KR20170049317A - Apparatus and method for authenticating using speech recognition - Google Patents
Apparatus and method for authenticating using speech recognition Download PDFInfo
- Publication number
- KR20170049317A KR20170049317A KR1020150150572A KR20150150572A KR20170049317A KR 20170049317 A KR20170049317 A KR 20170049317A KR 1020150150572 A KR1020150150572 A KR 1020150150572A KR 20150150572 A KR20150150572 A KR 20150150572A KR 20170049317 A KR20170049317 A KR 20170049317A
- Authority
- KR
- South Korea
- Prior art keywords
- information
- authentication
- word information
- user
- disposable
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 57
- 238000012795 verification Methods 0.000 claims description 15
- 238000012545 processing Methods 0.000 description 4
- 239000000284 extract Substances 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000010295 mobile communication Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 239000000470 constituent Substances 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G06F17/30985—
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Computational Linguistics (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Telephonic Communication Services (AREA)
Abstract
An authentication technique utilizing voice recognition with enhanced security is disclosed. To this end, an authentication method using speech recognition according to an embodiment of the present invention includes: requesting authentication of a voice additional authentication from an authentication server of a user terminal; Receiving customer registered word information previously registered by the user from the authentication server and disposable word information randomly extracted from the word DB; Presenting the customer registered word information and the disposable word information to the user; Receiving voice information from a user; Comparing and verifying voice information, customer registered word information, and disposable word information; And transmitting the comparison result of the voice information, the customer registration word information and the disposable word information to the authentication server.
Description
The present invention relates to an authentication apparatus and method using voice recognition. More particularly, the present invention relates to an authentication apparatus and method using voice recognition having enhanced security.
Today, with the development of the Internet, various kinds of online services are being provided. Most online service systems authenticate whether a client computer device accessing the system via the Internet is entitled to use the online service.
The most commonly used user authentication method is an authentication method using a user identifier (ID) and a password. When a user subscribes to an online service system, a user identifier and a password are registered, and the user then accesses the corresponding system When the user ID and password are registered, the user is authenticated.
However, the authentication method using the user identifier and the password has a problem that the authentication information (the user identifier and the password) is easily stolen or hacked, and malicious access attempts can not be blocked if the authentication information is exposed.
In the online service system, a variety of personal information is managed. In recent years, real money transactions have been carried out online through internet banking services and online stock trading services. Intangible assets (for example, items in online games, Cyber money, etc.), there is a need for stronger authentication methods for users using the online service system.
According to the request, a one-time authentication key based authentication method using a user's mobile communication terminal is used. This one-time authentication key-based authentication method generally follows the following procedure. First, the online service system confirms the user identifier and the password, and requests the authentication server to authenticate the user. The authentication server sends a text message (SMS) including the disposable authentication key to the mobile communication terminal of the pre-registered user. The online service system receives the disposable authentication key through the user's computer device and delivers it to the authentication server. Then, the authentication server verifies whether the one-time authentication key sent to the user's mobile communication terminal is the same as the one-time authentication key inputted through the online service system.
Although the one-time authentication key based authentication method can enhance the security strength of the authentication of the user to some extent, there is still a problem that various vulnerabilities due to various hacks exist. Also, there is a problem that resources of the online service system are unjustly occupied by multiple logins by sharing one user identifier and a password with a plurality of acquaintances.
Korean Patent Laid-Open Publication No. 1997-7001374 discloses a 'transaction system using an authentication system and an authentication system', and Korean Patent Publication No. 2002-0089416 discloses an authentication method, an authentication system, an authentication device, and an authentication module Lt; / RTI >
It is an object of the present invention to provide an authentication service with enhanced security utilizing speech recognition.
It is another object of the present invention to provide a voice recognition authentication step in a simple authentication system using an electronic signature password, thereby realizing an authentication service that enhances user convenience and enhances security.
In addition, It is an object of the present invention to perform authentication based on personal identification information such as a card certificate serial number to prevent the theft by another user or device.
According to another aspect of the present invention, there is provided an authentication method using speech recognition, the method comprising: requesting authentication of a voice additional authentication from an authentication server of a user terminal; Receiving customer registered word information previously registered by the user from the authentication server and disposable word information randomly extracted from the word DB; Presenting the customer registered word information and the disposable word information to the user; Receiving voice information from the user; Comparing the voice information with the customer registration word information and the disposable word information to verify; And transmitting the comparison result of the voice information, the customer registration word information and the disposable word information to the authentication server.
Receiving a pre-registered digital signature password from the user before requesting verification of the voice additional authentication; And performing an authentication procedure based on the electronic signature password to the authentication server.
At this time, in the presenting step, the order of presenting the customer registered word information and the disposable word information can be randomly presented.
At this time, in the presenting step, the customer registered word information can be presented with an inscription.
In this case, before the step of requesting verification of the voice additional authentication, the step of connecting to the authentication server by connecting the personal identification information of the user to the customer registered word information may be further included.
At this time, the personal identification information may include at least one of a phone number of the user terminal and card certificate serial number information.
In this case, after the step of requesting verification of the voice additional authentication, the authentication server verifies the individual identification information, extracts the disposable word information from the word DB only when verification is performed, And transmitting the registered word information together with the registered word information.
At this time, when the user terminal is a PC, the step of receiving the customer registered word information and the disposable word information, the step of presenting, the step of receiving the voice information, the step of verifying, The transmitting step may be performed in the mobile terminal of the pre-registered user.
At this time, the customer registered word information and the disposable word information may each be at least two syllable words.
According to another aspect of the present invention, there is provided an authentication apparatus using voice recognition, the apparatus including: a voice authentication request unit for requesting a user terminal to verify voice additional authentication with an authentication server; A word information receiving unit for receiving customer registration word information previously registered by the user from the authentication server and disposable word information randomly extracted from the word DB; A display unit for presenting the customer registered word information and the disposable word information to the user; A voice information receiver for receiving voice information from the user; A comparison and verification unit comparing and verifying the voice information, the customer registration word information, and the disposable word information; And a transmitter for transmitting the comparison result of the voice information, the customer registration word information and the disposable word information to the authentication server.
In this case, the authentication server may further include an electronic signature authentication unit for receiving the electronic signature password pre-registered by the user and performing an authentication procedure based on the electronic signature password to the authentication server.
According to the present invention, it is possible to provide an authentication service with enhanced security using speech recognition.
In addition, the present invention adds a voice recognition authentication step to a simple authentication system using an electronic signature password, thereby realizing an authentication service that enhances user convenience and enhances security.
In addition, The authentication can be performed based on the personal identification information such as the card certificate serial number so that the theft by the other user or the device can be prevented in advance.
1 is a flowchart for explaining a pre-registration process in an authentication method using speech recognition according to an embodiment of the present invention.
2 is a flowchart illustrating an authentication process using speech recognition according to an embodiment of the present invention.
FIG. 3 and FIG. 4 show an embodiment of a screen for presenting user registered word information and disposable word information to a user in an authentication method using speech recognition according to an embodiment of the present invention.
5 is a block diagram illustrating a configuration of an authentication apparatus using speech recognition according to an embodiment of the present invention.
The present invention will now be described in detail with reference to the accompanying drawings. Hereinafter, a repeated description, a known function that may obscure the gist of the present invention, and a detailed description of the configuration will be omitted. Embodiments of the present invention are provided to more fully describe the present invention to those skilled in the art. Accordingly, the shapes and sizes of the elements in the drawings and the like can be exaggerated for clarity.
Hereinafter, an authentication method using speech recognition according to an embodiment of the present invention will be described.
1 is a flowchart for explaining a pre-registration process in an authentication method using speech recognition according to an embodiment of the present invention.
Referring to FIG. 1, in the authentication method using voice recognition according to an embodiment of the present invention, the pre-registration process receives a customer registration word to be used for authentication from the user at the
Then, the customer registration word received in step S101 is hashed encrypted (step S102).
Thereafter, the hash value of the customer registration word and the individual identification information are transmitted from the
The
2 is a flowchart illustrating an authentication process using speech recognition according to an embodiment of the present invention. FIG. 3 and FIG. 4 show an embodiment of a screen for presenting user registered word information and disposable word information to a user in an authentication method using speech recognition according to an embodiment of the present invention.
Referring to FIG. 2, in the authentication method using voice recognition according to an embodiment of the present invention, the authentication process is a process in which the
First, the
Upon receiving the request, the
Then, the
Then, the
After step S204, the
In step S206, the user's voice information received in step S205 is compared with the disposable word information and the customer registration word information received in step S203. Then, the result of the comparison and verification in step S206 is transmitted to the authentication server 200 (S207).
In the case where the
Further, by using the voice recognition function of the authentication method using the above-described voice recognition, menu movement in a program or an app can be easily called and executed by voice command.
The authentication method using the speech recognition according to the present invention may be implemented in the form of a program command that can be executed through various computer means and recorded in a computer readable medium. The computer-readable medium may include program instructions, data files, data structures, and the like, alone or in combination. The program instructions recorded on the medium may be those specially designed and configured for the present invention or may be available to those skilled in the art of computer software. Examples of computer-readable media include magnetic media such as hard disks, floppy disks and magnetic tape; optical media such as CD-ROMs and DVDs; magnetic media such as floppy disks; Includes all types of hardware devices that are specially configured to store and execute magneto-optical media and program instructions such as ROM, RAM, flash memory, and the like. Examples of program instructions may include machine language code such as those generated by a compiler, as well as high-level language code that may be executed by a computer using an interpreter or the like. Such a hardware device may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.
The teachings of the principles of the present invention may be implemented as a combination of hardware and software. In addition, the software can be implemented as an application program that is actually implemented on the program storage unit. The application program can be uploaded to and executed by a machine that includes any suitable architecture. Advantageously, the machine may be implemented on a computer platform having hardware such as one or more central processing units (CPUs), a computer processor, a random access memory (RAM), and input / output (I / . In addition, the computer platform may include an operating system and microinstruction code. The various processes and functions described herein may be part of microcommand codes or a portion of an application program, or any combination thereof, and they may be executed by various processing devices including a CPU. In addition, various other peripheral devices such as additional data storage and printers may be connected to the computer platform.
It is to be understood that the actual connections between system components or process functional blocks may vary depending on how the principles of the present invention are programmed, as some of the constituent system components and methods illustrated in the accompanying drawings are preferably implemented in software It should be further understood. Given the teachings herein, those skilled in the relevant art (s) will be able to contemplate these and similar implementations or configurations of the principles of the invention.
5 is a block diagram illustrating a configuration of an authentication apparatus using speech recognition according to an embodiment of the present invention.
5, an
The digital
The
The voice
The word
The
The audio
The transmitting
As described above, the authentication apparatus and method using voice recognition according to the embodiment of the present invention are not limited to the configuration and method of the embodiments described above, but various modifications may be made to the embodiments All or some of the embodiments may be selectively combined.
100; User terminal
110; The electronic signature authentication unit
120; register
130; The voice authentication request unit
140; The word information receiver
150; Display portion
160; Audio information receiver
170; The comparison verification unit
180; Transmitter
200; Authentication server
300; Word DB
Claims (10)
Receiving customer registered word information previously registered by the user from the authentication server and disposable word information randomly extracted from the word DB;
Presenting the customer registered word information and the disposable word information to the user;
Receiving voice information from the user;
Comparing the voice information with the customer registration word information and the disposable word information to verify; And
And transmitting the comparison result of the voice information, the customer registration word information and the disposable word information to the authentication server.
Receiving a pre-registered electronic signature password from the user before requesting verification of the voice additional authentication; And
Further comprising the step of performing an authentication procedure based on the electronic signature password to the authentication server.
In the presenting step,
And the presentation order of the customer registered word information and the disposable word information is randomly presented.
In the presenting step,
Wherein the customer registered word information is provided with an inscription and presented.
Before the step of requesting verification of the voice additional authentication,
And registering the user identification information of the user in the authentication server by connecting the user identification information to the customer registration word information.
Wherein the personal identification information comprises:
Wherein the authentication information includes at least one of a phone number of the user terminal and card certificate serial number information.
After the step of requesting verification of the voice additional authentication,
Wherein the authentication server further comprises verifying the individual identification information and extracting the disposable word information from the word DB only when verified, and transmitting the disposable word information together with the customer registered word information to the user terminal Authentication method using speech recognition.
A word information receiving unit for receiving customer registration word information previously registered by the user from the authentication server and disposable word information randomly extracted from the word DB;
A display unit for presenting the customer registered word information and the disposable word information to the user;
A voice information receiver for receiving voice information from the user;
A comparison and verification unit comparing and verifying the voice information, the customer registration word information, and the disposable word information; And
And a transmitting unit for transmitting the comparison result of the voice information, the customer registered word information, and the disposable word information to the authentication server.
Further comprising an electronic signature authentication unit for receiving an electronic signature password pre-registered from the user and performing an authentication procedure based on the electronic signature password to the authentication server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150150572A KR101741917B1 (en) | 2015-10-28 | 2015-10-28 | Apparatus and method for authenticating using speech recognition |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150150572A KR101741917B1 (en) | 2015-10-28 | 2015-10-28 | Apparatus and method for authenticating using speech recognition |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20170049317A true KR20170049317A (en) | 2017-05-10 |
KR101741917B1 KR101741917B1 (en) | 2017-06-01 |
Family
ID=58744094
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150150572A KR101741917B1 (en) | 2015-10-28 | 2015-10-28 | Apparatus and method for authenticating using speech recognition |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101741917B1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20190012066A (en) * | 2017-07-26 | 2019-02-08 | 네이버 주식회사 | Method for certifying speaker and system for recognizing speech |
WO2019078492A1 (en) * | 2017-10-20 | 2019-04-25 | 주식회사 공훈 | Voice authentication system |
KR102277422B1 (en) | 2020-07-24 | 2021-07-19 | 이종엽 | Voice verification and restriction method of the voice system |
US11465102B2 (en) | 2019-03-18 | 2022-10-11 | Korea University Research And Business Foundation | Method of preparing heterogeneous zeolite membranes |
US11545154B2 (en) | 2019-10-29 | 2023-01-03 | Samsung Electronics Co., Ltd. | Method and apparatus with registration for speaker recognition |
US11911188B2 (en) | 2019-10-30 | 2024-02-27 | Samsung Electronics Co., Ltd. | Apparatus and method for monitoring health, and mobile device |
-
2015
- 2015-10-28 KR KR1020150150572A patent/KR101741917B1/en active IP Right Grant
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20190012066A (en) * | 2017-07-26 | 2019-02-08 | 네이버 주식회사 | Method for certifying speaker and system for recognizing speech |
WO2019078492A1 (en) * | 2017-10-20 | 2019-04-25 | 주식회사 공훈 | Voice authentication system |
US11465102B2 (en) | 2019-03-18 | 2022-10-11 | Korea University Research And Business Foundation | Method of preparing heterogeneous zeolite membranes |
US11596905B2 (en) | 2019-03-18 | 2023-03-07 | Korea University Research And Business Foundation | Method of preparing heterogeneous zeolite membranes |
US11545154B2 (en) | 2019-10-29 | 2023-01-03 | Samsung Electronics Co., Ltd. | Method and apparatus with registration for speaker recognition |
US11911188B2 (en) | 2019-10-30 | 2024-02-27 | Samsung Electronics Co., Ltd. | Apparatus and method for monitoring health, and mobile device |
KR102277422B1 (en) | 2020-07-24 | 2021-07-19 | 이종엽 | Voice verification and restriction method of the voice system |
Also Published As
Publication number | Publication date |
---|---|
KR101741917B1 (en) | 2017-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11405380B2 (en) | Systems and methods for using imaging to authenticate online users | |
KR101741917B1 (en) | Apparatus and method for authenticating using speech recognition | |
CN107196922B (en) | Identity authentication method, user equipment and server | |
US10045210B2 (en) | Method, server and system for authentication of a person | |
CN106899551B (en) | Authentication method, authentication terminal and system | |
US9667626B2 (en) | Network authentication method and device for implementing the same | |
US9124571B1 (en) | Network authentication method for secure user identity verification | |
US20200196143A1 (en) | Public key-based service authentication method and system | |
US20160127134A1 (en) | User authentication system and method | |
CN104662864A (en) | User-convenient authentication method and apparatus using a mobile authentication application | |
JP6538872B2 (en) | Common identification data replacement system and method | |
KR20220167366A (en) | Cross authentication method and system between online service server and client | |
TW201419888A (en) | Method, system of server authentication, and a computer-readable medium | |
US8910260B2 (en) | System and method for real time secure image based key generation using partial polygons assembled into a master composite image | |
CN105556531A (en) | Method and system for authenticating user using out-of-band channel | |
EP2916509B1 (en) | Network authentication method for secure user identity verification | |
KR102284876B1 (en) | System and method for federated authentication based on biometrics | |
KR101625065B1 (en) | User authentification method in mobile terminal | |
KR102016976B1 (en) | Unified login method and system based on single sign on service | |
CN106533685B (en) | Identity authentication method, device and system | |
KR102267628B1 (en) | User authentication method using one time identifier and authentication system performing the same | |
KR20200018546A (en) | Public key infrastructure based service authentication method and system | |
KR101754682B1 (en) | System and method for user authentication using another person's mobile phone | |
KR101879842B1 (en) | User authentication method and system using one time password | |
KR101788959B1 (en) | Apparatus and method for authenticating mobile device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |