Summary of the invention
For solving the problems of the technologies described above, the application embodiment provides a kind of wireless traffic identity identifying method, equipment and system, to guarantee the reliability of authentication.
The application embodiment provides following technical scheme:
A kind of wireless traffic identity identifying method comprises:
Server receives the ID authentication request that send at the wireless traffic terminal;
Generate dynamic text and said dynamic text is handed down to said wireless traffic terminal;
Receive according to the speech recognition text of reading aloud generation and the vocal print characteristic of user from said wireless traffic terminal said dynamic text;
Utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary; And the vocal print characteristic of said vocal print characteristic and said user registration is complementary, and authentication success then determines one's identity; Otherwise authentification failure determines one's identity.
A kind of wireless traffic identity identifying method comprises:
After the Client-initiated business operating instructions is received at the wireless traffic terminal, send ID authentication request to server;
After said server receives the ID authentication request of sending at the wireless traffic terminal, generate dynamic text, and said dynamic text is handed down to said wireless traffic terminal;
After said dynamic text is received at said wireless traffic terminal, show said dynamic text and point out the user to read aloud said dynamic text;
Voice and the vocal print characteristic that the user reads aloud said dynamic text gathered at said wireless traffic terminal, is the speech recognition text with the speech conversion of gathering, and said speech recognition text and vocal print characteristic are sent to server;
After said server receives said speech recognition text and vocal print characteristic; Utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary; And the vocal print characteristic of said vocal print characteristic and said user registration is complementary, then authentication success; Otherwise authentication failure.
A kind of server comprises:
The request receiving element is used to receive the ID authentication request that send at the wireless traffic terminal;
Text issues the unit, is used for after the described request receiving element receives said ID authentication request, generates dynamic text, and said dynamic text is handed down to said wireless traffic terminal;
Information receiving unit is used for receiving according to the speech recognition text of reading aloud generation and the vocal print characteristic of user to said dynamic text from said wireless traffic terminal;
The authentication unit; Be used to utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary, and the vocal print characteristic of said vocal print characteristic and said user registration is complementary, and authentication success then determines one's identity; Otherwise authentification failure determines one's identity.
A kind of wireless traffic system comprises: server and wireless traffic terminal;
Said service terminal comprises:
The authentication request unit is used for after receiving the Client-initiated business operating instructions, sends ID authentication request to server;
Receiving element is used to receive the dynamic text that said server issues;
Display unit is used to show said dynamic text and points out said user to read aloud said dynamic text;
Information acquisition unit is used to gather voice and the vocal print characteristic that said user reads aloud said dynamic text;
Converting unit, the speech conversion that is used for said information acquisition unit collection is the speech recognition text;
Transmitting element is used for said speech recognition text and vocal print characteristic are sent to said server;
Said server comprises:
The request receiving element is used for the ID authentication request that send at said reception wireless traffic terminal;
Text issues the unit, is used for after the described request receiving element receives said ID authentication request, generates dynamic text, and said dynamic text is handed down to said wireless traffic terminal;
Information receiving unit is used for receiving said speech recognition text and vocal print characteristic from said wireless traffic terminal;
The authentication unit; Be used to utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary, and the vocal print characteristic of said vocal print characteristic and said user registration is complementary, and authentication success then determines one's identity; Otherwise authentification failure determines one's identity.
The technical scheme that the application embodiment provides; The mode that adopts dynamic voice identification to combine with Application on Voiceprint Recognition; When the user carries out business or account operation through wireless authentication, issue and show one section literal that generates at random, i.e. dynamic text to the user; Obtain the speech recognition text of reading aloud generation and the vocal print characteristic to said dynamic text then according to the user; Utilize text that speech recognition technology confirms that the user reads aloud whether to be complementary, and whether the vocal print characteristic of further confirming to obtain and the vocal print characteristic of user's registered in advance be complementary, if both all are complementary with this dynamic text; Then determine one's identity authentication success otherwise the authentification failure that determines one's identity, thus the reliability of authentication guaranteed.
Further, if the authentication failure, then server forbids that the user carries out this authentication corresponding service operation, and then has guaranteed the fail safe of wireless traffic.
Embodiment
In order to make those skilled in the art person understand the technical scheme among the application better; To combine the accompanying drawing among the application embodiment below; Technical scheme among the application embodiment is carried out clear, intactly description; Obviously, described embodiment only is the application's part embodiment, rather than whole embodiment.Based on the embodiment among the application, the every other embodiment that those of ordinary skills obtained should belong to the scope that the application protects.
At present, speech recognition technology is widely used in multiple fields such as signal processing, pattern recognition, artificial intelligence, and its target is to convert the vocabulary content in the mankind's the voice into computer-readable input, for example button, binary coding or character string.
The generation of human speech is complex physical physical process between human body speech center and the vocal organs; Phonatory organs such as the tongue that the people used in when speech, tooth, larynx, lung, nasal cavity are everyone widely different aspect size and the form, so any two people's vocal print collection of illustrative plates is all variant.Everyone existing relative stability of voice acoustic feature has variability again, is not absolute, unalterable.This variation can be from physiology, pathology, psychology, simulation, camouflage, and is also relevant with environmental interference.However, because everyone vocal organs all are not quite similar, therefore in the ordinary course of things, still can distinguish different people's sound or judge whether is same people's sound.
For this reason, the application embodiment wireless traffic identity identifying method, equipment and system, the identification authentication mode that adopts dynamic voice identification to combine with Application on Voiceprint Recognition; When the user carries out account operation through wireless traffic, issue and show one section literal that generates at random, i.e. dynamic text to the user; Obtain the speech recognition text of reading aloud generation and the vocal print characteristic to said dynamic text then, utilize speech recognition technology, confirm that whether text that the user reads aloud is complementary with this dynamic text according to the user; And whether the vocal print characteristic of further confirming to obtain and the vocal print characteristic of user's registered in advance be complementary, if both all are complementary, and then authentication success; Allow the user to carry out this authentication corresponding service operation; Otherwise the authentication failure is forbidden this business operation, thereby is fully guaranteed service security property.
Said speech recognition is meant, converts the vocabulary content in the voice into computer-readable input, to discern the word content that is wherein comprised.
Said Application on Voiceprint Recognition is meant, from the voice signal that the speaker sends, extracts speaker's voiceprint automatically, and the research field that the speaker is discerned.Similar with fingerprint; The vocal print of different people is different; Everyone can identify the vocal print characteristic in the voice because the behavior difference that forms the differences of Physiological of vocal organs and the day after tomorrow makes that the vocal print in their voice all has strong personal colors through prior art.
In the application's a embodiment, a kind of wireless traffic identity identifying method is provided, as shown in Figure 1, this method comprises following basic step:
Step 101, server receives the ID authentication request that send at the wireless traffic terminal.
Said wireless traffic terminal can be to carry and can pass through WLAN (Wireless Local Area Networks; WLAN), GPRS (General Packet Radio Service; General packet radio service), 3G (3rd-generation; 3G (Third Generation) Moblie technology) waits the terminal equipment of wireless mode access the Internet, such as mobile phone, net book etc.
The wireless traffic terminal can connect (through WLAN, GPRS or 3G etc.) through the data of setting up; Based on agreements such as Https, Http, Socket; Specifically can select or be provided with in advance protocol type automatically, through sending predefined required parameter to server, submitting user's ID authentication request to through encrypted data packet or through the private message of transmitting with the frame mode of encrypting according to the equipment performance and the network state at that time of the level of security of wireless traffic, client.
Step 102 generates dynamic text and said dynamic text is handed down to said wireless traffic terminal.
After server is received the ID authentication request of sending at said wireless traffic terminal; Generate dynamic text to this ID authentication request; This dynamic text can be the passage that produces at random; For the ID authentication request of different user or the ID authentication request of same user's different time, the dynamic text of generation can be identical, also can be different.
Such as; After service end receives that the user passes through the ID authentication request of wireless traffic client initiation; Generate one section dynamic text at random like " fail safe is high "; And the interface channel of having set up through current wireless client and service end such as Wi-Fi, GPRS radio channels such as (General Packet Radio Service, general packet radio service technology) be handed down to the wireless traffic terminal, after the wireless traffic terminal successfully receives dynamic text; In the wireless traffic client of correspondence, show " fail safe is high ", and the prompting user reads aloud text.
In order further to guarantee the fail safe of said dynamic text in transmission course; Encrypted transmission can also be carried out to said dynamic text in the wireless traffic terminal; Certainly, the mode of encryption can be that server and wireless traffic terminal both sides consult, and also can make an appointment.
Step 103 receives according to the speech recognition text of reading aloud generation and the vocal print characteristic of user to said dynamic text from said wireless traffic terminal.
The wireless traffic terminal shows said dynamic text and points out said user to read aloud said dynamic text after receiving the dynamic text that server issues, such as can when showing said dynamic text, showing following information simultaneously: " please read aloud following literal ".Certainly, can adopt other prompting mode, to this, the application embodiment does not do qualification yet.
When the user read aloud said dynamic text, voice and the vocal print characteristic that the user reads aloud said dynamic text gathered at the wireless traffic terminal, and was the speech recognition text with the speech conversion of gathering; Then said speech recognition text and vocal print characteristic are sent to said server.
Voice and the vocal print characteristic that the user reads aloud said dynamic text gathered at said wireless traffic terminal, can realize that specifically said sound card provides following function through microphone, sound card: to signal filtering, amplification, sampling maintenance, A/D and D/A conversion etc.
Said with the speech conversion of gathering for the speech recognition text is speech recognition, be meant to convert the vocabulary content in the voice into computer-readable input the word content that is wherein comprised with identification.Particularly, can adopt the method for method based on channel model and voice knowledge, template matches and utilize in the Artificial Neural Network model one or more.The concrete implementation procedure of speech recognition can be identical with prior art, repeats no more at this.
Step 104 judges whether said speech recognition text and said dynamic text are complementary, and whether the vocal print characteristic of said vocal print characteristic and said user registration be complementary, if then execution in step 105; Otherwise, execution in step 106.
The vocal print characteristic of said user registration can be user preset read aloud the vocal print characteristic that the pronunciation custom is extracted by server according to the user, such as being undertaken by following process:
The user is activating the service or during registering account, submit relevant documentation of identity to after, select to open the vocal print identity authentication function.Also can be in professional use, under the situation of submitting the relevant susceptible of proof account really of documentation of identity owner to, the vocal print identity authentication function is opened in application.
The user can pass through the terminal, and for example voice call equipment such as PC terminal, mobile phone, landline telephone carry out the registration of vocal print characteristic.Particularly; The user initiates to open the vocal print register requirement through terminal to server, after server is received this register requirement, sends passage to user's application terminal; And read aloud this section literal through the current application terminal notifying user of user; For example, when portable terminal uses the PC application as the user, then point out through the screen display or the speaker sound of PC end; As when using the application of voice call equipment; Then carry out voice suggestion through the current speech verbal system; After terminal collection user reads aloud the voice messaging of this section literal; This voice messaging is transferred to server, after server is received this voice messaging, extract the vocal print characteristic in the voice messaging that the user reads aloud this section literal.Wherein, the vocal print characteristic in the voice messaging also can be extracted through the terminal, then by the terminal with the vocal print characteristic of obtaining and non-voice information is sent to server, specifically adopt which kind of mode to decide by at that time client or environmental condition.Server is characterized as this user according to the vocal print in this voice messaging and sets up the vocal print payment cipher, the vocal print characteristic of promptly above-mentioned said user's registration.
Step 105, authentication success determines one's identity.
After the authentication success, said server can allow said user to carry out this authentication corresponding service operation.
Step 106, authentification failure determines one's identity.
After the authentication failure, said server can forbid that said user carries out this authentication corresponding service operation.
Further, after the authentication failure, said server can also be to said wireless traffic terminal return authentication failed message.Correspondingly, said wireless traffic terminal shows this message after receiving said authentification failure message.
And after the user carried out this authentication corresponding service operation completion, said server can also be to said wireless traffic terminal return success message.Correspondingly, after said operation information is received at said wireless traffic terminal, show this message, so that the user confirms this business operation success.
The method of the application embodiment wireless traffic authentication; The mode that adopts dynamic voice identification to combine with Application on Voiceprint Recognition realizes the authentication in the wireless traffic; Because the text that the user reads aloud is generated by server end at random; Even therefore user's vocal print characteristic is stolen, also be difficult to simulation and forgery; And the coupling of vocal print characteristic is accomplished at server end, isolates fully with the wireless traffic terminal, and is that vocal print characteristic with user registration is complementary, and has prevented that machine simulation from reading aloud, and can't be cracked at the wireless traffic terminal.
In practical application, can also come further to improve fail safe through the mode of restriction single authentication time and number of times.Such as, service end can require the wireless traffic terminal to return information to be certified in 30 seconds after receiving this authentication information, otherwise by this Business Processing of the overtime cancellation of authentication.And for example, continuous three authentification failures of user or overtime after, this Business Processing of service end immediate cancel is to guarantee the fail safe of customer service.
The application embodiment wireless traffic identity identifying method; To hardware requirement and all lower to environmental requirement, can be widely used in the multiple wireless traffic terminal, be specially adapted to carry out in the wireless traffic of authentication; For example wireless payment business etc. fully guarantees the fail safe of user account.
As shown in Figure 2, be a kind of flow chart of the application embodiment wireless traffic identity identifying method, may further comprise the steps:
Step 201 after the Client-initiated business operating instructions is received at the wireless traffic terminal, is sent ID authentication request to server;
After step 202, said server receive the ID authentication request of sending at the wireless traffic terminal, generate dynamic text;
Step 203, said server is handed down to said wireless traffic terminal with said dynamic text;
Step 204 after said dynamic text is received at said wireless traffic terminal, shows said dynamic text and points out the user to read aloud said dynamic text;
Step 205, voice and the vocal print characteristic that the user reads aloud said dynamic text gathered at said wireless traffic terminal, is the speech recognition text with the speech conversion of gathering;
Step 206, said wireless traffic terminal sends to server with said speech recognition text and vocal print characteristic;
Step 207; After said server receives said speech recognition text and vocal print characteristic; Utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary, and the vocal print characteristic of said vocal print characteristic and said user registration is complementary then authentication success; Otherwise authentication failure.
In embodiments of the present invention, after the authentication success, said server can allow said user to carry out this authentication corresponding service operation.After the authentication failure, said server can forbid that said user carries out this authentication corresponding service operation.
And after the authentication failure, said server can also be to said wireless traffic terminal return authentication failed message, step 208 as shown in Figure 2.Correspondingly, said wireless traffic terminal can show this message after receiving said authentification failure message.
In addition, after the user carried out this authentication corresponding service operation completion, said server can also be to said wireless traffic terminal return success message.Correspondingly, after said operation information is received at said wireless traffic terminal, show this message, so that the user confirms this business operation success.
Correspondingly, in another embodiment of the application, a kind of server is provided, as shown in Figure 3, this server 300 comprises:
Request receiving element 301 is used to receive the ID authentication request that send at the wireless traffic terminal;
Text issues unit 302, is used for after described request receiving element 201 receives said ID authentication request, generates dynamic text, and said dynamic text is handed down to said wireless traffic terminal;
Information receiving unit 303 is used for receiving according to the speech recognition text of reading aloud generation and the vocal print characteristic of user to said dynamic text from said wireless traffic terminal;
Authentication unit 304; Be used to utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary; And the vocal print characteristic of said vocal print characteristic and said user registration is complementary, and authentication success then determines one's identity; Otherwise authentification failure determines one's identity.
In another embodiment of the application, said server 300 also can further comprise:
Control unit (not shown) is used for after said authentication unit 304 determines one's identity authentication success, allows said user to carry out this authentication corresponding service operation; After said authentication unit 304 determines one's identity authentification failure, forbid that said user carries out this authentication corresponding service operation.
In another embodiment of the application, said server 300 also can further comprise: notification unit (not shown) is used for after the authentication failure is confirmed in said authentication unit 304, to said wireless traffic terminal return authentication failed message.
Certainly, the user understands whether success of this operation for ease, said notification unit, also be used in the business operation success after, to said wireless traffic terminal return success message, so that the user confirms this business operation success.
The server of the application embodiment; The mode that adopts dynamic voice identification to combine with Application on Voiceprint Recognition realizes authenticating user identification; When the user operates through the wireless traffic terminal carrying out service, issue dynamic text to the user, obtain the speech recognition text of reading aloud generation and the vocal print characteristic to said dynamic text then according to the user; Utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary, and the vocal print characteristic of said vocal print characteristic and said user registration is complementary, and authentication success then determines one's identity; Otherwise authentification failure determines one's identity.Thereby guaranteed the reliability of authentication.Further, if the authentication failure, server forbids that the user carries out this authentication corresponding service operation, and then has guaranteed the fail safe of wireless traffic.
Correspondingly, in another embodiment of the application, a kind of wireless traffic system is provided, this system comprises: server and wireless traffic terminal.Wherein:
Said server is used to receive the ID authentication request that send at said wireless traffic terminal, and after receiving said ID authentication request, generates dynamic text, and said dynamic text is handed down to said wireless traffic terminal; Receive according to the speech recognition text of reading aloud generation and the vocal print characteristic of user from said wireless traffic terminal said dynamic text; Utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary; And the vocal print characteristic of said vocal print characteristic and said user registration is complementary, and authentication success then determines one's identity; Otherwise authentification failure determines one's identity.The concrete structure of said server possibly repeat no more at this with reference to the description of front embodiment.
Said wireless traffic terminal; Be used for after receiving said Client-initiated business operating instructions; Send said ID authentication request to said server, and receive the dynamic text that said server sends, show said dynamic text and point out said user to read aloud said dynamic text; Gather voice and vocal print characteristic that said user reads aloud said dynamic text; With the speech conversion of gathering is the speech recognition text; Said speech recognition text and vocal print characteristic are sent to said server.
As shown in Figure 4, a kind of structural representation at the wireless traffic terminal among the application embodiment.
In this embodiment, said wireless traffic terminal 400 comprises:
Authentication request unit 401 is used for after receiving the Client-initiated business operating instructions, sends ID authentication request to server;
Receiving element 402 is used to receive the dynamic text that said server issues;
Display unit 403 is used to show said dynamic text and points out said user to read aloud said dynamic text;
Information acquisition unit 404 is used to gather voice and the vocal print characteristic that said user reads aloud said dynamic text;
Converting unit 405, the speech conversion that is used for said information acquisition unit 404 is gathered is the speech recognition text;
Transmitting element 406 is used for said speech recognition text and vocal print characteristic are sent to said server.
Whether successfully the user understands this authentication for ease, and in the application embodiment, said receiving element 402 also can be further used for receiving the authentification failure message that said server returns; Correspondingly, said display unit 403 also is further used for showing said authentification failure message.
Certainly, said receiving element 402 also can be further used for receiving the operation success message that said server returns; Correspondingly, said display unit 403 also can be further used for showing said operation success message.
The wireless traffic terminal of the application embodiment can be a terminal equipment of carrying and can pass through wireless modes access the Internets such as WLAN, GPRS, 3G, such as mobile phone, net book etc.
The wireless traffic system of the application embodiment, the mode that adopts dynamic voice identification to combine with Application on Voiceprint Recognition realizes the authentication in the wireless traffic, fully guarantees the reliability of authentication, and then has guaranteed the fail safe of customer service.
For the convenience of describing, be divided into various unit with function when describing above equipment and describe respectively.Certainly, when implementing the application, can in same or a plurality of softwares and/or hardware, realize the function of each unit.
Description through above execution mode can know, those skilled in the art can be well understood to the application and can realize by the mode that software adds essential general hardware platform.Based on such understanding; The part that the application's technical scheme contributes to prior art in essence in other words can be come out with the embodied of software product; This computer software product can be stored in the storage medium, like ROM/RAM, magnetic disc, CD etc., comprises that some instructions are with so that a computer equipment (can be a personal computer; Server, the perhaps network equipment etc.) carry out the described method of some part of each embodiment of the application or embodiment.
Each embodiment in this specification all adopts the mode of going forward one by one to describe, and identical similar part is mutually referring to getting final product between each embodiment, and each embodiment stresses all is the difference with other embodiment.Especially, for system embodiment, because it is basically similar in appearance to method embodiment, so describe fairly simplely, relevant part gets final product referring to the part explanation of method embodiment.System embodiment described above only is schematic; Wherein said unit as the separating component explanation can or can not be physically to separate also; The parts that show as the unit can be or can not be physical locations also; Promptly can be positioned at a place, perhaps also can be distributed on a plurality of NEs.Can realize the purpose of present embodiment scheme according to the needs selection some or all of module wherein of reality.Those of ordinary skills promptly can understand and implement under the situation of not paying creative work.
The application can be used in numerous general or special purpose computingasystem environment or the configuration.For example: personal computer, server computer, handheld device or portable set, plate equipment, multicomputer system, the system based on microprocessor, set top box, programmable consumer-elcetronics devices, network PC, minicom, mainframe computer, comprise DCE of above any system or equipment or the like.
The application can describe in the general context of the computer executable instructions of being carried out by computer, for example program module.Usually, program module comprises the routine carrying out particular task or realize particular abstract, program, object, assembly, data structure or the like.Also can in DCE, put into practice the application, in these DCEs, by through communication network connected teleprocessing equipment execute the task.In DCE, program module can be arranged in this locality and the remote computer storage medium that comprises memory device.
The above only is the application's a embodiment; Should be pointed out that for those skilled in the art, under the prerequisite that does not break away from the application's principle; Can also make some improvement and retouching, these improvement and retouching also should be regarded as the application's protection range.