CN102984152A - Password authentication method based on online shopping - Google Patents

Password authentication method based on online shopping Download PDF

Info

Publication number
CN102984152A
CN102984152A CN2012104900804A CN201210490080A CN102984152A CN 102984152 A CN102984152 A CN 102984152A CN 2012104900804 A CN2012104900804 A CN 2012104900804A CN 201210490080 A CN201210490080 A CN 201210490080A CN 102984152 A CN102984152 A CN 102984152A
Authority
CN
China
Prior art keywords
audio frame
file
audio
user
cipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012104900804A
Other languages
Chinese (zh)
Inventor
宗竞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU LEMAIDAO NETWORK TECHNOLOGY Co Ltd
Original Assignee
JIANGSU LEMAIDAO NETWORK TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by JIANGSU LEMAIDAO NETWORK TECHNOLOGY Co Ltd filed Critical JIANGSU LEMAIDAO NETWORK TECHNOLOGY Co Ltd
Priority to CN2012104900804A priority Critical patent/CN102984152A/en
Publication of CN102984152A publication Critical patent/CN102984152A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a password authentication method based on online shopping and relates to the field of internet. The password authentication method based on the online shopping is used for solving the problem that inconvenience is brought to users at some occasions due to the fact that the users need to enter passwords through a keyboard or an analog keyboard. The password authentication method based on the online shopping includes that the users enter voice passwords through clients; the clients enable the voice passwords input by the users to be generated into voice password files and send the voice password files to an authentication server; the authentication server performs audio feature comparison on voice password files and audio files prerecorded by the users to obtain a first comparison result; the voice password files are identified into text files, and word comparison is performed on the text files and text files reserved by the users to obtain a second comparison result; and if the first comparison result is the same as the second comparison result, password authentication successes, otherwise password authentication fails. The brand-new password authentication method enables the users to enter the passwords conveniently and rapidly and complete authentication safely when the users are inconvenient to enter passwords by hand.

Description

A kind of cipher authentication method of shopping Network Based
Technical field
The present invention relates to internet arena, especially a kind of cipher authentication method of shopping Network Based.
Background technology
Ecommerce is in widely commerce and trade activity of all parts of the world, the net environment of opening in the internet, based on the browser/server application mode, both parties do not carry out various commercial activities with meeting, realize a kind of commercial operation pattern of consumer's shopping online.Owing to peddle commodity by network, be not subjected to the restriction in geographical position, and can control preferably operation cost, as it is also less etc. to need not entity StoreFront, personnel demand, is therefore attracting increasing user with lower price.
Along with the development of shopping at network, the user inputs the behaviors such as password login client or input password confirming payment has become the requisite link of shopping at network.Therefore, in order to adapt to user's practical operation demand, should give the user multiple different cipher authentication mode, make things convenient for the user in different actual scenes, to select easily the cipher authentication mode to finish the login client, confirm the operation such as payment.But the cipher authentication mode that provides at present all needs the user to pass through keyboard or Simulation of keyboard input password, and this has brought inconvenience with the occasion of hand input password to the user in some user's inconvenience.
Summary of the invention
The invention provides a kind of cipher authentication method of shopping Network Based, all need the user to pass through keyboard or Simulation of keyboard input password in order to the cipher authentication mode that provides at present to be provided, brought inconvenient problem in some occasion to the user.
The cipher authentication method of a kind of shopping Network Based of the present invention comprises the following steps: that the user inputs speech cipher by client; Client generates the speech cipher file with the speech cipher of user's input, and sends to certificate server; The audio file that certificate server is prerecorded described speech cipher file and user is done audio frequency characteristics and is compared, and draws the first comparison result; And certificate server is text with described speech cipher file identification, and does literal with the text that the user reserves and compare, and draws the second comparison result; If it is identical that described the first comparison result and the second comparison result are, then cipher authentication success, otherwise cipher authentication failure.
Wherein, the audio file that described certificate server is prerecorded described speech cipher file and user is done audio frequency characteristics and is compared, and specifically comprises: described speech cipher file is carried out block sampling; The sample of each segmentation is carried out catching after the Fourier transform energy of basic frequency and basic frequency; The speech characteristic vector that basic frequency and the basic frequency energy of each segmentation sample formed described speech cipher file; The audio file that the user is prerecorded carries out block sampling; The sample of each segmentation is carried out catching after the Fourier transform energy of basic frequency and basic frequency; Basic frequency and the basic frequency energy of each segmentation sample are formed the speech characteristic vector that described user prerecords audio file; The speech characteristic vector that speech characteristic vector and the user of described speech cipher file prerecords audio file is compared.
Wherein, the audio file that described certificate server is prerecorded described speech cipher file and user is done audio frequency characteristics and is compared, and specifically comprises: described speech cipher file is decomposed into audio frame sequence; Calculate respectively the energy value of each audio frame; Calculate the mean value of described each audio frame energy value; Obtain the number more than or equal to the audio frame of described mean value, number less than the audio frame of described mean value, the position of audio frame in described audio frame sequence that maximum energy value is corresponding, and the position of audio frame in described audio frame sequence corresponding to minimum energy value; The audio file that the user is prerecorded is decomposed into audio frame sequence; Calculate respectively the energy value of each audio frame; Calculate the mean value of described each audio frame energy value; Obtain the number more than or equal to the audio frame of described mean value, number less than the audio frame of described mean value, the position of audio frame in described audio frame sequence that maximum energy value is corresponding, and the position of audio frame in described audio frame sequence corresponding to minimum energy value; With described speech cipher file and user prerecord the audio frame average energy of audio file, more than or equal to the number of the audio frame of mean value, less than the position of audio frame in audio frame sequence corresponding to number, maximum energy value of the audio frame of mean value, and the position of audio frame in audio frame sequence corresponding to minimum energy value contrasts respectively.
Wherein, certificate server distributes the key of unique correspondence for each client; It is that the key of its distribution is to the speech cipher encryption generation speech cipher file of user's input that described client is used certificate server; And certificate server is received and is used corresponding secret key decryption behind the described speech cipher file.
Wherein, client sends described speech cipher file by wired or wireless mode to certificate server.
The cipher authentication method of shopping Network Based of the present invention makes the user can input easily the authentication of finishing of password and safety when inconvenience is inputted password with hand for the user provides a kind of brand-new cipher authentication mode.
Description of drawings
Fig. 1 is the method step flow chart of the embodiment of the invention one.
Embodiment
In order to adapt to user's practical operation demand, make things convenient for the user in different actual scenes, to select easily the cipher authentication mode to finish the login client, confirm the operation such as payment, the invention provides a kind of cipher authentication method of shopping Network Based, below describe by some embodiment.
The cipher authentication method of the shopping Network Based of embodiment one, this enforcement referring to shown in Figure 1, comprises following key step:
S1, user input speech cipher by client.
S2, client generate the speech cipher file with the speech cipher of user's input, and send to certificate server.
The audio file that S31, certificate server prerecord speech cipher file and user is done audio frequency characteristics and is compared, and draws the first comparison result.Change step S4 over to.
S32, certificate server are text with the speech cipher file identification, and do literal with the text that the user reserves and compare, and draw the second comparison result.Change step S4 over to.
If it is identical that described the first comparison result of S4 and the second comparison result are, then change S51 over to, otherwise change S52 over to.
S51, cipher authentication success.
S52, cipher authentication failure.
Draw the first comparison result by the speech characteristic vector comparison in embodiment two, the present embodiment.
After the user logins client, read payment cipher by the speech voice input function of client, namely input speech cipher.
When the user registered, certificate server distributed the key of unique correspondence for this user's client.It is that the key of its distribution is to the speech cipher encryption generation speech cipher file of user's input that client is used certificate server.Afterwards, client sends to certificate server with the speech cipher file of described encryption by wired or wireless mode.
After certificate server is received the encrypted speech cryptogam that client sends, use first corresponding secret key decryption, the audio file that the speech cipher file after will deciphering again and user prerecord is done audio frequency characteristics and is compared, and draws the first comparison result.Concrete, certificate server carries out block sampling to described speech cipher file; The sample of each segmentation is carried out catching after the Fourier transform energy of basic frequency and basic frequency; The speech characteristic vector that basic frequency and the basic frequency energy of each segmentation sample formed described speech cipher file; In like manner, the audio file of the user being prerecorded carries out block sampling; The sample of each segmentation is carried out catching after the Fourier transform energy of basic frequency and basic frequency; Basic frequency and the basic frequency energy of each segmentation sample are formed the speech characteristic vector that described user prerecords audio file; The speech characteristic vector that speech characteristic vector and the user of described speech cipher file prerecords audio file is compared, draw the first comparison result.
Speech cipher file identification after certificate server will be deciphered is text, and does the literal comparison with the text (being the payment cipher text that the user sets in advance) that the user reserves, and draws the second comparison result.
If it is identical that described the first comparison result and the second comparison result are, the affirmation delivery operation is finished in then cipher authentication success; Otherwise the cipher authentication failure is paid unsuccessful.
Logical each audio frequency characteristics value is compared draws the first comparison result in embodiment three, the present embodiment.
The user reads login password by the speech voice input function of client, namely inputs speech cipher.
When the user registered, certificate server distributed the key of unique correspondence for this user's client.It is that the key of its distribution is to the speech cipher encryption generation speech cipher file of user's input that client is used certificate server.Afterwards, client sends to certificate server with the speech cipher file of described encryption by wired or wireless mode.
After certificate server is received the encrypted speech cryptogam that client sends, use first corresponding secret key decryption, the audio file that the speech cipher file after will deciphering again and user prerecord is done audio frequency characteristics and is compared, and draws the first comparison result.Concrete, the speech cipher file is decomposed into audio frame sequence; Calculate respectively the energy value of each audio frame; Calculate the mean value of described each audio frame energy value; Obtain the number more than or equal to the audio frame of described mean value, number less than the audio frame of described mean value, the position of audio frame in described audio frame sequence that maximum energy value is corresponding, and the position of audio frame in described audio frame sequence corresponding to minimum energy value; In like manner, the audio file of the user being prerecorded is decomposed into audio frame sequence; Calculate respectively the energy value of each audio frame; Calculate the mean value of described each audio frame energy value; Obtain the number more than or equal to the audio frame of described mean value, number less than the audio frame of described mean value, the position of audio frame in described audio frame sequence that maximum energy value is corresponding, and the position of audio frame in described audio frame sequence corresponding to minimum energy value; With described speech cipher file and user prerecord the audio frame average energy of audio file, more than or equal to the number of the audio frame of mean value, less than the position of audio frame in audio frame sequence corresponding to number, maximum energy value of the audio frame of mean value, and the position of audio frame in audio frame sequence corresponding to minimum energy value contrast respectively, draws the first comparison result.
Speech cipher file identification after certificate server will be deciphered is text, and does the literal comparison with the text (being the login password text that the user sets in advance) that the user reserves, and draws the second comparison result.
If it is identical that described the first comparison result and the second comparison result are, then cipher authentication success, and then finish register; Otherwise the cipher authentication failure is logined unsuccessful.
Here description of the invention and application all is illustrative and schematic, is not to be to want with scope restriction of the present invention in the above-described embodiments.Here the distortion of disclosed embodiment and change is fully possible, and for those those of ordinary skill in the art, the various parts of the replacement of embodiment and equivalence all are known.Those skilled in the art also are noted that, in the situation that does not break away from spirit of the present invention or substantive characteristics, the present invention can be with other form, structure, layout, ratio, and realize with other assembly, material and parts, and in the situation that does not break away from the scope of the invention and spirit, can carry out other distortion and change to disclosed embodiment here.

Claims (5)

1. the cipher authentication method of a shopping Network Based is characterized in that, comprises the following steps:
The user inputs speech cipher by client;
Client generates the speech cipher file with the speech cipher of user's input, and sends to certificate server;
The audio file that certificate server is prerecorded described speech cipher file and user is done audio frequency characteristics and is compared, and draws the first comparison result; And certificate server is text with described speech cipher file identification, and does literal with the text that the user reserves and compare, and draws the second comparison result;
If it is identical that described the first comparison result and the second comparison result are, then cipher authentication success, otherwise cipher authentication failure.
2. the cipher authentication method of shopping Network Based as claimed in claim 1 is characterized in that, the audio file that described certificate server is prerecorded described speech cipher file and user is done audio frequency characteristics and compared, and specifically comprises:
Described speech cipher file is carried out block sampling; The sample of each segmentation is carried out catching after the Fourier transform energy of basic frequency and basic frequency; The speech characteristic vector that basic frequency and the basic frequency energy of each segmentation sample formed described speech cipher file;
The audio file that the user is prerecorded carries out block sampling; The sample of each segmentation is carried out catching after the Fourier transform energy of basic frequency and basic frequency; Basic frequency and the basic frequency energy of each segmentation sample are formed the speech characteristic vector that described user prerecords audio file;
The speech characteristic vector that speech characteristic vector and the user of described speech cipher file prerecords audio file is compared.
3. the cipher authentication method of shopping Network Based as claimed in claim 1 is characterized in that, the audio file that described certificate server is prerecorded described speech cipher file and user is done audio frequency characteristics and compared, and specifically comprises:
Described speech cipher file is decomposed into audio frame sequence; Calculate respectively the energy value of each audio frame; Calculate the mean value of described each audio frame energy value; Obtain the number more than or equal to the audio frame of described mean value, number less than the audio frame of described mean value, the position of audio frame in described audio frame sequence that maximum energy value is corresponding, and the position of audio frame in described audio frame sequence corresponding to minimum energy value;
The audio file that the user is prerecorded is decomposed into audio frame sequence; Calculate respectively the energy value of each audio frame; Calculate the mean value of described each audio frame energy value; Obtain the number more than or equal to the audio frame of described mean value, number less than the audio frame of described mean value, the position of audio frame in described audio frame sequence that maximum energy value is corresponding, and the position of audio frame in described audio frame sequence corresponding to minimum energy value;
With described speech cipher file and user prerecord the audio frame average energy of audio file, more than or equal to the number of the audio frame of mean value, less than the position of audio frame in audio frame sequence corresponding to number, maximum energy value of the audio frame of mean value, and the position of audio frame in audio frame sequence corresponding to minimum energy value contrasts respectively.
4. the cipher authentication method of shopping Network Based as claimed in claim 1 is characterized in that, certificate server distributes the key of unique correspondence for each client; It is that the key of its distribution is to the speech cipher encryption generation speech cipher file of user's input that described client is used certificate server; And certificate server is received and is used corresponding secret key decryption behind the described speech cipher file.
5. the cipher authentication method of shopping Network Based as claimed in claim 1 is characterized in that, client sends described speech cipher file by wired or wireless mode to certificate server.
CN2012104900804A 2012-11-27 2012-11-27 Password authentication method based on online shopping Pending CN102984152A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012104900804A CN102984152A (en) 2012-11-27 2012-11-27 Password authentication method based on online shopping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012104900804A CN102984152A (en) 2012-11-27 2012-11-27 Password authentication method based on online shopping

Publications (1)

Publication Number Publication Date
CN102984152A true CN102984152A (en) 2013-03-20

Family

ID=47857896

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012104900804A Pending CN102984152A (en) 2012-11-27 2012-11-27 Password authentication method based on online shopping

Country Status (1)

Country Link
CN (1) CN102984152A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751033A (en) * 2015-03-03 2015-07-01 上海拍拍贷金融信息服务有限公司 User behavior authentication method and device based on audio and video file
CN104869497A (en) * 2015-03-24 2015-08-26 广东欧珀移动通信有限公司 Wireless network setting method and apparatus of WIFI sound box
CN108389098A (en) * 2017-02-03 2018-08-10 北京京东尚科信息技术有限公司 Voice purchase method and system
CN110232917A (en) * 2019-05-21 2019-09-13 平安科技(深圳)有限公司 Voice login method, device, equipment and storage medium based on artificial intelligence

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020104027A1 (en) * 2001-01-31 2002-08-01 Valene Skerpac N-dimensional biometric security system
US20030065918A1 (en) * 2001-04-06 2003-04-03 Willey William Daniel Device authentication in a PKI
CN101072105A (en) * 2007-05-21 2007-11-14 腾讯科技(深圳)有限公司 Network identity authenticating method and system
CN101098232A (en) * 2007-07-12 2008-01-02 兰州大学 Dynamic password and multiple biological characteristics combined identification authenticating method
CN102457845A (en) * 2010-10-14 2012-05-16 阿里巴巴集团控股有限公司 Method, equipment and system for authenticating identity by wireless service

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020104027A1 (en) * 2001-01-31 2002-08-01 Valene Skerpac N-dimensional biometric security system
US20030065918A1 (en) * 2001-04-06 2003-04-03 Willey William Daniel Device authentication in a PKI
CN101072105A (en) * 2007-05-21 2007-11-14 腾讯科技(深圳)有限公司 Network identity authenticating method and system
CN101098232A (en) * 2007-07-12 2008-01-02 兰州大学 Dynamic password and multiple biological characteristics combined identification authenticating method
CN102457845A (en) * 2010-10-14 2012-05-16 阿里巴巴集团控股有限公司 Method, equipment and system for authenticating identity by wireless service

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
朱学芳: "计算机语音信号处理与语音识别系统", 《南京邮电学院学报》, vol. 18, no. 56, 31 December 1998 (1998-12-31) *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104751033A (en) * 2015-03-03 2015-07-01 上海拍拍贷金融信息服务有限公司 User behavior authentication method and device based on audio and video file
CN104751033B (en) * 2015-03-03 2017-11-24 上海拍拍贷金融信息服务有限公司 A kind of user behavior authentication method and device based on audio-video document
CN104869497A (en) * 2015-03-24 2015-08-26 广东欧珀移动通信有限公司 Wireless network setting method and apparatus of WIFI sound box
CN104869497B (en) * 2015-03-24 2018-12-11 广东欧珀移动通信有限公司 A kind of the wireless network setting method and device of WIFI speaker
CN108389098A (en) * 2017-02-03 2018-08-10 北京京东尚科信息技术有限公司 Voice purchase method and system
CN108389098B (en) * 2017-02-03 2021-02-26 北京京东尚科信息技术有限公司 Voice shopping method and system
CN110232917A (en) * 2019-05-21 2019-09-13 平安科技(深圳)有限公司 Voice login method, device, equipment and storage medium based on artificial intelligence

Similar Documents

Publication Publication Date Title
US11900368B2 (en) Method and system for zero-knowledge and identity based key management for decentralized applications
CN108564353B (en) Payment system and method based on block chain
CA2945703C (en) Systems, apparatus and methods for improved authentication
US8868902B1 (en) Characteristically shaped colorgram tokens in mobile transactions
JP4971572B2 (en) Facilitating transactions in electronic commerce
US8478990B2 (en) Mobile transaction methods and devices with three-dimensional colorgram tokens
US20140279558A1 (en) Two-Way, Token-Based Validation for NFC-Enabled Transactions
CN105897675A (en) Video service providing method, access authentication method, server and system
US9361436B2 (en) Multiple profile authentication
CN107145791A (en) A kind of K means clustering methods and system with secret protection
CN105631721A (en) Method and system for issuing electronic invoice based on electronic commerce cloud platform
CN106327723B (en) A kind of mPOS transaction systems based on intelligent platform
Acharya et al. Two factor authentication using smartphone generated one time password
TWI679556B (en) Transaction method, device and system for virtual reality environment
Saranya et al. Efficient mobile security for E health care application in cloud for secure payment using key distribution
CN102984152A (en) Password authentication method based on online shopping
TW201636918A (en) Digital transaction method and device
Narwal Security analysis and verification of authenticated mobile payment protocols
TWI786039B (en) Offline payment method, terminal equipment, backstage payment device and offline payment system
US20170344992A1 (en) Payment verification method, apparatus and system
CN106301776A (en) Many authorization center outsourcing attribute base encryption method of a kind of keyword search and system
Sung et al. Mobile Payment Based on Transaction Certificate Using Cloud Self‐Proxy Server
CN105119933A (en) Processing method of online transaction with multiple mobile terminals
CN107248914A (en) Novel symmetrical encryption system and encryption method in a kind of iOS device
CN115860741A (en) Block chain data encryption verification method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20130320