CN102457845A - Method, equipment and system for authenticating identity by wireless service - Google Patents

Method, equipment and system for authenticating identity by wireless service Download PDF

Info

Publication number
CN102457845A
CN102457845A CN2010105125931A CN201010512593A CN102457845A CN 102457845 A CN102457845 A CN 102457845A CN 2010105125931 A CN2010105125931 A CN 2010105125931A CN 201010512593 A CN201010512593 A CN 201010512593A CN 102457845 A CN102457845 A CN 102457845A
Authority
CN
China
Prior art keywords
authentication
text
wireless traffic
user
vocal print
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010105125931A
Other languages
Chinese (zh)
Other versions
CN102457845B (en
Inventor
诸寅嘉
孟超峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Lingxi Interactive Entertainment Co.,Ltd.
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201010512593.1A priority Critical patent/CN102457845B/en
Priority to CN201610157889.3A priority patent/CN105873050A/en
Publication of CN102457845A publication Critical patent/CN102457845A/en
Priority to HK12106884.2A priority patent/HK1166214A1/en
Application granted granted Critical
Publication of CN102457845B publication Critical patent/CN102457845B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/26Speech to text systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Biomedical Technology (AREA)
  • Acoustics & Sound (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a method, equipment and a system for authenticating an identity by a wireless service. The method comprises the following steps that: a server receives an identity authentication request sent by a wireless service terminal, generates a dynamic text, transmits the dynamic text to the wireless service terminal, receives a voice identification text and a voice print characteristic which are generated by reading the dynamic text by a user, authenticates the identity of the user by using the voice identification text and the voice print characteristic, if the voice identification text is matched with the dynamic text and the voice print characteristic is matched with a voice print characteristic registered by the user, determines that the user passes through the identity authentication, otherwise, determines that the user fails in the identity authentication. By applying the technical scheme, the reliability of the identity authentication can be guaranteed fully; and the security of the wireless service can be guaranteed.

Description

Wireless traffic identity identifying method, equipment and system
Technical field
The application relates to the mobile communication technology field, particularly relates to a kind of wireless traffic identity identifying method, equipment and system.
Background technology
Along with the development of mobile communication technology, wireless traffic has become a kind of new professional means.Such as, mobile phone no longer only is the instrument of voice call, and increasing application and service occurs on mobile phone terminal, and mobile-phone payment is exactly one of them.At present, China mobile payment market mainly contains two kinds of forms: the one, directly to deduct through mobile phone charge, and its business model is confined to rely in the service or range of application of the own business platform of operator usually.The 2nd, through mobile phone credit card and bank card are bound, directly withhold in the payment process from user's bank account, it is main with " Mobile banking " of " mobile phone wallet " of China Mobile and CHINAUNICOM service being provided.
When the wireless traffic mode by possibly develop into a kind of trend the time, the fail safe of its authentication has been exactly a topic that is worth inquiring into.Because existing wireless traffic terminal; Such as wireless terminal or portable equipment; Its platform diversity (Symbian, Windows Mobile, Android, iOS etc. are just arranged like mobile phone); The device processes performance is relatively low, causes developer or ISP under existing technical capability, can't dispose the security module relatively reliably of similar PC end for vast user effectively.For this reason; In the prior art, when carrying out wireless authentication, mostly adopt the dynamic password mode; Like dynamic password board, password card, mobile phone OTP (one-time password; One Time Password is called for short OTP) the note verification, perhaps external hardware encipher mode (such as the U shield) is carried out authentication to user identity.But which kind of mode no matter, its fail safe and controllability are all lower, in case because password and hardware encipher equipment are together stolen or lose, then be difficult to guarantee the reliable and fail safe of authentication, directly influence the fail safe of customer service or account.
Summary of the invention
For solving the problems of the technologies described above, the application embodiment provides a kind of wireless traffic identity identifying method, equipment and system, to guarantee the reliability of authentication.
The application embodiment provides following technical scheme:
A kind of wireless traffic identity identifying method comprises:
Server receives the ID authentication request that send at the wireless traffic terminal;
Generate dynamic text and said dynamic text is handed down to said wireless traffic terminal;
Receive according to the speech recognition text of reading aloud generation and the vocal print characteristic of user from said wireless traffic terminal said dynamic text;
Utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary; And the vocal print characteristic of said vocal print characteristic and said user registration is complementary, and authentication success then determines one's identity; Otherwise authentification failure determines one's identity.
A kind of wireless traffic identity identifying method comprises:
After the Client-initiated business operating instructions is received at the wireless traffic terminal, send ID authentication request to server;
After said server receives the ID authentication request of sending at the wireless traffic terminal, generate dynamic text, and said dynamic text is handed down to said wireless traffic terminal;
After said dynamic text is received at said wireless traffic terminal, show said dynamic text and point out the user to read aloud said dynamic text;
Voice and the vocal print characteristic that the user reads aloud said dynamic text gathered at said wireless traffic terminal, is the speech recognition text with the speech conversion of gathering, and said speech recognition text and vocal print characteristic are sent to server;
After said server receives said speech recognition text and vocal print characteristic; Utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary; And the vocal print characteristic of said vocal print characteristic and said user registration is complementary, then authentication success; Otherwise authentication failure.
A kind of server comprises:
The request receiving element is used to receive the ID authentication request that send at the wireless traffic terminal;
Text issues the unit, is used for after the described request receiving element receives said ID authentication request, generates dynamic text, and said dynamic text is handed down to said wireless traffic terminal;
Information receiving unit is used for receiving according to the speech recognition text of reading aloud generation and the vocal print characteristic of user to said dynamic text from said wireless traffic terminal;
The authentication unit; Be used to utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary, and the vocal print characteristic of said vocal print characteristic and said user registration is complementary, and authentication success then determines one's identity; Otherwise authentification failure determines one's identity.
A kind of wireless traffic system comprises: server and wireless traffic terminal;
Said service terminal comprises:
The authentication request unit is used for after receiving the Client-initiated business operating instructions, sends ID authentication request to server;
Receiving element is used to receive the dynamic text that said server issues;
Display unit is used to show said dynamic text and points out said user to read aloud said dynamic text;
Information acquisition unit is used to gather voice and the vocal print characteristic that said user reads aloud said dynamic text;
Converting unit, the speech conversion that is used for said information acquisition unit collection is the speech recognition text;
Transmitting element is used for said speech recognition text and vocal print characteristic are sent to said server;
Said server comprises:
The request receiving element is used for the ID authentication request that send at said reception wireless traffic terminal;
Text issues the unit, is used for after the described request receiving element receives said ID authentication request, generates dynamic text, and said dynamic text is handed down to said wireless traffic terminal;
Information receiving unit is used for receiving said speech recognition text and vocal print characteristic from said wireless traffic terminal;
The authentication unit; Be used to utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary, and the vocal print characteristic of said vocal print characteristic and said user registration is complementary, and authentication success then determines one's identity; Otherwise authentification failure determines one's identity.
The technical scheme that the application embodiment provides; The mode that adopts dynamic voice identification to combine with Application on Voiceprint Recognition; When the user carries out business or account operation through wireless authentication, issue and show one section literal that generates at random, i.e. dynamic text to the user; Obtain the speech recognition text of reading aloud generation and the vocal print characteristic to said dynamic text then according to the user; Utilize text that speech recognition technology confirms that the user reads aloud whether to be complementary, and whether the vocal print characteristic of further confirming to obtain and the vocal print characteristic of user's registered in advance be complementary, if both all are complementary with this dynamic text; Then determine one's identity authentication success otherwise the authentification failure that determines one's identity, thus the reliability of authentication guaranteed.
Further, if the authentication failure, then server forbids that the user carries out this authentication corresponding service operation, and then has guaranteed the fail safe of wireless traffic.
Description of drawings
In order to be illustrated more clearly in the application embodiment or technical scheme of the prior art; To do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art below; Obviously; The accompanying drawing that describes below only is some embodiment that put down in writing among the application, for those of ordinary skills, can also obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is a kind of flow chart of the application embodiment wireless traffic identity identifying method;
Fig. 2 is a kind of flow chart of the application embodiment wireless traffic identity identifying method;
Fig. 3 is a kind of structural representation of the application embodiment server;
Fig. 4 is a kind of structural representation at the application embodiment wireless traffic terminal.
Embodiment
In order to make those skilled in the art person understand the technical scheme among the application better; To combine the accompanying drawing among the application embodiment below; Technical scheme among the application embodiment is carried out clear, intactly description; Obviously, described embodiment only is the application's part embodiment, rather than whole embodiment.Based on the embodiment among the application, the every other embodiment that those of ordinary skills obtained should belong to the scope that the application protects.
At present, speech recognition technology is widely used in multiple fields such as signal processing, pattern recognition, artificial intelligence, and its target is to convert the vocabulary content in the mankind's the voice into computer-readable input, for example button, binary coding or character string.
The generation of human speech is complex physical physical process between human body speech center and the vocal organs; Phonatory organs such as the tongue that the people used in when speech, tooth, larynx, lung, nasal cavity are everyone widely different aspect size and the form, so any two people's vocal print collection of illustrative plates is all variant.Everyone existing relative stability of voice acoustic feature has variability again, is not absolute, unalterable.This variation can be from physiology, pathology, psychology, simulation, camouflage, and is also relevant with environmental interference.However, because everyone vocal organs all are not quite similar, therefore in the ordinary course of things, still can distinguish different people's sound or judge whether is same people's sound.
For this reason, the application embodiment wireless traffic identity identifying method, equipment and system, the identification authentication mode that adopts dynamic voice identification to combine with Application on Voiceprint Recognition; When the user carries out account operation through wireless traffic, issue and show one section literal that generates at random, i.e. dynamic text to the user; Obtain the speech recognition text of reading aloud generation and the vocal print characteristic to said dynamic text then, utilize speech recognition technology, confirm that whether text that the user reads aloud is complementary with this dynamic text according to the user; And whether the vocal print characteristic of further confirming to obtain and the vocal print characteristic of user's registered in advance be complementary, if both all are complementary, and then authentication success; Allow the user to carry out this authentication corresponding service operation; Otherwise the authentication failure is forbidden this business operation, thereby is fully guaranteed service security property.
Said speech recognition is meant, converts the vocabulary content in the voice into computer-readable input, to discern the word content that is wherein comprised.
Said Application on Voiceprint Recognition is meant, from the voice signal that the speaker sends, extracts speaker's voiceprint automatically, and the research field that the speaker is discerned.Similar with fingerprint; The vocal print of different people is different; Everyone can identify the vocal print characteristic in the voice because the behavior difference that forms the differences of Physiological of vocal organs and the day after tomorrow makes that the vocal print in their voice all has strong personal colors through prior art.
In the application's a embodiment, a kind of wireless traffic identity identifying method is provided, as shown in Figure 1, this method comprises following basic step:
Step 101, server receives the ID authentication request that send at the wireless traffic terminal.
Said wireless traffic terminal can be to carry and can pass through WLAN (Wireless Local Area Networks; WLAN), GPRS (General Packet Radio Service; General packet radio service), 3G (3rd-generation; 3G (Third Generation) Moblie technology) waits the terminal equipment of wireless mode access the Internet, such as mobile phone, net book etc.
The wireless traffic terminal can connect (through WLAN, GPRS or 3G etc.) through the data of setting up; Based on agreements such as Https, Http, Socket; Specifically can select or be provided with in advance protocol type automatically, through sending predefined required parameter to server, submitting user's ID authentication request to through encrypted data packet or through the private message of transmitting with the frame mode of encrypting according to the equipment performance and the network state at that time of the level of security of wireless traffic, client.
Step 102 generates dynamic text and said dynamic text is handed down to said wireless traffic terminal.
After server is received the ID authentication request of sending at said wireless traffic terminal; Generate dynamic text to this ID authentication request; This dynamic text can be the passage that produces at random; For the ID authentication request of different user or the ID authentication request of same user's different time, the dynamic text of generation can be identical, also can be different.
Such as; After service end receives that the user passes through the ID authentication request of wireless traffic client initiation; Generate one section dynamic text at random like " fail safe is high "; And the interface channel of having set up through current wireless client and service end such as Wi-Fi, GPRS radio channels such as (General Packet Radio Service, general packet radio service technology) be handed down to the wireless traffic terminal, after the wireless traffic terminal successfully receives dynamic text; In the wireless traffic client of correspondence, show " fail safe is high ", and the prompting user reads aloud text.
In order further to guarantee the fail safe of said dynamic text in transmission course; Encrypted transmission can also be carried out to said dynamic text in the wireless traffic terminal; Certainly, the mode of encryption can be that server and wireless traffic terminal both sides consult, and also can make an appointment.
Step 103 receives according to the speech recognition text of reading aloud generation and the vocal print characteristic of user to said dynamic text from said wireless traffic terminal.
The wireless traffic terminal shows said dynamic text and points out said user to read aloud said dynamic text after receiving the dynamic text that server issues, such as can when showing said dynamic text, showing following information simultaneously: " please read aloud following literal ".Certainly, can adopt other prompting mode, to this, the application embodiment does not do qualification yet.
When the user read aloud said dynamic text, voice and the vocal print characteristic that the user reads aloud said dynamic text gathered at the wireless traffic terminal, and was the speech recognition text with the speech conversion of gathering; Then said speech recognition text and vocal print characteristic are sent to said server.
Voice and the vocal print characteristic that the user reads aloud said dynamic text gathered at said wireless traffic terminal, can realize that specifically said sound card provides following function through microphone, sound card: to signal filtering, amplification, sampling maintenance, A/D and D/A conversion etc.
Said with the speech conversion of gathering for the speech recognition text is speech recognition, be meant to convert the vocabulary content in the voice into computer-readable input the word content that is wherein comprised with identification.Particularly, can adopt the method for method based on channel model and voice knowledge, template matches and utilize in the Artificial Neural Network model one or more.The concrete implementation procedure of speech recognition can be identical with prior art, repeats no more at this.
Step 104 judges whether said speech recognition text and said dynamic text are complementary, and whether the vocal print characteristic of said vocal print characteristic and said user registration be complementary, if then execution in step 105; Otherwise, execution in step 106.
The vocal print characteristic of said user registration can be user preset read aloud the vocal print characteristic that the pronunciation custom is extracted by server according to the user, such as being undertaken by following process:
The user is activating the service or during registering account, submit relevant documentation of identity to after, select to open the vocal print identity authentication function.Also can be in professional use, under the situation of submitting the relevant susceptible of proof account really of documentation of identity owner to, the vocal print identity authentication function is opened in application.
The user can pass through the terminal, and for example voice call equipment such as PC terminal, mobile phone, landline telephone carry out the registration of vocal print characteristic.Particularly; The user initiates to open the vocal print register requirement through terminal to server, after server is received this register requirement, sends passage to user's application terminal; And read aloud this section literal through the current application terminal notifying user of user; For example, when portable terminal uses the PC application as the user, then point out through the screen display or the speaker sound of PC end; As when using the application of voice call equipment; Then carry out voice suggestion through the current speech verbal system; After terminal collection user reads aloud the voice messaging of this section literal; This voice messaging is transferred to server, after server is received this voice messaging, extract the vocal print characteristic in the voice messaging that the user reads aloud this section literal.Wherein, the vocal print characteristic in the voice messaging also can be extracted through the terminal, then by the terminal with the vocal print characteristic of obtaining and non-voice information is sent to server, specifically adopt which kind of mode to decide by at that time client or environmental condition.Server is characterized as this user according to the vocal print in this voice messaging and sets up the vocal print payment cipher, the vocal print characteristic of promptly above-mentioned said user's registration.
Step 105, authentication success determines one's identity.
After the authentication success, said server can allow said user to carry out this authentication corresponding service operation.
Step 106, authentification failure determines one's identity.
After the authentication failure, said server can forbid that said user carries out this authentication corresponding service operation.
Further, after the authentication failure, said server can also be to said wireless traffic terminal return authentication failed message.Correspondingly, said wireless traffic terminal shows this message after receiving said authentification failure message.
And after the user carried out this authentication corresponding service operation completion, said server can also be to said wireless traffic terminal return success message.Correspondingly, after said operation information is received at said wireless traffic terminal, show this message, so that the user confirms this business operation success.
The method of the application embodiment wireless traffic authentication; The mode that adopts dynamic voice identification to combine with Application on Voiceprint Recognition realizes the authentication in the wireless traffic; Because the text that the user reads aloud is generated by server end at random; Even therefore user's vocal print characteristic is stolen, also be difficult to simulation and forgery; And the coupling of vocal print characteristic is accomplished at server end, isolates fully with the wireless traffic terminal, and is that vocal print characteristic with user registration is complementary, and has prevented that machine simulation from reading aloud, and can't be cracked at the wireless traffic terminal.
In practical application, can also come further to improve fail safe through the mode of restriction single authentication time and number of times.Such as, service end can require the wireless traffic terminal to return information to be certified in 30 seconds after receiving this authentication information, otherwise by this Business Processing of the overtime cancellation of authentication.And for example, continuous three authentification failures of user or overtime after, this Business Processing of service end immediate cancel is to guarantee the fail safe of customer service.
The application embodiment wireless traffic identity identifying method; To hardware requirement and all lower to environmental requirement, can be widely used in the multiple wireless traffic terminal, be specially adapted to carry out in the wireless traffic of authentication; For example wireless payment business etc. fully guarantees the fail safe of user account.
As shown in Figure 2, be a kind of flow chart of the application embodiment wireless traffic identity identifying method, may further comprise the steps:
Step 201 after the Client-initiated business operating instructions is received at the wireless traffic terminal, is sent ID authentication request to server;
After step 202, said server receive the ID authentication request of sending at the wireless traffic terminal, generate dynamic text;
Step 203, said server is handed down to said wireless traffic terminal with said dynamic text;
Step 204 after said dynamic text is received at said wireless traffic terminal, shows said dynamic text and points out the user to read aloud said dynamic text;
Step 205, voice and the vocal print characteristic that the user reads aloud said dynamic text gathered at said wireless traffic terminal, is the speech recognition text with the speech conversion of gathering;
Step 206, said wireless traffic terminal sends to server with said speech recognition text and vocal print characteristic;
Step 207; After said server receives said speech recognition text and vocal print characteristic; Utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary, and the vocal print characteristic of said vocal print characteristic and said user registration is complementary then authentication success; Otherwise authentication failure.
In embodiments of the present invention, after the authentication success, said server can allow said user to carry out this authentication corresponding service operation.After the authentication failure, said server can forbid that said user carries out this authentication corresponding service operation.
And after the authentication failure, said server can also be to said wireless traffic terminal return authentication failed message, step 208 as shown in Figure 2.Correspondingly, said wireless traffic terminal can show this message after receiving said authentification failure message.
In addition, after the user carried out this authentication corresponding service operation completion, said server can also be to said wireless traffic terminal return success message.Correspondingly, after said operation information is received at said wireless traffic terminal, show this message, so that the user confirms this business operation success.
Correspondingly, in another embodiment of the application, a kind of server is provided, as shown in Figure 3, this server 300 comprises:
Request receiving element 301 is used to receive the ID authentication request that send at the wireless traffic terminal;
Text issues unit 302, is used for after described request receiving element 201 receives said ID authentication request, generates dynamic text, and said dynamic text is handed down to said wireless traffic terminal;
Information receiving unit 303 is used for receiving according to the speech recognition text of reading aloud generation and the vocal print characteristic of user to said dynamic text from said wireless traffic terminal;
Authentication unit 304; Be used to utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary; And the vocal print characteristic of said vocal print characteristic and said user registration is complementary, and authentication success then determines one's identity; Otherwise authentification failure determines one's identity.
In another embodiment of the application, said server 300 also can further comprise:
Control unit (not shown) is used for after said authentication unit 304 determines one's identity authentication success, allows said user to carry out this authentication corresponding service operation; After said authentication unit 304 determines one's identity authentification failure, forbid that said user carries out this authentication corresponding service operation.
In another embodiment of the application, said server 300 also can further comprise: notification unit (not shown) is used for after the authentication failure is confirmed in said authentication unit 304, to said wireless traffic terminal return authentication failed message.
Certainly, the user understands whether success of this operation for ease, said notification unit, also be used in the business operation success after, to said wireless traffic terminal return success message, so that the user confirms this business operation success.
The server of the application embodiment; The mode that adopts dynamic voice identification to combine with Application on Voiceprint Recognition realizes authenticating user identification; When the user operates through the wireless traffic terminal carrying out service, issue dynamic text to the user, obtain the speech recognition text of reading aloud generation and the vocal print characteristic to said dynamic text then according to the user; Utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary, and the vocal print characteristic of said vocal print characteristic and said user registration is complementary, and authentication success then determines one's identity; Otherwise authentification failure determines one's identity.Thereby guaranteed the reliability of authentication.Further, if the authentication failure, server forbids that the user carries out this authentication corresponding service operation, and then has guaranteed the fail safe of wireless traffic.
Correspondingly, in another embodiment of the application, a kind of wireless traffic system is provided, this system comprises: server and wireless traffic terminal.Wherein:
Said server is used to receive the ID authentication request that send at said wireless traffic terminal, and after receiving said ID authentication request, generates dynamic text, and said dynamic text is handed down to said wireless traffic terminal; Receive according to the speech recognition text of reading aloud generation and the vocal print characteristic of user from said wireless traffic terminal said dynamic text; Utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary; And the vocal print characteristic of said vocal print characteristic and said user registration is complementary, and authentication success then determines one's identity; Otherwise authentification failure determines one's identity.The concrete structure of said server possibly repeat no more at this with reference to the description of front embodiment.
Said wireless traffic terminal; Be used for after receiving said Client-initiated business operating instructions; Send said ID authentication request to said server, and receive the dynamic text that said server sends, show said dynamic text and point out said user to read aloud said dynamic text; Gather voice and vocal print characteristic that said user reads aloud said dynamic text; With the speech conversion of gathering is the speech recognition text; Said speech recognition text and vocal print characteristic are sent to said server.
As shown in Figure 4, a kind of structural representation at the wireless traffic terminal among the application embodiment.
In this embodiment, said wireless traffic terminal 400 comprises:
Authentication request unit 401 is used for after receiving the Client-initiated business operating instructions, sends ID authentication request to server;
Receiving element 402 is used to receive the dynamic text that said server issues;
Display unit 403 is used to show said dynamic text and points out said user to read aloud said dynamic text;
Information acquisition unit 404 is used to gather voice and the vocal print characteristic that said user reads aloud said dynamic text;
Converting unit 405, the speech conversion that is used for said information acquisition unit 404 is gathered is the speech recognition text;
Transmitting element 406 is used for said speech recognition text and vocal print characteristic are sent to said server.
Whether successfully the user understands this authentication for ease, and in the application embodiment, said receiving element 402 also can be further used for receiving the authentification failure message that said server returns; Correspondingly, said display unit 403 also is further used for showing said authentification failure message.
Certainly, said receiving element 402 also can be further used for receiving the operation success message that said server returns; Correspondingly, said display unit 403 also can be further used for showing said operation success message.
The wireless traffic terminal of the application embodiment can be a terminal equipment of carrying and can pass through wireless modes access the Internets such as WLAN, GPRS, 3G, such as mobile phone, net book etc.
The wireless traffic system of the application embodiment, the mode that adopts dynamic voice identification to combine with Application on Voiceprint Recognition realizes the authentication in the wireless traffic, fully guarantees the reliability of authentication, and then has guaranteed the fail safe of customer service.
For the convenience of describing, be divided into various unit with function when describing above equipment and describe respectively.Certainly, when implementing the application, can in same or a plurality of softwares and/or hardware, realize the function of each unit.
Description through above execution mode can know, those skilled in the art can be well understood to the application and can realize by the mode that software adds essential general hardware platform.Based on such understanding; The part that the application's technical scheme contributes to prior art in essence in other words can be come out with the embodied of software product; This computer software product can be stored in the storage medium, like ROM/RAM, magnetic disc, CD etc., comprises that some instructions are with so that a computer equipment (can be a personal computer; Server, the perhaps network equipment etc.) carry out the described method of some part of each embodiment of the application or embodiment.
Each embodiment in this specification all adopts the mode of going forward one by one to describe, and identical similar part is mutually referring to getting final product between each embodiment, and each embodiment stresses all is the difference with other embodiment.Especially, for system embodiment, because it is basically similar in appearance to method embodiment, so describe fairly simplely, relevant part gets final product referring to the part explanation of method embodiment.System embodiment described above only is schematic; Wherein said unit as the separating component explanation can or can not be physically to separate also; The parts that show as the unit can be or can not be physical locations also; Promptly can be positioned at a place, perhaps also can be distributed on a plurality of NEs.Can realize the purpose of present embodiment scheme according to the needs selection some or all of module wherein of reality.Those of ordinary skills promptly can understand and implement under the situation of not paying creative work.
The application can be used in numerous general or special purpose computingasystem environment or the configuration.For example: personal computer, server computer, handheld device or portable set, plate equipment, multicomputer system, the system based on microprocessor, set top box, programmable consumer-elcetronics devices, network PC, minicom, mainframe computer, comprise DCE of above any system or equipment or the like.
The application can describe in the general context of the computer executable instructions of being carried out by computer, for example program module.Usually, program module comprises the routine carrying out particular task or realize particular abstract, program, object, assembly, data structure or the like.Also can in DCE, put into practice the application, in these DCEs, by through communication network connected teleprocessing equipment execute the task.In DCE, program module can be arranged in this locality and the remote computer storage medium that comprises memory device.
The above only is the application's a embodiment; Should be pointed out that for those skilled in the art, under the prerequisite that does not break away from the application's principle; Can also make some improvement and retouching, these improvement and retouching also should be regarded as the application's protection range.

Claims (10)

1. a wireless traffic identity identifying method is characterized in that, comprising:
Server receives the ID authentication request that send at the wireless traffic terminal;
Generate dynamic text and said dynamic text is handed down to said wireless traffic terminal;
Receive according to the speech recognition text of reading aloud generation and the vocal print characteristic of user from said wireless traffic terminal said dynamic text;
Utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary; And the vocal print characteristic of said vocal print characteristic and said user registration is complementary, and authentication success then determines one's identity; Otherwise authentification failure determines one's identity.
2. method according to claim 1 is characterized in that, said method also comprises:
If determine one's identity authentication success, then server allows said user to carry out this authentication corresponding service operation;
If determine one's identity authentification failure, then server forbids that said user carries out this authentication corresponding service operation.
3. method according to claim 1 and 2 is characterized in that, said method also comprises:
If determine one's identity authentification failure, then server is to said wireless traffic terminal return authentication failed message.
4. a wireless traffic identity identifying method is characterized in that, comprising:
After the Client-initiated business operating instructions is received at the wireless traffic terminal, send ID authentication request to server;
After said server receives the ID authentication request of sending at the wireless traffic terminal, generate dynamic text, and said dynamic text is handed down to said wireless traffic terminal;
After said dynamic text is received at said wireless traffic terminal, show said dynamic text and point out the user to read aloud said dynamic text;
Voice and the vocal print characteristic that the user reads aloud said dynamic text gathered at said wireless traffic terminal, is the speech recognition text with the speech conversion of gathering, and said speech recognition text and vocal print characteristic are sent to server;
After said server receives said speech recognition text and vocal print characteristic; Utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary; And the vocal print characteristic of said vocal print characteristic and said user registration is complementary, then authentication success; Otherwise authentication failure.
5. method according to claim 4 is characterized in that, said method also comprises:
If the authentication failure, then said server is to wireless traffic terminal return authentication failed message;
After said authentification failure message is received at said wireless traffic terminal, show said authentification failure message.
6. a server is characterized in that, comprising:
The request receiving element is used to receive the ID authentication request that send at the wireless traffic terminal;
Text issues the unit, is used for after the described request receiving element receives said ID authentication request, generates dynamic text, and said dynamic text is handed down to said wireless traffic terminal;
Information receiving unit is used for receiving according to the speech recognition text of reading aloud generation and the vocal print characteristic of user to said dynamic text from said wireless traffic terminal;
The authentication unit; Be used to utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary, and the vocal print characteristic of said vocal print characteristic and said user registration is complementary, and authentication success then determines one's identity; Otherwise authentification failure determines one's identity.
7. server according to claim 6 is characterized in that, said server also comprises:
Control unit is used for after said authentication unit determines one's identity authentication success, allows said user to carry out this authentication corresponding service operation; Behind the authentification failure that determines one's identity, forbid that said user carries out this authentication corresponding service operation.
8. according to claim 6 or 7 described servers, it is characterized in that said server also comprises:
Notification unit is used for after the authentication failure is confirmed in said authentication unit, to said wireless traffic terminal return authentication failed message.
9. a wireless traffic system is characterized in that, comprising: server and wireless traffic terminal;
Said service terminal comprises:
The authentication request unit is used for after receiving the Client-initiated business operating instructions, sends ID authentication request to server;
Receiving element is used to receive the dynamic text that said server issues;
Display unit is used to show said dynamic text and points out said user to read aloud said dynamic text;
Information acquisition unit is used to gather voice and the vocal print characteristic that said user reads aloud said dynamic text;
Converting unit, the speech conversion that is used for said information acquisition unit collection is the speech recognition text;
Transmitting element is used for said speech recognition text and vocal print characteristic are sent to said server;
Said server comprises:
The request receiving element is used for the ID authentication request that send at said reception wireless traffic terminal;
Text issues the unit, is used for after the described request receiving element receives said ID authentication request, generates dynamic text, and said dynamic text is handed down to said wireless traffic terminal;
Information receiving unit is used for receiving said speech recognition text and vocal print characteristic from said wireless traffic terminal;
The authentication unit; Be used to utilize said speech recognition text and vocal print characteristic that said user is carried out authentication; If said speech recognition text and said dynamic text are complementary, and the vocal print characteristic of said vocal print characteristic and said user registration is complementary, and authentication success then determines one's identity; Otherwise authentification failure determines one's identity.
10. wireless traffic according to claim 9 system is characterized in that,
Said server also comprises: notification unit is used for after the authentication failure is confirmed in said authentication unit, to said wireless traffic terminal return authentication failed message;
Said receiving element also is used to receive said authentification failure message;
Said display unit also is used to show said authentification failure message.
CN201010512593.1A 2010-10-14 2010-10-14 Wireless traffic identity identifying method, equipment and system Active CN102457845B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201010512593.1A CN102457845B (en) 2010-10-14 2010-10-14 Wireless traffic identity identifying method, equipment and system
CN201610157889.3A CN105873050A (en) 2010-10-14 2010-10-14 Wireless service identity authentication, server and system
HK12106884.2A HK1166214A1 (en) 2010-10-14 2012-07-12 Method, device and system for identity authentication of radio service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010512593.1A CN102457845B (en) 2010-10-14 2010-10-14 Wireless traffic identity identifying method, equipment and system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201610157889.3A Division CN105873050A (en) 2010-10-14 2010-10-14 Wireless service identity authentication, server and system

Publications (2)

Publication Number Publication Date
CN102457845A true CN102457845A (en) 2012-05-16
CN102457845B CN102457845B (en) 2016-04-13

Family

ID=46040399

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201010512593.1A Active CN102457845B (en) 2010-10-14 2010-10-14 Wireless traffic identity identifying method, equipment and system
CN201610157889.3A Pending CN105873050A (en) 2010-10-14 2010-10-14 Wireless service identity authentication, server and system

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201610157889.3A Pending CN105873050A (en) 2010-10-14 2010-10-14 Wireless service identity authentication, server and system

Country Status (2)

Country Link
CN (2) CN102457845B (en)
HK (1) HK1166214A1 (en)

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102984152A (en) * 2012-11-27 2013-03-20 江苏乐买到网络科技有限公司 Password authentication method based on online shopping
CN103118002A (en) * 2012-12-21 2013-05-22 北京飞漫软件技术有限公司 Method of speech sound used as secret key to achieve data resource cloud storage management
WO2013171603A1 (en) * 2012-05-17 2013-11-21 International Business Machines Corporation Mobile device validation
CN103903622A (en) * 2012-12-28 2014-07-02 腾讯科技(深圳)有限公司 Voice verification method, apparatus and system
CN103986711A (en) * 2014-05-16 2014-08-13 天地融科技股份有限公司 Data processing method for voice communication
CN104104664A (en) * 2013-04-11 2014-10-15 腾讯科技(深圳)有限公司 Method, server, client and system for verifying verification code
CN104168270A (en) * 2014-07-31 2014-11-26 腾讯科技(深圳)有限公司 Identity verifying method, server, client side and system
CN104184587A (en) * 2014-08-08 2014-12-03 腾讯科技(深圳)有限公司 Voiceprint generation method, voiceprint generation server, client and voiceprint generation system
CN104217149A (en) * 2013-05-31 2014-12-17 国际商业机器公司 Biometric authentication method and equipment based on voice
CN104348621A (en) * 2013-08-02 2015-02-11 成都林海电子有限责任公司 Authentication system based on voiceprint recognition and method thereof
CN104392353A (en) * 2014-10-08 2015-03-04 无锡指网生物识别科技有限公司 Payment method and system of voice recognition terminal
CN104869497A (en) * 2015-03-24 2015-08-26 广东欧珀移动通信有限公司 Wireless network setting method and apparatus of WIFI sound box
WO2015169000A1 (en) * 2014-05-06 2015-11-12 中兴通讯股份有限公司 Identity recognition method and apparatus, and storage medium
CN105224844A (en) * 2014-07-01 2016-01-06 腾讯科技(深圳)有限公司 Verification method, system and device
CN105321514A (en) * 2014-05-28 2016-02-10 西安中兴新软件有限责任公司 Alarm method and terminal
CN105933272A (en) * 2015-12-30 2016-09-07 中国银联股份有限公司 Voiceprint recognition method capable of preventing recording attack, server, terminal, and system
CN105991605A (en) * 2015-02-27 2016-10-05 中兴通讯股份有限公司 WIFI connection verification method, WIFI hot spot device and terminal
CN106098069A (en) * 2016-06-21 2016-11-09 佛山科学技术学院 A kind of identity identifying method and terminal unit
CN106302339A (en) * 2015-05-25 2017-01-04 腾讯科技(深圳)有限公司 Login validation method and device, login method and device
CN106485499A (en) * 2016-10-24 2017-03-08 安徽百慕文化科技有限公司 One kind is based on voice-operated on-line payment system
CN106531154A (en) * 2016-11-15 2017-03-22 传世未来(北京)信息科技有限公司 Authentication method and device
CN106789957A (en) * 2016-11-30 2017-05-31 无锡小天鹅股份有限公司 The voice login method and its smart machine of laundry applications
CN107046483A (en) * 2017-05-11 2017-08-15 广东美的制冷设备有限公司 The collocation method of wireless network, device and system
WO2017162053A1 (en) * 2016-03-21 2017-09-28 中兴通讯股份有限公司 Identity authentication method and device
CN107437416A (en) * 2017-05-23 2017-12-05 阿里巴巴集团控股有限公司 A kind of consultation service processing method and processing device based on speech recognition
CN107526951A (en) * 2016-06-21 2017-12-29 深圳市中兴微电子技术有限公司 A kind of method for sending information and device
CN108376546A (en) * 2017-01-31 2018-08-07 三星电子株式会社 Pronunciation inputting method and the electronic equipment for supporting this method and system
CN109192213A (en) * 2018-08-21 2019-01-11 平安科技(深圳)有限公司 The real-time transfer method of court's trial voice, device, computer equipment and storage medium
CN109325771A (en) * 2018-09-20 2019-02-12 北京得意音通技术有限责任公司 Auth method, device, computer program, storage medium and electronic equipment
US10276168B2 (en) 2014-07-31 2019-04-30 Tencent Technology (Shenzhen) Company Limited Voiceprint verification method and device
CN110349585A (en) * 2018-04-04 2019-10-18 富士通株式会社 Voice authentication method and information processing equipment
CN111883140A (en) * 2020-07-24 2020-11-03 中国平安人寿保险股份有限公司 Authentication method, device, equipment and medium based on knowledge graph and voiceprint recognition
CN112751838A (en) * 2020-12-25 2021-05-04 中国人民解放军陆军装甲兵学院 Identity authentication method, device and system
CN113378134A (en) * 2021-06-08 2021-09-10 国科政信科技(北京)股份有限公司 Identity authentication method and device
CN113989998A (en) * 2021-11-05 2022-01-28 中国工商银行股份有限公司 Voice recognition payment method, apparatus, device, medium, and program product
CN114285614A (en) * 2021-12-16 2022-04-05 北京安捷金科信息技术有限公司 Identity authentication method, identity authentication system and readable storage medium

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018126338A1 (en) * 2017-01-03 2018-07-12 Nokia Technologies Oy Apparatus, method and computer program product for authentication
CN106961418A (en) * 2017-02-08 2017-07-18 北京捷通华声科技股份有限公司 Identity identifying method and identity authorization system
CN107221331A (en) * 2017-06-05 2017-09-29 深圳市讯联智付网络有限公司 A kind of personal identification method and equipment based on vocal print
CN107342079A (en) * 2017-07-05 2017-11-10 谌勋 A kind of acquisition system of the true voice based on internet
CN110675880B (en) * 2019-10-21 2021-01-05 北京声智科技有限公司 Identity verification method and device and electronic equipment
CN115565539B (en) * 2022-11-21 2023-02-07 中网道科技集团股份有限公司 Data processing method for realizing self-help correction terminal anti-counterfeiting identity verification

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1877697A (en) * 2006-07-25 2006-12-13 北京理工大学 Method for identifying speaker based on distributed structure
US20070036289A1 (en) * 2005-07-27 2007-02-15 Fu Guo K Voice authentication system and method using a removable voice id card
CN101231737A (en) * 2008-02-25 2008-07-30 北京飞天诚信科技有限公司 Method and system for enhancing internet bank trade security
CN101311953A (en) * 2007-05-25 2008-11-26 上海电虹软件有限公司 Network payment method and system based on voiceprint authentication
CN101437227A (en) * 2007-11-16 2009-05-20 中国移动通信集团公司 Application access control system and method
CN101494540A (en) * 2009-03-04 2009-07-29 北京英立讯科技有限公司 Remote voice identification authentication system and method
CN101685635A (en) * 2008-09-23 2010-03-31 吕共欣 Identity authentication system and method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7254383B2 (en) * 2004-07-30 2007-08-07 At&T Knowledge Ventures, L.P. Voice over IP based biometric authentication
US7536304B2 (en) * 2005-05-27 2009-05-19 Porticus, Inc. Method and system for bio-metric voice print authentication
CN101635743B (en) * 2009-04-02 2014-11-26 杭州亚泽信息科技有限公司 System and method using biologic characteristic certification result to validate identity of mobile terminal holder

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070036289A1 (en) * 2005-07-27 2007-02-15 Fu Guo K Voice authentication system and method using a removable voice id card
CN1877697A (en) * 2006-07-25 2006-12-13 北京理工大学 Method for identifying speaker based on distributed structure
CN101311953A (en) * 2007-05-25 2008-11-26 上海电虹软件有限公司 Network payment method and system based on voiceprint authentication
CN101437227A (en) * 2007-11-16 2009-05-20 中国移动通信集团公司 Application access control system and method
CN101231737A (en) * 2008-02-25 2008-07-30 北京飞天诚信科技有限公司 Method and system for enhancing internet bank trade security
CN101685635A (en) * 2008-09-23 2010-03-31 吕共欣 Identity authentication system and method
CN101494540A (en) * 2009-03-04 2009-07-29 北京英立讯科技有限公司 Remote voice identification authentication system and method

Cited By (51)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013171603A1 (en) * 2012-05-17 2013-11-21 International Business Machines Corporation Mobile device validation
GB2517369B (en) * 2012-05-17 2017-11-29 Ibm Mobile device validation
US8903360B2 (en) 2012-05-17 2014-12-02 International Business Machines Corporation Mobile device validation
GB2517369A (en) * 2012-05-17 2015-02-18 Ibm Mobile device validation
CN102984152A (en) * 2012-11-27 2013-03-20 江苏乐买到网络科技有限公司 Password authentication method based on online shopping
CN103118002A (en) * 2012-12-21 2013-05-22 北京飞漫软件技术有限公司 Method of speech sound used as secret key to achieve data resource cloud storage management
CN103903622A (en) * 2012-12-28 2014-07-02 腾讯科技(深圳)有限公司 Voice verification method, apparatus and system
CN104104664A (en) * 2013-04-11 2014-10-15 腾讯科技(深圳)有限公司 Method, server, client and system for verifying verification code
CN104217149B (en) * 2013-05-31 2017-05-24 国际商业机器公司 Biometric authentication method and equipment based on voice
CN104217149A (en) * 2013-05-31 2014-12-17 国际商业机器公司 Biometric authentication method and equipment based on voice
CN104348621A (en) * 2013-08-02 2015-02-11 成都林海电子有限责任公司 Authentication system based on voiceprint recognition and method thereof
WO2015169000A1 (en) * 2014-05-06 2015-11-12 中兴通讯股份有限公司 Identity recognition method and apparatus, and storage medium
CN103986711A (en) * 2014-05-16 2014-08-13 天地融科技股份有限公司 Data processing method for voice communication
CN103986711B (en) * 2014-05-16 2017-09-19 天地融科技股份有限公司 A kind of data processing method of voice call
CN105321514A (en) * 2014-05-28 2016-02-10 西安中兴新软件有限责任公司 Alarm method and terminal
CN105224844B (en) * 2014-07-01 2020-01-24 腾讯科技(深圳)有限公司 Verification method, system and device
CN105224844A (en) * 2014-07-01 2016-01-06 腾讯科技(深圳)有限公司 Verification method, system and device
CN104168270B (en) * 2014-07-31 2016-01-13 腾讯科技(深圳)有限公司 Auth method, server, client and system
CN104168270A (en) * 2014-07-31 2014-11-26 腾讯科技(深圳)有限公司 Identity verifying method, server, client side and system
US10276168B2 (en) 2014-07-31 2019-04-30 Tencent Technology (Shenzhen) Company Limited Voiceprint verification method and device
CN104184587B (en) * 2014-08-08 2016-04-20 腾讯科技(深圳)有限公司 Vocal print generation method, server, client and system
CN104184587A (en) * 2014-08-08 2014-12-03 腾讯科技(深圳)有限公司 Voiceprint generation method, voiceprint generation server, client and voiceprint generation system
CN104392353A (en) * 2014-10-08 2015-03-04 无锡指网生物识别科技有限公司 Payment method and system of voice recognition terminal
CN105991605A (en) * 2015-02-27 2016-10-05 中兴通讯股份有限公司 WIFI connection verification method, WIFI hot spot device and terminal
CN104869497A (en) * 2015-03-24 2015-08-26 广东欧珀移动通信有限公司 Wireless network setting method and apparatus of WIFI sound box
CN104869497B (en) * 2015-03-24 2018-12-11 广东欧珀移动通信有限公司 A kind of the wireless network setting method and device of WIFI speaker
CN106302339A (en) * 2015-05-25 2017-01-04 腾讯科技(深圳)有限公司 Login validation method and device, login method and device
CN105933272A (en) * 2015-12-30 2016-09-07 中国银联股份有限公司 Voiceprint recognition method capable of preventing recording attack, server, terminal, and system
WO2017162053A1 (en) * 2016-03-21 2017-09-28 中兴通讯股份有限公司 Identity authentication method and device
CN107526951A (en) * 2016-06-21 2017-12-29 深圳市中兴微电子技术有限公司 A kind of method for sending information and device
CN106098069B (en) * 2016-06-21 2019-12-20 佛山科学技术学院 Identity authentication method and terminal equipment
CN106098069A (en) * 2016-06-21 2016-11-09 佛山科学技术学院 A kind of identity identifying method and terminal unit
CN106485499A (en) * 2016-10-24 2017-03-08 安徽百慕文化科技有限公司 One kind is based on voice-operated on-line payment system
CN106531154A (en) * 2016-11-15 2017-03-22 传世未来(北京)信息科技有限公司 Authentication method and device
CN106789957A (en) * 2016-11-30 2017-05-31 无锡小天鹅股份有限公司 The voice login method and its smart machine of laundry applications
CN108376546A (en) * 2017-01-31 2018-08-07 三星电子株式会社 Pronunciation inputting method and the electronic equipment for supporting this method and system
CN108376546B (en) * 2017-01-31 2023-06-27 三星电子株式会社 Voice input method, and electronic device and system for supporting the same
CN107046483A (en) * 2017-05-11 2017-08-15 广东美的制冷设备有限公司 The collocation method of wireless network, device and system
CN107437416A (en) * 2017-05-23 2017-12-05 阿里巴巴集团控股有限公司 A kind of consultation service processing method and processing device based on speech recognition
CN107437416B (en) * 2017-05-23 2020-11-17 创新先进技术有限公司 Consultation service processing method and device based on voice recognition
CN110349585B (en) * 2018-04-04 2023-05-05 富士通株式会社 Voice authentication method and information processing apparatus
CN110349585A (en) * 2018-04-04 2019-10-18 富士通株式会社 Voice authentication method and information processing equipment
CN109192213A (en) * 2018-08-21 2019-01-11 平安科技(深圳)有限公司 The real-time transfer method of court's trial voice, device, computer equipment and storage medium
CN109192213B (en) * 2018-08-21 2023-10-20 平安科技(深圳)有限公司 Method and device for real-time transcription of court trial voice, computer equipment and storage medium
CN109325771A (en) * 2018-09-20 2019-02-12 北京得意音通技术有限责任公司 Auth method, device, computer program, storage medium and electronic equipment
CN111883140A (en) * 2020-07-24 2020-11-03 中国平安人寿保险股份有限公司 Authentication method, device, equipment and medium based on knowledge graph and voiceprint recognition
CN111883140B (en) * 2020-07-24 2023-07-21 中国平安人寿保险股份有限公司 Authentication method, device, equipment and medium based on knowledge graph and voiceprint recognition
CN112751838A (en) * 2020-12-25 2021-05-04 中国人民解放军陆军装甲兵学院 Identity authentication method, device and system
CN113378134A (en) * 2021-06-08 2021-09-10 国科政信科技(北京)股份有限公司 Identity authentication method and device
CN113989998A (en) * 2021-11-05 2022-01-28 中国工商银行股份有限公司 Voice recognition payment method, apparatus, device, medium, and program product
CN114285614A (en) * 2021-12-16 2022-04-05 北京安捷金科信息技术有限公司 Identity authentication method, identity authentication system and readable storage medium

Also Published As

Publication number Publication date
HK1166214A1 (en) 2012-10-19
CN102457845B (en) 2016-04-13
CN105873050A (en) 2016-08-17

Similar Documents

Publication Publication Date Title
CN102457845B (en) Wireless traffic identity identifying method, equipment and system
CN105279416B (en) Personal identification method and its system based on multi-biological characteristic bonding apparatus fingerprint
CN105512535A (en) User authentication method and user authentication device
CN106487511A (en) Identity identifying method and device
CN104104664A (en) Method, server, client and system for verifying verification code
CN106296199A (en) Payment based on living things feature recognition and identity authorization system
CN104618315B (en) A kind of method, apparatus and system of verification information push and Information Authentication
CN102523213A (en) Server and terminal authenticating method and server and terminal
CN102222368A (en) Electronic ticket authentication system applying short-distance communication technology and detection method
CN104158664A (en) Identity authentication method and system
CN107809438A (en) A kind of network authentication method, system and its user agent device used
CN109121124A (en) A kind of client-based bluetooth mesh equipment networking process implementation method
CN106504745A (en) A kind of speech verification code system and its implementation method
CN102792724A (en) Protection of a communication channel between a security module and an nfc circuit
CN107113613A (en) Server, mobile terminal, real-name network authentication system and method
CN102792722A (en) Protection against rerouting in an NFC circuit communication channel
CN110599190B (en) Identity authentication method and device based on block chain
CN103679453A (en) Payment system and payment method based on biometric authentication
CN104202299A (en) System and method of identity authentication based on Bluetooth
CN110087241B (en) Service authorization method, device and system
CN107016759A (en) A kind of intelligent gate system and control method
CN104253818A (en) Server and terminal authentication method, server, terminal
CN107995200A (en) A kind of certificate issuance method, identity identifying method and system based on smart card
CN106357411A (en) Identity verification method and device
CN106535195A (en) Authentication method and device, and network connection method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1166214

Country of ref document: HK

C14 Grant of patent or utility model
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1166214

Country of ref document: HK

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20211011

Address after: Third floor, No. 665, Zhangjiang Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai

Patentee after: Shanghai Lingxi Interactive Entertainment Co.,Ltd.

Address before: Cayman Islands Grand Cayman capital building, a four storey No. 847 mailbox

Patentee before: ALIBABA GROUP HOLDING Ltd.