CN102984152A - Password authentication method based on online shopping - Google Patents
Password authentication method based on online shopping Download PDFInfo
- Publication number
- CN102984152A CN102984152A CN2012104900804A CN201210490080A CN102984152A CN 102984152 A CN102984152 A CN 102984152A CN 2012104900804 A CN2012104900804 A CN 2012104900804A CN 201210490080 A CN201210490080 A CN 201210490080A CN 102984152 A CN102984152 A CN 102984152A
- Authority
- CN
- China
- Prior art keywords
- audio frame
- file
- audio
- user
- cipher
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention provides a password authentication method based on online shopping and relates to the field of internet. The password authentication method based on the online shopping is used for solving the problem that inconvenience is brought to users at some occasions due to the fact that the users need to enter passwords through a keyboard or an analog keyboard. The password authentication method based on the online shopping includes that the users enter voice passwords through clients; the clients enable the voice passwords input by the users to be generated into voice password files and send the voice password files to an authentication server; the authentication server performs audio feature comparison on voice password files and audio files prerecorded by the users to obtain a first comparison result; the voice password files are identified into text files, and word comparison is performed on the text files and text files reserved by the users to obtain a second comparison result; and if the first comparison result is the same as the second comparison result, password authentication successes, otherwise password authentication fails. The brand-new password authentication method enables the users to enter the passwords conveniently and rapidly and complete authentication safely when the users are inconvenient to enter passwords by hand.
Description
Technical field
The present invention relates to internet arena, especially a kind of cipher authentication method of shopping Network Based.
Background technology
Ecommerce is in widely commerce and trade activity of all parts of the world, the net environment of opening in the internet, based on the browser/server application mode, both parties do not carry out various commercial activities with meeting, realize a kind of commercial operation pattern of consumer's shopping online.Owing to peddle commodity by network, be not subjected to the restriction in geographical position, and can control preferably operation cost, as it is also less etc. to need not entity StoreFront, personnel demand, is therefore attracting increasing user with lower price.
Along with the development of shopping at network, the user inputs the behaviors such as password login client or input password confirming payment has become the requisite link of shopping at network.Therefore, in order to adapt to user's practical operation demand, should give the user multiple different cipher authentication mode, make things convenient for the user in different actual scenes, to select easily the cipher authentication mode to finish the login client, confirm the operation such as payment.But the cipher authentication mode that provides at present all needs the user to pass through keyboard or Simulation of keyboard input password, and this has brought inconvenience with the occasion of hand input password to the user in some user's inconvenience.
Summary of the invention
The invention provides a kind of cipher authentication method of shopping Network Based, all need the user to pass through keyboard or Simulation of keyboard input password in order to the cipher authentication mode that provides at present to be provided, brought inconvenient problem in some occasion to the user.
The cipher authentication method of a kind of shopping Network Based of the present invention comprises the following steps: that the user inputs speech cipher by client; Client generates the speech cipher file with the speech cipher of user's input, and sends to certificate server; The audio file that certificate server is prerecorded described speech cipher file and user is done audio frequency characteristics and is compared, and draws the first comparison result; And certificate server is text with described speech cipher file identification, and does literal with the text that the user reserves and compare, and draws the second comparison result; If it is identical that described the first comparison result and the second comparison result are, then cipher authentication success, otherwise cipher authentication failure.
Wherein, the audio file that described certificate server is prerecorded described speech cipher file and user is done audio frequency characteristics and is compared, and specifically comprises: described speech cipher file is carried out block sampling; The sample of each segmentation is carried out catching after the Fourier transform energy of basic frequency and basic frequency; The speech characteristic vector that basic frequency and the basic frequency energy of each segmentation sample formed described speech cipher file; The audio file that the user is prerecorded carries out block sampling; The sample of each segmentation is carried out catching after the Fourier transform energy of basic frequency and basic frequency; Basic frequency and the basic frequency energy of each segmentation sample are formed the speech characteristic vector that described user prerecords audio file; The speech characteristic vector that speech characteristic vector and the user of described speech cipher file prerecords audio file is compared.
Wherein, the audio file that described certificate server is prerecorded described speech cipher file and user is done audio frequency characteristics and is compared, and specifically comprises: described speech cipher file is decomposed into audio frame sequence; Calculate respectively the energy value of each audio frame; Calculate the mean value of described each audio frame energy value; Obtain the number more than or equal to the audio frame of described mean value, number less than the audio frame of described mean value, the position of audio frame in described audio frame sequence that maximum energy value is corresponding, and the position of audio frame in described audio frame sequence corresponding to minimum energy value; The audio file that the user is prerecorded is decomposed into audio frame sequence; Calculate respectively the energy value of each audio frame; Calculate the mean value of described each audio frame energy value; Obtain the number more than or equal to the audio frame of described mean value, number less than the audio frame of described mean value, the position of audio frame in described audio frame sequence that maximum energy value is corresponding, and the position of audio frame in described audio frame sequence corresponding to minimum energy value; With described speech cipher file and user prerecord the audio frame average energy of audio file, more than or equal to the number of the audio frame of mean value, less than the position of audio frame in audio frame sequence corresponding to number, maximum energy value of the audio frame of mean value, and the position of audio frame in audio frame sequence corresponding to minimum energy value contrasts respectively.
Wherein, certificate server distributes the key of unique correspondence for each client; It is that the key of its distribution is to the speech cipher encryption generation speech cipher file of user's input that described client is used certificate server; And certificate server is received and is used corresponding secret key decryption behind the described speech cipher file.
Wherein, client sends described speech cipher file by wired or wireless mode to certificate server.
The cipher authentication method of shopping Network Based of the present invention makes the user can input easily the authentication of finishing of password and safety when inconvenience is inputted password with hand for the user provides a kind of brand-new cipher authentication mode.
Description of drawings
Fig. 1 is the method step flow chart of the embodiment of the invention one.
Embodiment
In order to adapt to user's practical operation demand, make things convenient for the user in different actual scenes, to select easily the cipher authentication mode to finish the login client, confirm the operation such as payment, the invention provides a kind of cipher authentication method of shopping Network Based, below describe by some embodiment.
The cipher authentication method of the shopping Network Based of embodiment one, this enforcement referring to shown in Figure 1, comprises following key step:
S1, user input speech cipher by client.
S2, client generate the speech cipher file with the speech cipher of user's input, and send to certificate server.
The audio file that S31, certificate server prerecord speech cipher file and user is done audio frequency characteristics and is compared, and draws the first comparison result.Change step S4 over to.
S32, certificate server are text with the speech cipher file identification, and do literal with the text that the user reserves and compare, and draw the second comparison result.Change step S4 over to.
If it is identical that described the first comparison result of S4 and the second comparison result are, then change S51 over to, otherwise change S52 over to.
S51, cipher authentication success.
S52, cipher authentication failure.
Draw the first comparison result by the speech characteristic vector comparison in embodiment two, the present embodiment.
After the user logins client, read payment cipher by the speech voice input function of client, namely input speech cipher.
When the user registered, certificate server distributed the key of unique correspondence for this user's client.It is that the key of its distribution is to the speech cipher encryption generation speech cipher file of user's input that client is used certificate server.Afterwards, client sends to certificate server with the speech cipher file of described encryption by wired or wireless mode.
After certificate server is received the encrypted speech cryptogam that client sends, use first corresponding secret key decryption, the audio file that the speech cipher file after will deciphering again and user prerecord is done audio frequency characteristics and is compared, and draws the first comparison result.Concrete, certificate server carries out block sampling to described speech cipher file; The sample of each segmentation is carried out catching after the Fourier transform energy of basic frequency and basic frequency; The speech characteristic vector that basic frequency and the basic frequency energy of each segmentation sample formed described speech cipher file; In like manner, the audio file of the user being prerecorded carries out block sampling; The sample of each segmentation is carried out catching after the Fourier transform energy of basic frequency and basic frequency; Basic frequency and the basic frequency energy of each segmentation sample are formed the speech characteristic vector that described user prerecords audio file; The speech characteristic vector that speech characteristic vector and the user of described speech cipher file prerecords audio file is compared, draw the first comparison result.
Speech cipher file identification after certificate server will be deciphered is text, and does the literal comparison with the text (being the payment cipher text that the user sets in advance) that the user reserves, and draws the second comparison result.
If it is identical that described the first comparison result and the second comparison result are, the affirmation delivery operation is finished in then cipher authentication success; Otherwise the cipher authentication failure is paid unsuccessful.
Logical each audio frequency characteristics value is compared draws the first comparison result in embodiment three, the present embodiment.
The user reads login password by the speech voice input function of client, namely inputs speech cipher.
When the user registered, certificate server distributed the key of unique correspondence for this user's client.It is that the key of its distribution is to the speech cipher encryption generation speech cipher file of user's input that client is used certificate server.Afterwards, client sends to certificate server with the speech cipher file of described encryption by wired or wireless mode.
After certificate server is received the encrypted speech cryptogam that client sends, use first corresponding secret key decryption, the audio file that the speech cipher file after will deciphering again and user prerecord is done audio frequency characteristics and is compared, and draws the first comparison result.Concrete, the speech cipher file is decomposed into audio frame sequence; Calculate respectively the energy value of each audio frame; Calculate the mean value of described each audio frame energy value; Obtain the number more than or equal to the audio frame of described mean value, number less than the audio frame of described mean value, the position of audio frame in described audio frame sequence that maximum energy value is corresponding, and the position of audio frame in described audio frame sequence corresponding to minimum energy value; In like manner, the audio file of the user being prerecorded is decomposed into audio frame sequence; Calculate respectively the energy value of each audio frame; Calculate the mean value of described each audio frame energy value; Obtain the number more than or equal to the audio frame of described mean value, number less than the audio frame of described mean value, the position of audio frame in described audio frame sequence that maximum energy value is corresponding, and the position of audio frame in described audio frame sequence corresponding to minimum energy value; With described speech cipher file and user prerecord the audio frame average energy of audio file, more than or equal to the number of the audio frame of mean value, less than the position of audio frame in audio frame sequence corresponding to number, maximum energy value of the audio frame of mean value, and the position of audio frame in audio frame sequence corresponding to minimum energy value contrast respectively, draws the first comparison result.
Speech cipher file identification after certificate server will be deciphered is text, and does the literal comparison with the text (being the login password text that the user sets in advance) that the user reserves, and draws the second comparison result.
If it is identical that described the first comparison result and the second comparison result are, then cipher authentication success, and then finish register; Otherwise the cipher authentication failure is logined unsuccessful.
Here description of the invention and application all is illustrative and schematic, is not to be to want with scope restriction of the present invention in the above-described embodiments.Here the distortion of disclosed embodiment and change is fully possible, and for those those of ordinary skill in the art, the various parts of the replacement of embodiment and equivalence all are known.Those skilled in the art also are noted that, in the situation that does not break away from spirit of the present invention or substantive characteristics, the present invention can be with other form, structure, layout, ratio, and realize with other assembly, material and parts, and in the situation that does not break away from the scope of the invention and spirit, can carry out other distortion and change to disclosed embodiment here.
Claims (5)
1. the cipher authentication method of a shopping Network Based is characterized in that, comprises the following steps:
The user inputs speech cipher by client;
Client generates the speech cipher file with the speech cipher of user's input, and sends to certificate server;
The audio file that certificate server is prerecorded described speech cipher file and user is done audio frequency characteristics and is compared, and draws the first comparison result; And certificate server is text with described speech cipher file identification, and does literal with the text that the user reserves and compare, and draws the second comparison result;
If it is identical that described the first comparison result and the second comparison result are, then cipher authentication success, otherwise cipher authentication failure.
2. the cipher authentication method of shopping Network Based as claimed in claim 1 is characterized in that, the audio file that described certificate server is prerecorded described speech cipher file and user is done audio frequency characteristics and compared, and specifically comprises:
Described speech cipher file is carried out block sampling; The sample of each segmentation is carried out catching after the Fourier transform energy of basic frequency and basic frequency; The speech characteristic vector that basic frequency and the basic frequency energy of each segmentation sample formed described speech cipher file;
The audio file that the user is prerecorded carries out block sampling; The sample of each segmentation is carried out catching after the Fourier transform energy of basic frequency and basic frequency; Basic frequency and the basic frequency energy of each segmentation sample are formed the speech characteristic vector that described user prerecords audio file;
The speech characteristic vector that speech characteristic vector and the user of described speech cipher file prerecords audio file is compared.
3. the cipher authentication method of shopping Network Based as claimed in claim 1 is characterized in that, the audio file that described certificate server is prerecorded described speech cipher file and user is done audio frequency characteristics and compared, and specifically comprises:
Described speech cipher file is decomposed into audio frame sequence; Calculate respectively the energy value of each audio frame; Calculate the mean value of described each audio frame energy value; Obtain the number more than or equal to the audio frame of described mean value, number less than the audio frame of described mean value, the position of audio frame in described audio frame sequence that maximum energy value is corresponding, and the position of audio frame in described audio frame sequence corresponding to minimum energy value;
The audio file that the user is prerecorded is decomposed into audio frame sequence; Calculate respectively the energy value of each audio frame; Calculate the mean value of described each audio frame energy value; Obtain the number more than or equal to the audio frame of described mean value, number less than the audio frame of described mean value, the position of audio frame in described audio frame sequence that maximum energy value is corresponding, and the position of audio frame in described audio frame sequence corresponding to minimum energy value;
With described speech cipher file and user prerecord the audio frame average energy of audio file, more than or equal to the number of the audio frame of mean value, less than the position of audio frame in audio frame sequence corresponding to number, maximum energy value of the audio frame of mean value, and the position of audio frame in audio frame sequence corresponding to minimum energy value contrasts respectively.
4. the cipher authentication method of shopping Network Based as claimed in claim 1 is characterized in that, certificate server distributes the key of unique correspondence for each client; It is that the key of its distribution is to the speech cipher encryption generation speech cipher file of user's input that described client is used certificate server; And certificate server is received and is used corresponding secret key decryption behind the described speech cipher file.
5. the cipher authentication method of shopping Network Based as claimed in claim 1 is characterized in that, client sends described speech cipher file by wired or wireless mode to certificate server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012104900804A CN102984152A (en) | 2012-11-27 | 2012-11-27 | Password authentication method based on online shopping |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2012104900804A CN102984152A (en) | 2012-11-27 | 2012-11-27 | Password authentication method based on online shopping |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102984152A true CN102984152A (en) | 2013-03-20 |
Family
ID=47857896
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2012104900804A Pending CN102984152A (en) | 2012-11-27 | 2012-11-27 | Password authentication method based on online shopping |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102984152A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104751033A (en) * | 2015-03-03 | 2015-07-01 | 上海拍拍贷金融信息服务有限公司 | User behavior authentication method and device based on audio and video file |
CN104869497A (en) * | 2015-03-24 | 2015-08-26 | 广东欧珀移动通信有限公司 | Wireless network setting method and apparatus of WIFI sound box |
CN108389098A (en) * | 2017-02-03 | 2018-08-10 | 北京京东尚科信息技术有限公司 | Voice purchase method and system |
CN110232917A (en) * | 2019-05-21 | 2019-09-13 | 平安科技(深圳)有限公司 | Voice login method, device, equipment and storage medium based on artificial intelligence |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020104027A1 (en) * | 2001-01-31 | 2002-08-01 | Valene Skerpac | N-dimensional biometric security system |
US20030065918A1 (en) * | 2001-04-06 | 2003-04-03 | Willey William Daniel | Device authentication in a PKI |
CN101072105A (en) * | 2007-05-21 | 2007-11-14 | 腾讯科技(深圳)有限公司 | Network identity authenticating method and system |
CN101098232A (en) * | 2007-07-12 | 2008-01-02 | 兰州大学 | Dynamic password and multiple biological characteristics combined identification authenticating method |
CN102457845A (en) * | 2010-10-14 | 2012-05-16 | 阿里巴巴集团控股有限公司 | Method, equipment and system for authenticating identity by wireless service |
-
2012
- 2012-11-27 CN CN2012104900804A patent/CN102984152A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020104027A1 (en) * | 2001-01-31 | 2002-08-01 | Valene Skerpac | N-dimensional biometric security system |
US20030065918A1 (en) * | 2001-04-06 | 2003-04-03 | Willey William Daniel | Device authentication in a PKI |
CN101072105A (en) * | 2007-05-21 | 2007-11-14 | 腾讯科技(深圳)有限公司 | Network identity authenticating method and system |
CN101098232A (en) * | 2007-07-12 | 2008-01-02 | 兰州大学 | Dynamic password and multiple biological characteristics combined identification authenticating method |
CN102457845A (en) * | 2010-10-14 | 2012-05-16 | 阿里巴巴集团控股有限公司 | Method, equipment and system for authenticating identity by wireless service |
Non-Patent Citations (1)
Title |
---|
朱学芳: "计算机语音信号处理与语音识别系统", 《南京邮电学院学报》, vol. 18, no. 56, 31 December 1998 (1998-12-31) * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104751033A (en) * | 2015-03-03 | 2015-07-01 | 上海拍拍贷金融信息服务有限公司 | User behavior authentication method and device based on audio and video file |
CN104751033B (en) * | 2015-03-03 | 2017-11-24 | 上海拍拍贷金融信息服务有限公司 | A kind of user behavior authentication method and device based on audio-video document |
CN104869497A (en) * | 2015-03-24 | 2015-08-26 | 广东欧珀移动通信有限公司 | Wireless network setting method and apparatus of WIFI sound box |
CN104869497B (en) * | 2015-03-24 | 2018-12-11 | 广东欧珀移动通信有限公司 | A kind of the wireless network setting method and device of WIFI speaker |
CN108389098A (en) * | 2017-02-03 | 2018-08-10 | 北京京东尚科信息技术有限公司 | Voice purchase method and system |
CN108389098B (en) * | 2017-02-03 | 2021-02-26 | 北京京东尚科信息技术有限公司 | Voice shopping method and system |
CN110232917A (en) * | 2019-05-21 | 2019-09-13 | 平安科技(深圳)有限公司 | Voice login method, device, equipment and storage medium based on artificial intelligence |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11900368B2 (en) | Method and system for zero-knowledge and identity based key management for decentralized applications | |
CN108564353B (en) | Payment system and method based on block chain | |
CA2945703C (en) | Systems, apparatus and methods for improved authentication | |
US8868902B1 (en) | Characteristically shaped colorgram tokens in mobile transactions | |
JP4971572B2 (en) | Facilitating transactions in electronic commerce | |
US8478990B2 (en) | Mobile transaction methods and devices with three-dimensional colorgram tokens | |
US20140279558A1 (en) | Two-Way, Token-Based Validation for NFC-Enabled Transactions | |
CN105897675A (en) | Video service providing method, access authentication method, server and system | |
US9361436B2 (en) | Multiple profile authentication | |
CN107145791A (en) | A kind of K means clustering methods and system with secret protection | |
CN105631721A (en) | Method and system for issuing electronic invoice based on electronic commerce cloud platform | |
CN106327723B (en) | A kind of mPOS transaction systems based on intelligent platform | |
Acharya et al. | Two factor authentication using smartphone generated one time password | |
TWI679556B (en) | Transaction method, device and system for virtual reality environment | |
Saranya et al. | Efficient mobile security for E health care application in cloud for secure payment using key distribution | |
CN102984152A (en) | Password authentication method based on online shopping | |
TW201636918A (en) | Digital transaction method and device | |
Narwal | Security analysis and verification of authenticated mobile payment protocols | |
TWI786039B (en) | Offline payment method, terminal equipment, backstage payment device and offline payment system | |
US20170344992A1 (en) | Payment verification method, apparatus and system | |
CN106301776A (en) | Many authorization center outsourcing attribute base encryption method of a kind of keyword search and system | |
Sung et al. | Mobile Payment Based on Transaction Certificate Using Cloud Self‐Proxy Server | |
CN105119933A (en) | Processing method of online transaction with multiple mobile terminals | |
CN107248914A (en) | Novel symmetrical encryption system and encryption method in a kind of iOS device | |
CN115860741A (en) | Block chain data encryption verification method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20130320 |