
US20100094635A1 (en) System for Voice-Based Interaction on Web Pages
US9736310B2 (en) Adjustable interactive voice response system
US11012556B2 (en) Non-verbal sensitive data authentication
US11783808B2 (en) Audio content recognition method and apparatus, and device and computer-readable medium
CN108833590B (en) Voice recognition service proxy server and proxy method
CN111191200B (en) Three-party linkage authentication page display method and device and electronic equipment
US10991370B2 (en) Speech to text conversion engine for non-standard speech
US20230153541A1 (en) Generating and updating conversational artifacts from apis
CN113961836A (en) Page jump method and device, electronic equipment and storage medium
US20210182030A1 (en) System and method applied to integrated development environment
US10574517B2 (en) Adding voice commands to invoke web services
US20190304336A1 (en) Editing tool for math equations
CN115514550A (en) Interactive verification method and device based on voice tone and electronic equipment
US11727937B2 (en) Channel-agnostic conversation intelligence service
JP2020004192A (en) Communication device and voice recognition terminal device with communication device
CN111752190A (en) Equipment control method, device and system, storage medium and electronic equipment
CN111104118A (en) AIML-based natural language instruction execution method and system
CN116701790B (en) Front-end authority control method based on route and related equipment
CN113486269B (en) WEB-based electronic form data processing method, computing device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20221223