CN102333066A - Network security verification method by employing combination of speaker voice identity verification and account number password protection in online game - Google Patents

Network security verification method by employing combination of speaker voice identity verification and account number password protection in online game Download PDF

Info

Publication number
CN102333066A
CN102333066A CN2010102253529A CN201010225352A CN102333066A CN 102333066 A CN102333066 A CN 102333066A CN 2010102253529 A CN2010102253529 A CN 2010102253529A CN 201010225352 A CN201010225352 A CN 201010225352A CN 102333066 A CN102333066 A CN 102333066A
Authority
CN
China
Prior art keywords
voice
user
account number
speaker
identity verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102253529A
Other languages
Chinese (zh)
Inventor
朱建政
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2010102253529A priority Critical patent/CN102333066A/en
Publication of CN102333066A publication Critical patent/CN102333066A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The invention provides a network security verification method by employing combination of speaker voice identity verification and account number password protection in an online game. According to the method provided in the invention, a voice signal is received at a client and corresponding processing is carried out; and then speaker voice identity verification is carried out at a server terminal by a voice template. Voice identity verification correlated to a speaker text is employed; and moreover, account number password protection is also employed, so that a password-antitheft function is realized. An audio signal is collected and stored at a client and simultaneously, end point detection and characteristic extraction are carried out; besides, a dynamic programming method is employed at a server terminal to calculate a match degree between a speaker voice parameter and a voice template. When a password of a user account number is stolen, a voice difference of an illegal user will cause a failure of voice identity verification of the illegal user; moreover, when the illegal user carries out registration by using a method of copying an account number password and a voice parameter, voice identity verification failure will also be caused.

Description

A kind of network security verification method that in online game, adopts speaker's voice authentication and account number cipher protection to combine
Technical field
The present invention relates to network security verification method in online game.
Background technology
At present in online game, the stolen situation of the number of the account of user's login and password is serious day by day.Occur a lot of Trojans for stealing numbers on the network and adopt modes such as keyboard record, Snipping Tool, internal memory scanning to steal other people account number cipher, illegally obtain virtual assets, caused economic loss and moral injury for stolen user.
For number of the account and the game security that ensures the user, some online game company has released the password protection product of protection number of the account and game security.On the one hand, although the user has used the password protection product, the risk that the user exists the stolen back of account number cipher account number cipher to be modified and to suffer a loss; On the other hand, these password protection products have increased user's spending undoubtedly.
Summary of the invention
The objective of the invention is in order to increase the fail safe of user account, behind user's login account and password, utilize user's voice to carry out safety verification again.Even under the stolen situation of user account password, the disabled user also is difficult to through the authentication of speaker's voice, thereby has realized the function of anti-steal-number.
To achieve these goals, the invention provides a kind of network security verification method that in online game, adopts speaker's voice authentication and account number cipher protection to combine.This method is at the client received speech signal and handle accordingly, carries out the authentication of speaker's voice at server end through sound template then.
It is characterized in that comprising:
This method adopts the relevant voice authentication of speaker's text.
This method adopts the account number cipher protection, and has anti-steal-number function.
In the said method, only contain the speech characteristic parameter after the encryption in the packet that user end to server sends, do not contain original speech information.When speech characteristic parameter is intercepted and captured, the interceptor also is difficult to therefrom obtain text message contained in the user speech, thereby has increased the difficulty of disabled user through the voice authentication.Even the disabled user has obtained text message contained in the user speech, because disabled user and registered user's the vocal organs and the difference of phonation, the disabled user also is difficult to pass through voice identification authentication so.
In the said method, server end is preserved the historical record of user vocal feature parameter, and when the disabled user used the copying voice method of characteristic parameters to login, server end was then judged its authentication failure.
Description of drawings
Fig. 1 is that execution mode of the present invention is used for the schematic flow diagram that the user creates account number cipher and sound template.
Fig. 2 is the schematic flow diagram that execution mode of the present invention carries out authentication to account number cipher and speaker's voice when being used for user's login account.
Fig. 3 is the schematic flow diagram that execution mode of the present invention client when user's recorded speech illustrated in figures 1 and 2 is used to extract the characteristic parameter of speaker's voice.
To be execution mode of the present invention be used for schematic flow diagram that account number cipher and speaker's voice are carried out authentication at server end shown in Figure 2 to Fig. 4.
Embodiment
To combine accompanying drawing that execution mode of the present invention is described in detail below.
Fig. 1 is that execution mode of the present invention is used for the schematic flow diagram that the user creates account number cipher and sound template.The processing procedure shown in the left side is in client executing among Fig. 1, and the processing procedure shown in the right side is carried out at server end.This flow process starts from step 101; Be that the user creates account number cipher; The transmission function of client is user name length, account password length, random key; User name and account password form packet in order, according to certain AES packet are carried out encryption and send to server end then.AES here and essence of the present invention are irrelevant, and are that those of ordinary skills know.
In step 102, server end is deciphered packet, and the checking user creates the validity of account password.
Two kinds of checking results are arranged in the step 102.
First kind of checking result is that the establishment account password is invalid.In this case, server end sends prompting to client and creates the message of account password again, and turns back to the state before the step 101.
Second kind of checking result is that the establishment account password is effective.In this case, server end sends the message that account password is created success confirmation to client, and proceeds to step 103.
In step 103, user's recorded speech, client is extracted the characteristic parameter of user speech; Send function then with user name length, account password length, user vocal feature parameter length; Random key; User name, account number cipher and user vocal feature parameter form packet in order, according to certain AES packet are carried out encryption and send to server end then.
In step 104, server end is deciphered packet, and the validity of checking speech characteristic parameter.Under the effective situation of parameter, create the user speech template.The validity of the speech characteristic parameter here is meant that speech characteristic parameter length and speech characteristic parameter value are whether in effective range.Then, server end uses the speech characteristic parameter that extracts to the training of HMM model, thereby has created the user speech template.In order to prevent the situation of steal-number effectively, server end also can write down the effective speech characteristic parameter after the packet deciphering at every turn.Relevant to the algorithm of the speech characteristic parameter that extracts to the training of HMM model, show " Fundamentals of Speech Recognition. " referring to L.R.Rabiner and B.-H.Juang.
Two kinds of checking results are arranged in the step 104.
First kind of checking result is that the user vocal feature parameter is invalid.In this case, server end sends the message that the prompting user records again to client, and turns back to the state before the step 103.
Second kind of checking result is that the user vocal feature parameter is effective.In this case, server end sends user speech template establishment message of successful to client, and proceeds to step 105.
Flow process ends at step 105, and promptly the user creates end.
Fig. 2 is the schematic flow diagram that execution mode of the present invention carries out authentication to account number cipher and speaker's voice when being used for user's login account.The processing procedure shown in the left side is in client executing among Fig. 2, and the processing procedure shown in the right side is carried out at server end.This flow process starts from step 201, and promptly the user imports account number cipher and recorded speech, and client is extracted the characteristic parameter of user speech; Send function then with user name length, account password length, user vocal feature parameter length; Random key; User name, account password and user vocal feature parameter form packet in order, according to certain AES packet are carried out encryption and send to server end then.
In step 202, server end is deciphered packet, and checking user account password and speaker's identity.
Two kinds of checking results are arranged in the step 202.
First kind of checking result is the authentication failure.In this case, server sends prompting safety verification failure to client, and turns back to the state before the step 201.
Second kind of checking result is the authentication success.In this case, server sends the user to client and logins message of successful, and proceeds to step 203.
Flow process ends at step 203, and promptly the user logins success status.
Fig. 3 is the schematic flow diagram that execution mode of the present invention client when user's recorded speech illustrated in figures 1 and 2 is used to extract the characteristic parameter of speaker's voice.This flow process starts from step 301, and promptly the user uses mouse or keyboard to begin recorded speech.Then, in step 302, parameter is set and opens sound pick-up outfit.
In step 303, Windows core library processing messages.
In step 304, two buffer memory audio storage schemes are to use two internal memories to carry out the collection and the storage of audio frequency.When certain internal memory was filled, system will send MM_WIM_DATA message, and this message processing function is changed another piece internal memory at once.The advantage of this scheme is to need not to specify fixing record length, as long as this message processing function detects the condition that stops to record, just can stop recording automatically, referring to Song Kun, Liu Ruining, Marvin's by force show " Visual C++ video technique scheme treasured book ".
When certain internal memory was filled, system will send MM_WIM_DATA message, and this message processing function is changed another piece internal memory at once and recorded, and reads in buffering area to the data of this part internal memory then, gets into step 305 again.
In step 305, the audio sampling data in the buffering area is carried out end-point detection and feature extraction.End-point detection can be provided with the sign that voice finish.When certain internal memory was filled, system will send MM_WIM_DATA message.When if this message processing function does not detect the sign of voice end, this message processing function is changed another piece internal memory continuation recording at once so, promptly goes back to step 304; Otherwise get into step 305.About end-point detection; Referring to ITU-T Rec.G.729; Annex B; A silence compression scheme for G.729optimized for terminals conforming to ITU-T has adopted linear prediction cepstrum coefficient (LPCC) V.70. about feature extraction, shows " Fundamentals of Speech Recognition. " referring to L.R.Rabiner and B.-H.Juang.
Flow process ends at step 305.
To be execution mode of the present invention be used for schematic flow diagram that account number cipher and speaker's voice are carried out authentication at server end shown in Figure 2 to Fig. 4.This flow process starts from step 401, and server end has obtained the packet that client is sent.Then, in step 402, server end is deciphered packet, and the user name length after obtaining deciphering, account password length, speaker's speech characteristic parameter length, user name, account password and speaker's speech characteristic parameter.
In step 403, server end is verified account password.
If step 403 checking result is " denying ", then flow process gets into step 408; Otherwise, get into step 404.
In step 404, judge whether speaker's speech characteristic parameter length is consistent with speech characteristic parameter.
If the result of step 404 is " being ", then flow process gets into step 408; Otherwise, get into step 405.
When the disabled user has stolen user's account number cipher and speech characteristic parameter, and when logining with the method for duplicating, because the randomness of the speech parameter of the intrinsic randomness decision of human phonation, so server end is judged its voice authentication failure.
In step 405, speech characteristic parameter is carried out reprocessing, get into step 406 then.
In step 406, the matching degree of computing voice characteristic parameter and user speech template, and adopted dynamic programming algorithm, show " Fundamentals of Speech Recognition. " referring to L.R.Rabiner and B.-H.Juang.
User's account number cipher and speech characteristic parameter have been stolen as the disabled user; And when under not knowing the contained text message situation of stolen user speech, logining with the method for own recorded voice; Because the difference of different voicing text processes; Therefore the matching degree of disabled user's speech characteristic parameter and original subscriber's sound template is low, thereby causes its voice authentication failure.
Even when the disabled user knows the text message that stolen user speech is contained; And when logining with the method for own recorded voice; Because the difference of different speaker's vocal organs and phonation; Therefore the matching degree of disabled user's speech characteristic parameter and original subscriber's sound template is low, thereby causes its voice authentication failure.
If the matching result of step 406 is " denying ", then flow process gets into step 408; Otherwise, get into step 407.
In step 407, the authentication success.
In step 408, the authentication failure.
Flow process ends at step 409.
Though more than described embodiment of the present invention, the those of skill in the art in the present technique field should be appreciated that these only illustrate, and can make numerous variations or modification to these execution modes, and can not deviate from principle of the present invention and essence.Scope of the present invention only is defined by the claims.

Claims (3)

1. network security verification method that in online game, adopts speaker's voice authentication and account number cipher protection to combine.This method is at the client received speech signal and handle accordingly, carries out the authentication of speaker's voice at server end through sound template then.
It is characterized in that comprising:
This method adopts the relevant voice authentication of speaker's text.
This method adopts the account number cipher protection, and has anti-steal-number function.
2. according to the network security verification method of claim 1, its characteristic comprises the speech characteristic parameter that only contains in the packet that user end to server sends after the encryption, does not contain original speech information.
3. according to the network security verification method of claim 1; Its characteristic comprises the historical record of server end preservation user vocal feature parameter; When the disabled user used the copying voice method of characteristic parameters to login, server end was then judged its authentication failure.
CN2010102253529A 2010-07-13 2010-07-13 Network security verification method by employing combination of speaker voice identity verification and account number password protection in online game Pending CN102333066A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010102253529A CN102333066A (en) 2010-07-13 2010-07-13 Network security verification method by employing combination of speaker voice identity verification and account number password protection in online game

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102253529A CN102333066A (en) 2010-07-13 2010-07-13 Network security verification method by employing combination of speaker voice identity verification and account number password protection in online game

Publications (1)

Publication Number Publication Date
CN102333066A true CN102333066A (en) 2012-01-25

Family

ID=45484673

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102253529A Pending CN102333066A (en) 2010-07-13 2010-07-13 Network security verification method by employing combination of speaker voice identity verification and account number password protection in online game

Country Status (1)

Country Link
CN (1) CN102333066A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014063363A1 (en) * 2012-10-26 2014-05-01 Baina Innovation (Chengdu) Technology Co., Limited Method and system for authenticating computing devices
CN103825892A (en) * 2014-02-19 2014-05-28 广州市自来水公司 Safe data verification and transmission method and system
CN104834847A (en) * 2014-02-11 2015-08-12 腾讯科技(深圳)有限公司 Identity verification method and device
WO2017028252A1 (en) * 2015-08-18 2017-02-23 张焰焰 Method and mobile terminal for logging in to account with four-factor authentication
WO2017031652A1 (en) * 2015-08-22 2017-03-02 张焰焰 Method and mobile terminal for indicating information upon four-factor authentication of account login
CN106601238A (en) * 2015-10-14 2017-04-26 阿里巴巴集团控股有限公司 Application operation processing method and application operation processing device
CN109599119A (en) * 2018-12-28 2019-04-09 娄奥林 A kind of defence method that confrontation voice messaging is stolen
CN111091836A (en) * 2019-12-25 2020-05-01 武汉九元之泰电子科技有限公司 Intelligent voiceprint recognition method based on big data
CN111991813A (en) * 2020-08-28 2020-11-27 厦门雅基软件有限公司 Method and device for logging in game, electronic equipment and storage medium
CN112054999A (en) * 2020-08-11 2020-12-08 广州点云科技有限公司 Method and system for detecting state of Steam platform account

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014063363A1 (en) * 2012-10-26 2014-05-01 Baina Innovation (Chengdu) Technology Co., Limited Method and system for authenticating computing devices
CN104834847B (en) * 2014-02-11 2019-03-08 腾讯科技(深圳)有限公司 Auth method and device
CN104834847A (en) * 2014-02-11 2015-08-12 腾讯科技(深圳)有限公司 Identity verification method and device
CN103825892A (en) * 2014-02-19 2014-05-28 广州市自来水公司 Safe data verification and transmission method and system
WO2017028252A1 (en) * 2015-08-18 2017-02-23 张焰焰 Method and mobile terminal for logging in to account with four-factor authentication
WO2017031652A1 (en) * 2015-08-22 2017-03-02 张焰焰 Method and mobile terminal for indicating information upon four-factor authentication of account login
CN106601238A (en) * 2015-10-14 2017-04-26 阿里巴巴集团控股有限公司 Application operation processing method and application operation processing device
CN109599119A (en) * 2018-12-28 2019-04-09 娄奥林 A kind of defence method that confrontation voice messaging is stolen
CN111091836A (en) * 2019-12-25 2020-05-01 武汉九元之泰电子科技有限公司 Intelligent voiceprint recognition method based on big data
CN112054999A (en) * 2020-08-11 2020-12-08 广州点云科技有限公司 Method and system for detecting state of Steam platform account
CN112054999B (en) * 2020-08-11 2022-10-25 广州点云科技有限公司 Method and system for detecting state of Steam platform account
CN111991813A (en) * 2020-08-28 2020-11-27 厦门雅基软件有限公司 Method and device for logging in game, electronic equipment and storage medium
CN111991813B (en) * 2020-08-28 2022-07-05 厦门雅基软件有限公司 Method and device for logging in game, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN102333066A (en) Network security verification method by employing combination of speaker voice identity verification and account number password protection in online game
CN102377729A (en) User registration and logon method by combining speaker speech identity authentication and account code protection in network games
CN105069874B (en) A kind of mobile Internet sound-groove gate inhibition system and its implementation
US10135818B2 (en) User biological feature authentication method and system
Monrose et al. Cryptographic key generation from voice
WO2017114307A1 (en) Voiceprint authentication method capable of preventing recording attack, server, terminal, and system
US8630391B2 (en) Voice authentication system and method using a removable voice ID card
CN104660413A (en) Voiceprint password certifying method and device
CN106961418A (en) Identity identifying method and identity authorization system
CN102377741A (en) Network security verification method combined with speaker voice identity verification and account password protection during Internet payment
CN102254559A (en) Identity authentication system and method based on vocal print
CN110502886B (en) Multiple identity authentication method, device, terminal and computer storage medium
WO2010047817A1 (en) Speaker verification methods and systems
JPH0737098A (en) Method and system for confirming identity of individual
US20100131272A1 (en) Apparatus and method for generating and verifying a voice signature of a message and computer readable medium thereof
WO2010047816A1 (en) Speaker verification methods and apparatus
CN107886958A (en) Express cabinet pickup method and device based on voiceprint
CN103678977A (en) Method and electronic device for protecting information security
CN110827453A (en) Fingerprint and voiceprint double authentication method and authentication system
CN107491671A (en) A kind of safe login method and device
CN110322889A (en) A kind of personal identification method of high reliablity
Johnson et al. Voice authentication using short phrases: Examining accuracy, security and privacy issues
Yampolskiy Mimicry attack on strategy-based behavioral biometric
US20120330663A1 (en) Identity authentication system and method
KR101424962B1 (en) Authentication system and method based by voice

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120125