CN113114660A - Voice verification code implementation method and device - Google Patents

Voice verification code implementation method and device Download PDF

Info

Publication number
CN113114660A
CN113114660A CN202110377071.3A CN202110377071A CN113114660A CN 113114660 A CN113114660 A CN 113114660A CN 202110377071 A CN202110377071 A CN 202110377071A CN 113114660 A CN113114660 A CN 113114660A
Authority
CN
China
Prior art keywords
verification code
voice
sound
voice verification
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110377071.3A
Other languages
Chinese (zh)
Inventor
王可
李西洋
陈树华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dingxiang Technology Co ltd
Original Assignee
Beijing Dingxiang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dingxiang Technology Co ltd filed Critical Beijing Dingxiang Technology Co ltd
Priority to CN202110377071.3A priority Critical patent/CN113114660A/en
Publication of CN113114660A publication Critical patent/CN113114660A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The application relates to a method and a device for realizing a voice verification code, wherein the method for realizing the voice verification code comprises the steps of receiving natural sound configuration parameters sent by user equipment, generating the voice verification code based on natural sound and a plurality of sound options corresponding to the voice verification code according to the natural sound configuration parameter information, and broadcasting the voice verification code and the plurality of sound options corresponding to the voice verification code through the user equipment when receiving user access request verification information. The man-machine behavior verification method for the visually impaired can be achieved, the machine recognition difficulty is improved through the voice verification code based on the natural voice, accordingly, service loss caused by malicious attack is avoided, and the overall safety of the system and the service is improved.

Description

Voice verification code implementation method and device
Technical Field
The application belongs to the technical field of network security, and particularly relates to a method and a device for realizing a voice verification code.
Background
In order to ensure the validity of the webpage registration information and improve the information security, a visual-based verification mode, i.e., pictures, letters, numbers, or the like, is mostly adopted. When a user sends an access request, a server firstly randomly obtains a character combination to be verified, the character combination is sent to a front end of the user, the user inputs the character combination which is seen through a keyboard, if the input is correct, the verification is passed, and if the input is not correct, the verification fails. This is not a problem for normal-vision people, but causes great inconvenience for vision-impaired people. In order to solve the problem, in the related art, a voice verification code is used, which is to transmit information requiring user verification to a user in a form of voice file playing and to require feedback of corresponding information, thereby achieving the purpose of verification. However, the existing voice verification code is based on 26 English letters and 0-9 numbers, N characters are randomly selected to form a character combination, and the sound corresponding to the character combination is obtained.
Disclosure of Invention
The method and the device for realizing the voice verification code are used for solving the problems that the existing voice verification code is based on 26 English letters and 0-9 numbers, N characters are randomly selected to form a character combination, the sound corresponding to the character combination is obtained, the voice verification code is easy to be cracked by a malicious program, the malicious attack cannot be blocked, and the safety is poor to a certain extent.
In a first aspect, the present application provides a method for implementing a voice verification code, including:
receiving natural sound configuration parameters sent by user equipment;
generating a voice verification code based on natural sounds and a plurality of sound options corresponding to the voice verification code according to the natural sound configuration parameter information;
and broadcasting a voice verification code and a plurality of sound options corresponding to the voice verification code through user equipment when receiving the verification information of the user access request.
Further, report pronunciation verification code and with behind a plurality of sound options that pronunciation verification code corresponds, still include through user equipment:
receiving a sound option selected by a user;
judging whether the sound option selected by the user is correct or not;
if yes, the check is passed.
Further, the determining whether the sound option selected by the user is correct includes:
judging whether the voice verification code based on the natural sound conforms to the sound option selected by the user;
and if so, judging that the sound option selected by the user is correct.
Further, after the verification passes, the method further comprises:
acquiring user equipment parameters and verification parameters;
calculating a current verification risk coefficient according to the user equipment parameter and the verification parameter;
and if the current verification risk coefficient is lower than the risk threshold, judging that the verification is successful.
Further, the user equipment parameters include:
one or more of a device ID, a device IP, and user information.
Further, the verification parameters include:
one or more of frequency of operations, number of operations, and historical operating records.
Further, the method also comprises the following steps:
and if the verification fails, recording the verification times, and receiving the configuration parameter information sent by the user equipment again.
Further, the method also comprises the following steps:
and broadcasting the operation prompt information through the user equipment.
In a second aspect, the present application provides a voice verification code implementation apparatus, including:
the receiving module is used for receiving natural sound configuration parameters sent by user equipment;
the generating module is used for generating a voice verification code based on natural sounds and a plurality of sound options corresponding to the voice verification code according to the natural sound configuration parameter information;
and the broadcasting module is used for broadcasting the voice verification code and a plurality of sound options corresponding to the voice verification code through user equipment when receiving the verification information of the user access request.
The technical scheme provided by the embodiment of the application can have the following beneficial effects:
according to the method and the device for realizing the voice verification code, the voice verification code based on the natural sound and the plurality of sound options corresponding to the voice verification code are generated according to the natural sound configuration parameter information by receiving the natural sound configuration parameters sent by the user equipment, and the voice verification code and the plurality of sound options corresponding to the voice verification code are broadcasted by the user equipment when the verification information of the user access request is received, so that the method for verifying the man-machine behavior of a visually handicapped person can be realized, the machine identification difficulty is improved through the voice verification code based on the natural sound, the service loss caused by malicious attacks is avoided, and the overall safety of the system and the service is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is a flowchart of a method for implementing a voice verification code according to an embodiment of the present application.
Fig. 2 is a flowchart of a method for implementing a voice verification code according to another embodiment of the present application.
Fig. 3 is a flowchart of another method for implementing voice verification code according to an embodiment of the present application.
Fig. 4 is a functional structure diagram of a voice verification code implementation apparatus according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail below. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the examples given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a flowchart of a method for implementing a voice verification code according to an embodiment of the present application, and as shown in fig. 1, the method for implementing a voice verification code includes:
s11: receiving natural sound configuration parameters sent by user equipment;
the natural sounds are, for example, dog-sounds, rain sounds, piano sounds, bell sounds, etc., and are not listed in this application.
S12: generating a voice verification code based on natural sound and a plurality of sound options corresponding to the voice verification code according to the natural sound configuration parameter information;
it should be noted that the configuration parameter information further includes, but is not limited to:
alphabetic configuration parameters, numeric configuration parameters, and chinese configuration parameters.
The method and the device can return different natural sounds according to the natural sound configuration parameters, and the sounds in the natural world can be distinguished but are not easy to imitate, and are more in variety and difficult to be maliciously attacked by robot learning, so that the voice verification code generated based on the natural sounds according to the natural sound configuration parameter information has higher safety.
S13: and broadcasting the voice verification code and a plurality of sound options corresponding to the voice verification code through the user equipment when the user access request verification information is received.
When the voice verification code is used for user verification, the voice verification code transmits information requiring user verification to a user in a voice file playing mode and requires feedback of corresponding information, so that the verification purpose is achieved. However, the existing voice verification code is based on 26 English letters and 0-9 numbers, N characters are randomly selected to form a character combination, and the sound corresponding to the character combination is obtained.
In the embodiment, the human-computer behavior verification method for visually handicapped people can be realized by receiving the natural sound configuration parameters sent by the user equipment, generating the voice verification code based on natural sound and the plurality of sound options corresponding to the voice verification code according to the natural sound configuration parameter information, broadcasting the voice verification code and the plurality of sound options corresponding to the voice verification code by the user equipment when the user access request verification information is received, and improving the machine identification difficulty by the voice verification code based on natural sound, so that the service loss caused by malicious attack is avoided, and the overall safety of the system and the service is improved.
Fig. 2 is a flowchart of a method for implementing a voice verification code according to another embodiment of the present application, and as shown in fig. 2, the method for implementing a voice verification code includes:
s21: receiving a sound option selected by a user;
the plurality of sound options are displayed on a user interface of the user equipment, the server randomly plays a sound, and the user needs to click the sound option just heard according to the voice prompt to pass the verification of the server.
In some embodiments, the sound options are broadcast in the form of a voice broadcast by the machine device.
S22: judging whether the sound option selected by the user is correct or not;
in some embodiments, determining whether the sound option selected by the user is correct comprises:
judging whether the voice verification code based on the natural sound conforms to the sound option selected by the user;
and if so, judging that the sound option selected by the user is correct.
For example, if the voice verification code is wind sound and the voice option selected by the user is dog call, the voice option selected by the user does not conform to the voice verification code; if the voice verification code is bell sound and the sound option selected by the user is bell sound, the sound option selected by the user is consistent with the voice verification code.
S23: if yes, the check is passed.
In some embodiments, if the verification fails, the number of times of verification is recorded, and the configuration parameter information sent by the user equipment is received again.
S24: acquiring user equipment parameters and verification parameters;
s25: calculating a current verification risk coefficient according to the user equipment parameters and the verification parameters;
in some embodiments, the user equipment parameters include, but are not limited to:
one or more of a device ID, a device IP, and user information.
In some embodiments, the verification parameters include, but are not limited to:
one or more of frequency of operations, number of operations, and historical operating records.
S26: and if the current verification risk coefficient is lower than the risk threshold, judging that the verification is successful.
The current check risk coefficient is calculated by collecting user equipment parameters and verification parameters, secondary verification is carried out on user verification operation, whether malicious attack behaviors of the robot exist or not can be further identified, and therefore system and service safety is improved, and real users are reserved on the premise that the real users can be read.
In some embodiments, further comprising:
and broadcasting the operation prompt information through the user equipment.
The application is applicable to the visually impaired and the people of a plurality of age groups, and the verification operation is completed by broadcasting the operation prompt information to assist the user, so that the user experience can be improved.
In some embodiments, as shown in fig. 3, the method for implementing the voice verification code includes:
step 1: the server side obtains configuration parameters of the verification code;
step 2: generating a voice verification code and a plurality of sound options according to the verification code configuration parameters;
and step 3: receiving access request verification information of user equipment;
and 4, step 4: displaying a plurality of sound options through user equipment, and playing a voice verification code to be verified;
and 5: playing a voice operation prompt;
step 6: receiving a sound option selected by a user;
and 7: judging whether the verification is successful according to the sound option selected by the user;
and 8: if the verification fails, recording the verification times, and re-executing the step 1;
and step 9: if the verification is successful, obtaining user equipment parameters and verification parameters, and calculating a current verification risk coefficient according to the user equipment parameters and the verification parameters;
step 10: if the current check risk coefficient is lower than the risk threshold, judging that the verification is successful;
step 11: and if the current verification risk coefficient is not lower than the risk threshold, re-executing the step 1.
In this embodiment, the design technique based on sense organ experience who uses nature gas sound as the basis is used for supplementary guide visual disorder crowd to accomplish the verification of man-machine action, has compensatied the not enough of visual disorder personage's unable internet product of visiting through conventional check-up mode, compares ordinary letter or digit pronunciation identifying code, and this application can reduce the risk that the identifying code was cracked, guarantees the security of system, through secondary verification and suggestion, further promotes the security of system.
An embodiment of the present invention provides a device for implementing a voice verification code, where as shown in fig. 3, the device for implementing a voice verification code includes:
a receiving module 41, configured to receive a natural sound configuration parameter sent by a user equipment;
a generating module 42, configured to generate a voice verification code based on a natural sound and a plurality of sound options corresponding to the voice verification code according to the natural sound configuration parameter information;
and the broadcasting module 43 is used for broadcasting the voice verification code and a plurality of sound options corresponding to the voice verification code through the user equipment when the user access request verification information is received.
In some embodiments, further comprising:
and the judging module is used for judging whether the sound option selected by the user is correct or not.
And the calculation module is used for calculating the current verification risk coefficient according to the user equipment parameters and the verification parameters, and if the current verification risk coefficient is lower than the risk threshold, the verification is judged to be successful.
In some embodiments, the broadcast module 33 is further configured to broadcast the operation prompt information through the user equipment.
In the embodiment, the receiving module receives the natural sound configuration parameters sent by the user equipment, the generating module generates the voice verification code based on the natural sound and a plurality of sound options corresponding to the voice verification code according to the natural sound configuration parameter information, the broadcasting module broadcasts the voice verification code and the plurality of sound options corresponding to the voice verification code through the user equipment when receiving the user access request verification information, the man-machine behavior verification method for the visually handicapped can be realized, the machine identification difficulty is improved through the voice verification code based on the natural sound, thereby avoiding the service loss caused by malicious attack and improving the overall safety of the system and the service.
It is understood that the same or similar parts in the above embodiments may be mutually referred to, and the same or similar parts in other embodiments may be referred to for the content which is not described in detail in some embodiments.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present application, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional component mode. The integrated module, if implemented in the form of a software functional component and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.
It should be noted that the present invention is not limited to the above-mentioned preferred embodiments, and those skilled in the art can obtain other products in various forms without departing from the spirit of the present invention, but any changes in shape or structure can be made within the scope of the present invention with the same or similar technical solutions as those of the present invention.

Claims (9)

1. A method for implementing voice verification codes is characterized by comprising the following steps:
receiving natural sound configuration parameters sent by user equipment;
generating a voice verification code based on natural sounds and a plurality of sound options corresponding to the voice verification code according to the natural sound configuration parameter information;
and broadcasting a voice verification code and a plurality of sound options corresponding to the voice verification code through user equipment when receiving the verification information of the user access request.
2. The method for implementing the voice verification code according to claim 1, wherein after the voice verification code and the plurality of sound options corresponding to the voice verification code are broadcasted by the user equipment, the method further comprises:
receiving a sound option selected by a user;
judging whether the sound option selected by the user is correct or not;
if yes, the check is passed.
3. The method of claim 2, wherein the determining whether the voice option selected by the user is correct comprises:
judging whether the voice verification code based on the natural sound conforms to the sound option selected by the user;
and if so, judging that the sound option selected by the user is correct.
4. The method for implementing voice verification code according to claim 2, further comprising, after the verification passes:
acquiring user equipment parameters and verification parameters;
calculating a current verification risk coefficient according to the user equipment parameter and the verification parameter;
and if the current verification risk coefficient is lower than the risk threshold, judging that the verification is successful.
5. The method of claim 4, wherein the UE parameters include:
one or more of a device ID, a device IP, and user information.
6. The method of claim 4, wherein the verification parameters comprise:
one or more of frequency of operations, number of operations, and historical operating records.
7. The voice authentication code implementation method of claim 2, further comprising:
and if the verification fails, recording the verification times, and receiving the configuration parameter information sent by the user equipment again.
8. The method for implementing the voice verification code according to any one of claims 1 to 7, further comprising:
and broadcasting the operation prompt information through the user equipment.
9. A voice verification code implementation device is characterized by comprising:
the receiving module is used for receiving natural sound configuration parameters sent by user equipment;
the generating module is used for generating a voice verification code based on natural sounds and a plurality of sound options corresponding to the voice verification code according to the natural sound configuration parameter information;
and the broadcasting module is used for broadcasting the voice verification code and a plurality of sound options corresponding to the voice verification code through user equipment when receiving the verification information of the user access request.
CN202110377071.3A 2021-04-08 2021-04-08 Voice verification code implementation method and device Pending CN113114660A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110377071.3A CN113114660A (en) 2021-04-08 2021-04-08 Voice verification code implementation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110377071.3A CN113114660A (en) 2021-04-08 2021-04-08 Voice verification code implementation method and device

Publications (1)

Publication Number Publication Date
CN113114660A true CN113114660A (en) 2021-07-13

Family

ID=76714849

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110377071.3A Pending CN113114660A (en) 2021-04-08 2021-04-08 Voice verification code implementation method and device

Country Status (1)

Country Link
CN (1) CN113114660A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006130958A1 (en) * 2005-06-06 2006-12-14 Edward Tomes Voice authentication system and methods therefor
CN102438024A (en) * 2012-01-05 2012-05-02 重庆大学 Voice verification method based on nonlinguistic characteristics
CN106529288A (en) * 2016-11-16 2017-03-22 智者四海(北京)技术有限公司 Account risk identification method and device
CN108123926A (en) * 2016-11-30 2018-06-05 阿里巴巴集团控股有限公司 Identity identifying method and device and computing device
WO2019109499A1 (en) * 2017-12-07 2019-06-13 广州势必可赢网络科技有限公司 Dynamic code and dynamic vocal print update based identity authentication protocol and server

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006130958A1 (en) * 2005-06-06 2006-12-14 Edward Tomes Voice authentication system and methods therefor
CN102438024A (en) * 2012-01-05 2012-05-02 重庆大学 Voice verification method based on nonlinguistic characteristics
CN106529288A (en) * 2016-11-16 2017-03-22 智者四海(北京)技术有限公司 Account risk identification method and device
CN108123926A (en) * 2016-11-30 2018-06-05 阿里巴巴集团控股有限公司 Identity identifying method and device and computing device
WO2019109499A1 (en) * 2017-12-07 2019-06-13 广州势必可赢网络科技有限公司 Dynamic code and dynamic vocal print update based identity authentication protocol and server

Similar Documents

Publication Publication Date Title
KR101908711B1 (en) Artificial intelligence based voiceprint login method and device
US10158633B2 (en) Using the ability to speak as a human interactive proof
KR20170001548A (en) Method and device for voiceprint indentification
CN112765336B (en) Barrage management method and device, terminal equipment and storage medium
Lazar et al. The SoundsRight CAPTCHA: an improved approach to audio human interaction proofs for blind users
CN106650398B (en) Verification code identification system and identification method of mobile platform
EP3432182B1 (en) Systems and methods for secure, accessible and usable captcha
CN102103670A (en) Human verification by contextually iconic visual public turing test
TW201730803A (en) Method and system for identifying human/machine
CN109831682B (en) Information auditing method and device, electronic equipment and storage medium
CN101420305A (en) Speech identifying code implementing method
CN110704822A (en) Method, device, server and system for improving user identity authentication security
CN104283682A (en) Method, device and system conducting verification through verification codes
KR20170003366A (en) Communication method, apparatus and system based on voiceprint
CN110896352B (en) Identity recognition method, device and system
WO2019092553A1 (en) Neural response detector
CN105047192A (en) Statistic voice synthesis method and device based on hidden Markov model (HMM)
JP6219009B1 (en) Interactive attack simulation device, interactive attack simulation method, and interactive attack simulation program
CN113114660A (en) Voice verification code implementation method and device
KR101854804B1 (en) Apparatus for providing user authentication service and training data by determining the types of named entities associated with the given text
CN112397072B (en) Voice detection method and device, electronic equipment and storage medium
CN111081256A (en) Digital string voiceprint password verification method and system
Tanvee et al. Move & select: 2-layer CAPTCHA based on cognitive psychology for securing web services
CN110209429A (en) Information extracting method, device and storage medium
CN112992158A (en) Identity authentication method and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210713

RJ01 Rejection of invention patent application after publication