CN106504745A - A kind of speech verification code system and its implementation method - Google Patents

A kind of speech verification code system and its implementation method Download PDF

Info

Publication number
CN106504745A
CN106504745A CN201610994294.3A CN201610994294A CN106504745A CN 106504745 A CN106504745 A CN 106504745A CN 201610994294 A CN201610994294 A CN 201610994294A CN 106504745 A CN106504745 A CN 106504745A
Authority
CN
China
Prior art keywords
identifying code
speech
code
user
server end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610994294.3A
Other languages
Chinese (zh)
Inventor
麦永恒
林国永
章军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGZHOU CITY IFLY ZUNHONG INFORMATION TECHNOLOGY Co Ltd
Original Assignee
GUANGZHOU CITY IFLY ZUNHONG INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGZHOU CITY IFLY ZUNHONG INFORMATION TECHNOLOGY Co Ltd filed Critical GUANGZHOU CITY IFLY ZUNHONG INFORMATION TECHNOLOGY Co Ltd
Priority to CN201610994294.3A priority Critical patent/CN106504745A/en
Publication of CN106504745A publication Critical patent/CN106504745A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L13/00Speech synthesis; Text to speech systems
    • G10L13/08Text analysis or generation of parameters for speech synthesis out of text, e.g. grapheme to phoneme translation, prosody generation or stress or intonation determination
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/22Interactive procedures; Man-machine interfaces
    • G10L17/24Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention provides a kind of speech verification code system and its implementation method, in the form of speech identifying code carries out authentication verification.The apparent concrete business tine that reminds operated by user of speech identifying code energy, good supplement has been carried out to the verification mode of short message verification code, in addition the authentication mode of short message verification code+speech identifying code makes authentication procedures safer, light, efficient, so as to reach the optimized effect of Consumer's Experience.Speech identifying code mainly has the advantage that:(1)Safety:It is avoided that note is intercepted and captured and caused safety problem by Malware using speech identifying code;(2)High efficiency:It is sent to rate height and is difficult to be intercepted by mobile phone;(3)Alternative:When short message verification code can not be sent in time, user can pass through the faster finishing service of speech identifying code.

Description

A kind of speech verification code system and its implementation method
Technical field
The present invention relates to communication technical field, more particularly, to a kind of speech verification code system and its implementation method.
Background technology
Overwhelming majority catenet platform, bank and Third-party payment platform, have all extensively applied short-message verification at present Code verification mode, and be applied to user's registration, password give for change, log in protection, authentication, random cipher, without card prop up Pay, the application scenarios such as trade confirmation.Short message verification code facilitates easy-to-use, broad covered area because of which, has become instantly topmost testing Card means.Short message verification code as a most important safety verification link during network payment, substituted bank's Herba Carlinae biebersteinii into For last safety verification means.
But note is used as a kind of build-in attribute of communication mode, determines that its class of safety protection is not high, be vulnerable to wood Horse interception, phishing, telecommunication fraud, channel eavesdropping etc. are attacked.The short message verification code of current main flow is extensively received because of its safety problem Denounce, under the overall situation that the new hoaxes such as current mobile phone wooden horse row, phishing, telephone fraud emerge in an endless stream, note is tested Card code shows in plain text because of which, it is easy to be stolen, it is impossible to meet the scene higher to security requirement.
Content of the invention
The present invention is for overcoming at least one defect described in above-mentioned prior art, there is provided a kind of speech verification code system and its Implementation method, generates random speech identifying code by speech synthesis technique, and by voice call by its incoming call subscriber phone is User provides a kind of safer, more efficient verification mode.
For solving above-mentioned technical problem, technical scheme is as follows:
A kind of speech verification code system, the system include that server end and client, the server end are used for identifying code Generate, send, and can receive and verified after the identifying code of client, server end includes:
(1)Identifying code generation module:Identifying code generation module can respond the request from client, generate identifying code;
(2)Identifying code encrypting module:Identifying code encrypting module be used for identifying code that identifying code generation module is generated carry out plus Close process;Identifying code is mainly used in safety verification, is to ensure that identifying code is not stolen in transmitting procedure, and system design is special Identifying code encrypting module.
(3)Identifying code sending module:Identifying code sending module is used for according to the difference of client request approach by difference Mode respond user, identifying code is sent to subscription client, and is shown by subscription client;
(4)Cloud database:Cloud database includes system settings data storehouse, User Information Database, user's voice print database; System database is stored in high in the clouds, it is ensured that the safety of data, it is to avoid the risk that data are replaced and distort.
(5)Intelligent sound cloud:Intelligent sound cloud is the intellectual analysis system for intelligent sound field provided by third party System, its provide interface capability and call for other systems;
The client includes:
(a)Identifying code request module:Identifying code request module can initiate speech identifying code request to server end;
(b)Identifying code receiver module:Identifying code receiver module is used for the speech identifying code sent by the reception server end;In client Hold to server end and initiate after identifying code request, server end can generate speech identifying code audio files simultaneously according to current setting Send back client;
(c)Identifying code deciphering module:Identifying code deciphering module is used for being decrypted the speech identifying code for receiving.Based on safety Consideration, the speech identifying code generated by the system are through encryption, test for making which regenerate the discernible voice of user Card code sound-content, needs to be decrypted, and identifying code deciphering module can complete this task.
In a kind of preferred scheme, the intelligent sound cloud includes that speech transcription cloud, phonetic synthesis cloud, speech transcription are used In by speech transcription be word, phonetic synthesis cloud be used for voice is synthesized.Functions independently or with collaboration can be carried out Language data process, forms analysis result.
In a kind of preferred scheme, the approach for initiating identifying code request in client is included but is not limited to In the following manner:The Internet, communication network.
A kind of implementation method of speech verification code system, the method comprising the steps of:
S1:User initiates checking request
User can initiate the request of speech verification by client to server end, and user can initiate checking by various ways please Ask, including by webpage, voice call etc., server end is received to give after the checking that user sends enters to ask and responded;
S2:Server end generates speech identifying code
After checking request is received, server end will carry out the generation of speech identifying code;
S3:Speech identifying code sends
The speech identifying code of generation is sent to user side by communication network, user is listened to by way of voice call, with When, also support the transmission that speech identifying code is carried out by immediate communication tool, mail;
S4:Fill in identifying code
After user has listened to speech identifying code, heard speech verification digital content is submitted to server end, user is in front end page The speech verification digital content that hears is input in face, and server end is committed to by client verified;
S5:Server end is verified
The checking digital content that user is submitted to by server end generates information with identifying code and compares, and sends and verify into if identical Work(is pointed out, and if failure sends checking request again, repeats whole flow process.
In a kind of preferred scheme, in step S2, the concrete generating mode of speech identifying code is as follows:
Consider that consumers' acceptable degree, system support 4 or 6 identifying codes, when each user sends access request, system is random English alphabet sum combinatorics on words is chosen, system supports two ways in the generation of identifying code, is voice joint and language respectively Sound synthesizes.
Compared with prior art, the beneficial effect of technical solution of the present invention is:Of the invention then be directed to existing short message verification code Various problems, there is provided a kind of speech verification code system, carry out authentication verification in the form of speech identifying code.Speech verification The apparent concrete business tine that reminds operated by user of code energy, has carried out good benefit to the verification mode of short message verification code Fill, the authentication mode of short message verification code+speech identifying code makes authentication procedures safer, light, efficient in addition, so as to reach Arrive the optimized effect of Consumer's Experience.Speech identifying code mainly has the advantage that:(1)Safety:Can be kept away using speech identifying code Exempt from note to be intercepted and captured and caused safety problem by Malware;(2)High efficiency:It is sent to rate height and is difficult to be intercepted by mobile phone;(3)Can Selectivity:When short message verification code can not be sent in time, user can pass through the faster finishing service of speech identifying code.
Description of the drawings
Fig. 1 is the schematic diagram of speech verification code system of the present invention.
Implementation method flow charts of the Fig. 2 for sound verification code system.
Specific embodiment
With reference to the accompanying drawings and examples technical scheme is described further.
Embodiment 1
As shown in figure 1, a kind of speech verification code system, the system includes that server end and client, the server end are used Generation, transmission in identifying code, and can receive and verified after the identifying code of client, server end includes:
(1)Identifying code generation module:Identifying code generation module can respond the request from client, generate identifying code;
(2)Identifying code encrypting module:Identifying code encrypting module be used for identifying code that identifying code generation module is generated carry out plus Close process;Identifying code is mainly used in safety verification, is to ensure that identifying code is not stolen in transmitting procedure, and system design is special Identifying code encrypting module.
(3)Identifying code sending module:Identifying code sending module is used for according to the difference of client request approach by difference Mode respond user, identifying code is sent to subscription client, and is shown by subscription client;
(4)Cloud database:Cloud database includes system settings data storehouse, User Information Database, user's voice print database; System database is stored in high in the clouds, it is ensured that the safety of data, it is to avoid the risk that data are replaced and distort.
(5)Intelligent sound cloud:Intelligent sound cloud is the intellectual analysis system for intelligent sound field provided by third party System, its provide interface capability and call for other systems;
The client includes:
(a)Identifying code request module:Identifying code request module can initiate speech identifying code request to server end;
(b)Identifying code receiver module:Identifying code receiver module is used for the speech identifying code sent by the reception server end;In client Hold to server end and initiate after identifying code request, server end can generate speech identifying code audio files simultaneously according to current setting Send back client;
(c)Identifying code deciphering module:Identifying code deciphering module is used for being decrypted the speech identifying code for receiving.Based on safety Consideration, the speech identifying code generated by the system are through encryption, test for making which regenerate the discernible voice of user Card code sound-content, needs to be decrypted, and identifying code deciphering module can complete this task.
In specific implementation process, the intelligent sound cloud includes that speech transcription cloud, phonetic synthesis cloud, speech transcription are used for By speech transcription be word, phonetic synthesis cloud be used for voice is synthesized.Functions independently or with collaboration can carry out language Sound data processing, forms analysis result.
In specific implementation process, client initiate the approach of identifying code request including but not limited to Under type:The Internet, communication network.
As shown in Fig. 2 a kind of implementation method of speech verification code system, the method comprising the steps of:
S1:User initiates checking request
User can initiate the request of speech verification by client to server end, and user can initiate checking by various ways please Ask, including by webpage, voice call etc., server end is received to give after the checking that user sends enters to ask and responded;
S2:Server end generates speech identifying code
After checking request is received, server end will carry out the generation of speech identifying code, and concrete generating mode is as follows:
Consider that consumers' acceptable degree, system support 4 or 6 identifying codes, when each user sends access request, system is random English alphabet sum combinatorics on words is chosen, system supports two ways in the generation of identifying code, is voice joint and language respectively Sound synthesizes.
(1)Platform includes the recorded message for recording the English alphabet and numeral for completing of multiple versions, using general Audio files joining method audio files can be combined, by each independent letter, digital sound files random combine Into audio files to be verified;
(2)Speech synthesis technique is a kind of by the technology that text conversion is voice output, and English alphabet and numeral are converted to language Sound can adopt kinds of words to realize to speech synthesis technique.Such as:Word based on pure software implementation is to phonetic synthesis Technology, the word based on speech chip are to speech synthesis technique.By independent letter, digital audio random combine into audio files Technology also ripe.The sound element can be recorded based on true man, it is also possible to the skill that text conversion is voice output Art is produced.
S3:Speech identifying code sends
The speech identifying code of generation is sent to user side by communication network, user is listened to by way of voice call, with When, also support the transmission that speech identifying code is carried out by immediate communication tool, mail;
S4:Fill in identifying code
After user has listened to speech identifying code, heard speech verification digital content is submitted to server end, user is in front end page The speech verification digital content that hears is input in face, and server end is committed to by client verified;
S5:Server end is verified
The checking digital content that user is submitted to by server end generates information with identifying code and compares, and sends and verify into if identical Work(is pointed out, and if failure sends checking request again, repeats whole flow process.
Technology used in the present invention includes:
(1)Speech synthesis technique
Also known as literary periodicals(Text to Speech)Technology, it are related to acoustics, linguisticss, Digital Signal Processing, computer section Etc. multiple subject technologies.The subject matter that speech synthesis technique is solved is that Word message is converted into acoustic information, that is, allow machine Device is lifted up one's voice as people.
(2)Speech recognition technology
Problem to be solved is the voice for allowing computer " can understand " mankind, and the Word message included in voice " is extracted " Out.The technology plays key player in the intelligent computer systems of " can be a visitor at a meeting ", equivalent to pacifying to computer system Load onto " ear " so as to possess the function of " can listen ", and then realize the information age utilizing " voice " that this is most natural, most easily Means carry out man-machine communication and interaction.
(3)Sound groove recognition technology in e
It is a kind of correlated characteristic for being extracted by voice signal and representing speaker's identity(Such as reflect that the fundamental frequency of glottis folding frequency is special Levy, reflect spectrum signature of oral cavity size shape and sound channel length etc.), and then identify the technology of the aspects such as speaker's identity. It can be widely applied to the fields such as information security, telephone bank, intelligent entrance guard and amusement increment.
Speech identifying code is that identifying code is directly exhaled user mobile phone by voice call, so as to realize that call voice is reported A kind of new verification mode of identifying code.The apparent concrete business tine that reminds operated by user of speech identifying code energy is right The verification mode of short message verification code has carried out good supplement, and the authentication mode of short message certification code+voice authentication code tests user Card process is safer, light, efficient, so as to reach the optimized effect of Consumer's Experience.

Claims (4)

1. a kind of speech verification code system, it is characterised in that the system includes server end and client, the server end For the generation of identifying code, transmission, and can receive and verified after the identifying code of client, server end includes:
(1)Identifying code generation module:Identifying code generation module can respond the request from client, generate identifying code;
(2)Identifying code encrypting module:Identifying code encrypting module be used for identifying code that identifying code generation module is generated carry out plus Close process;
(3)Identifying code sending module:Identifying code sending module is used for passing through different sides according to the difference of client request approach Formula responds user, identifying code is sent to subscription client, and is shown by subscription client;
(4)Cloud database:Cloud database includes system settings data storehouse, User Information Database, user's voice print database;
(5)Intelligent sound cloud:Intelligent sound cloud is the intelligent analysis system for intelligent sound field provided by third party, its There is provided interface capability to call for other systems;
The client includes:
(a)Identifying code request module:Identifying code request module can initiate speech identifying code request to server end;
(b)Identifying code receiver module:Identifying code receiver module is used for the speech identifying code sent by the reception server end;
(c)Identifying code deciphering module:Identifying code deciphering module is used for being decrypted the speech identifying code for receiving.
2. speech verification code system according to claim 1, it is characterised in that initiate checking in client The approach of code request includes but is not limited in the following manner:The Internet, communication network.
3. the implementation method of speech verification code system described in a kind of claim 1, it is characterised in that methods described includes following step Suddenly:
S1:User initiates checking request
User can initiate the request of speech verification by client to server end, and server end receives the checking that user sends and enters Give after asking and respond;
S2:Server end generates speech identifying code
After checking request is received, server end will carry out the generation of speech identifying code;
S3:Speech identifying code sends
The speech identifying code of generation is sent to user side by communication network, user is listened to by way of voice call, with When, also support the transmission that speech identifying code is carried out by immediate communication tool, mail;
S4:Fill in identifying code
After user has listened to speech identifying code, heard speech verification digital content is submitted to server end, user is in front end page The speech verification digital content that hears is input in face, and server end is committed to by client verified;
S5:Server end is verified
The checking digital content that user is submitted to by server end generates information with identifying code and compares, and sends and verify into if identical Work(is pointed out, and if failure sends checking request again, repeats whole flow process.
4. the implementation method of speech verification code system according to claim 3, it is characterised in that characterized in that, step In S2, the concrete generating mode of speech identifying code is as follows:
Consider that consumers' acceptable degree, system support 4 or 6 identifying codes, when each user sends access request, system is random English alphabet sum combinatorics on words is chosen, system supports two ways in the generation of identifying code, is voice joint and language respectively Sound synthesizes.
CN201610994294.3A 2016-11-11 2016-11-11 A kind of speech verification code system and its implementation method Pending CN106504745A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610994294.3A CN106504745A (en) 2016-11-11 2016-11-11 A kind of speech verification code system and its implementation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610994294.3A CN106504745A (en) 2016-11-11 2016-11-11 A kind of speech verification code system and its implementation method

Publications (1)

Publication Number Publication Date
CN106504745A true CN106504745A (en) 2017-03-15

Family

ID=58324298

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610994294.3A Pending CN106504745A (en) 2016-11-11 2016-11-11 A kind of speech verification code system and its implementation method

Country Status (1)

Country Link
CN (1) CN106504745A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107302545A (en) * 2017-08-16 2017-10-27 广东海翔教育科技有限公司 A kind of voice communication management method
CN107342087A (en) * 2017-06-19 2017-11-10 广州市讯飞樽鸿信息技术有限公司 A kind of speech verification method and system
CN108053206A (en) * 2017-12-29 2018-05-18 泰康保险集团股份有限公司 A kind of switching method and device for testing card mode
CN108806700A (en) * 2018-06-08 2018-11-13 英业达科技有限公司 The system and method for status is judged by vocal print and speech cipher
CN111010675A (en) * 2019-10-16 2020-04-14 平安科技(深圳)有限公司 Information verification method and device, computer equipment and storage medium
CN111131125A (en) * 2018-10-31 2020-05-08 薛康泰华 Dynamic verification method and software based on voice
CN112788372A (en) * 2021-01-28 2021-05-11 青岛海信传媒网络技术有限公司 Media asset platform registration method, display device and server
CN112954693A (en) * 2021-02-10 2021-06-11 中国工商银行股份有限公司 Identity authentication method, identity authentication server and terminal
CN113422781A (en) * 2021-07-03 2021-09-21 深圳市泰壹格物信息技术有限公司 Voice verification code sending system based on 5G message service
CN114915439A (en) * 2021-10-27 2022-08-16 杭州拼便宜网络科技有限公司 E-commerce platform identity verification method and device, electronic equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060277043A1 (en) * 2005-06-06 2006-12-07 Edward Tomes Voice authentication system and methods therefor
CN1905445A (en) * 2005-07-27 2007-01-31 国际商业机器公司 System and method of speech identification using mobile speech identification card
CN102255913A (en) * 2011-07-14 2011-11-23 北京百度网讯科技有限公司 Verification-security-level-based audio verification code provision method and equipment
CN105095727A (en) * 2015-05-25 2015-11-25 深圳新创客电子科技有限公司 Device administrator permission application method, server and system
CN105471920A (en) * 2016-01-15 2016-04-06 天脉聚源(北京)科技有限公司 Identifying code processing method and device
CN105577648A (en) * 2015-12-11 2016-05-11 北京奇虎科技有限公司 Method for obtaining and sending short message identifying code, calculating device and mobile terminal
CN105578439A (en) * 2016-01-23 2016-05-11 广州市讯飞樽鸿信息技术有限公司 Incoming call transfer intelligent answering method and system for call transfer platform

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060277043A1 (en) * 2005-06-06 2006-12-07 Edward Tomes Voice authentication system and methods therefor
CN1905445A (en) * 2005-07-27 2007-01-31 国际商业机器公司 System and method of speech identification using mobile speech identification card
CN102255913A (en) * 2011-07-14 2011-11-23 北京百度网讯科技有限公司 Verification-security-level-based audio verification code provision method and equipment
CN105095727A (en) * 2015-05-25 2015-11-25 深圳新创客电子科技有限公司 Device administrator permission application method, server and system
CN105577648A (en) * 2015-12-11 2016-05-11 北京奇虎科技有限公司 Method for obtaining and sending short message identifying code, calculating device and mobile terminal
CN105471920A (en) * 2016-01-15 2016-04-06 天脉聚源(北京)科技有限公司 Identifying code processing method and device
CN105578439A (en) * 2016-01-23 2016-05-11 广州市讯飞樽鸿信息技术有限公司 Incoming call transfer intelligent answering method and system for call transfer platform

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107342087A (en) * 2017-06-19 2017-11-10 广州市讯飞樽鸿信息技术有限公司 A kind of speech verification method and system
CN107302545A (en) * 2017-08-16 2017-10-27 广东海翔教育科技有限公司 A kind of voice communication management method
CN108053206A (en) * 2017-12-29 2018-05-18 泰康保险集团股份有限公司 A kind of switching method and device for testing card mode
CN108806700A (en) * 2018-06-08 2018-11-13 英业达科技有限公司 The system and method for status is judged by vocal print and speech cipher
CN111131125A (en) * 2018-10-31 2020-05-08 薛康泰华 Dynamic verification method and software based on voice
CN111010675A (en) * 2019-10-16 2020-04-14 平安科技(深圳)有限公司 Information verification method and device, computer equipment and storage medium
CN112788372A (en) * 2021-01-28 2021-05-11 青岛海信传媒网络技术有限公司 Media asset platform registration method, display device and server
CN112954693A (en) * 2021-02-10 2021-06-11 中国工商银行股份有限公司 Identity authentication method, identity authentication server and terminal
CN112954693B (en) * 2021-02-10 2023-02-24 中国工商银行股份有限公司 Identity authentication method, identity authentication server and terminal
CN113422781A (en) * 2021-07-03 2021-09-21 深圳市泰壹格物信息技术有限公司 Voice verification code sending system based on 5G message service
CN114915439A (en) * 2021-10-27 2022-08-16 杭州拼便宜网络科技有限公司 E-commerce platform identity verification method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN106504745A (en) A kind of speech verification code system and its implementation method
ES2749436T3 (en) Procedure and system for transaction security
TWI449394B (en) User authentication, verification and code generation system maintenance subsystem
US11063933B2 (en) User authentication
US9767807B2 (en) Digital voice signature of transactions
US20130262873A1 (en) Method and system for authenticating remote users
AU2015201690C1 (en) User authentication
CN106789855A (en) The method and device of user login validation
US11683303B2 (en) Establishing a trusted session with a smart speaker
CN104901808A (en) Voiceprint authentication system and method based on time type dynamic password
CN102752117A (en) Dynamic password generating device and method and transaction system with dynamic password generating device
CN204103936U (en) A kind of dynamic token and dynamic token Verification System
WO2015033061A1 (en) Method for authenticating a transaction
CN110380856A (en) Terminal device and its voice information processing method, device and storage medium
JP2002269047A (en) Sound user authentication system
CN103974242B (en) A kind of data processing method of voice call
CN105553983A (en) Webpage data protection method
CN104301105A (en) Digital certificate signing method based on mobile device with communication function, and equipment for realizing the same
US20210358501A1 (en) System and methods for speaker identification, message compression and/or message replay in a communications environment
CN103428162A (en) Voice dynamic password
Hou et al. TAES: Two-factor Authentication with End-to-End Security against VoIP Phishing
CN103916403A (en) Method for logging in to client side omitting password entering and supporting SIP
CN112954693B (en) Identity authentication method, identity authentication server and terminal
CN204465555U (en) Based on the voiceprint authentication apparatus of time type dynamic password
CN105827617A (en) Identity authentication-based fragment asynchronous conference text message sending and receiving method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170315

RJ01 Rejection of invention patent application after publication