CN102457845B - Wireless traffic identity identifying method, equipment and system - Google Patents

Wireless traffic identity identifying method, equipment and system Download PDF

Info

Publication number
CN102457845B
CN102457845B CN201010512593.1A CN201010512593A CN102457845B CN 102457845 B CN102457845 B CN 102457845B CN 201010512593 A CN201010512593 A CN 201010512593A CN 102457845 B CN102457845 B CN 102457845B
Authority
CN
China
Prior art keywords
authentication
user
text
wireless traffic
vocal print
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201010512593.1A
Other languages
Chinese (zh)
Other versions
CN102457845A (en
Inventor
诸寅嘉
孟超峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Lingxi Interactive Entertainment Co.,Ltd.
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201610157889.3A priority Critical patent/CN105873050A/en
Priority to CN201010512593.1A priority patent/CN102457845B/en
Publication of CN102457845A publication Critical patent/CN102457845A/en
Priority to HK12106884.2A priority patent/HK1166214A1/en
Application granted granted Critical
Publication of CN102457845B publication Critical patent/CN102457845B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/26Speech to text systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Biomedical Technology (AREA)
  • Acoustics & Sound (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Telephonic Communication Services (AREA)

Abstract

This application discloses a kind of wireless traffic identity identifying method, equipment and system, described method comprises: server receives the ID authentication request that wireless traffic terminal sends; Generate dynamic text and described dynamic text is handed down to described wireless traffic terminal; Receive according to user the speech recognition text reading aloud generation of described dynamic text and vocal print feature from described wireless traffic terminal; Described speech recognition text and vocal print feature is utilized to carry out authentication to described user, if described speech recognition text and described dynamic text match, and the vocal print feature that described vocal print feature and described user register matches, then determine one's identity authentication success; Otherwise determine one's identity authentification failure.Application technique scheme, fully can ensure the reliability of authentication, and then ensures the fail safe of wireless traffic.

Description

Wireless traffic identity identifying method, equipment and system
Technical field
The application relates to mobile communication technology field, particularly relates to a kind of wireless traffic identity identifying method, equipment and system.
Background technology
Along with the development of mobile communication technology, wireless traffic has become a kind of new business means.Such as, mobile phone is no longer only the instrument of voice call, and increasing application and service occurs on mobile phone terminal, and mobile-phone payment is exactly one of them.At present, China's mobile payment market mainly contains two kinds of forms: one is directly deducted by mobile phone charge, and its business model is confined to rely in operator's service of having business platform by oneself or range of application usually.Two is credit card and bank card are bound by mobile phone, directly withholds from the bank account of user in payment process, provides service based on " Mobile banking " of " mobile phone wallet " of China Mobile and CHINAUNICOM.
When wireless traffic mode is by when may develop into a kind of trend, the fail safe of its authentication is exactly one is worth the topic inquired into.Due to existing wireless traffic terminal, such as wireless terminal or portable equipment, its platform diversity (as mobile phone just has Symbian, WindowsMobile, Android, iOS etc.), device processes performance is relatively low, causes developer or ISP cannot be the security module relatively reliably that vast user disposes similar PC end effectively under existing technical capability.For this reason, in the prior art, when carrying out wireless authentication, mostly adopt dynamic password mode, as E-token dynamic password card, password card, mobile phone OTP (one-time password, OneTimePassword, is called for short OTP) note verification, or external hardware encipher mode (such as U shield) carries out certification to user identity.But no matter which kind of mode, its fail safe and controllability are all lower, because once password and hardware encipher equipment are together stolen or lose, are then difficult to ensure the reliable of authentication and fail safe, directly affect the fail safe of customer service or account.
Summary of the invention
For solving the problems of the technologies described above, the embodiment of the present application provides a kind of wireless traffic identity identifying method, equipment and system, to ensure the reliability of authentication.
The embodiment of the present application provides following technical scheme:
A kind of wireless traffic identity identifying method, comprising:
Server receives the ID authentication request that wireless traffic terminal sends;
Generate dynamic text and described dynamic text is handed down to described wireless traffic terminal;
Receive according to user the speech recognition text reading aloud generation of described dynamic text and vocal print feature from described wireless traffic terminal;
Described speech recognition text and vocal print feature is utilized to carry out authentication to described user, if described speech recognition text and described dynamic text match, and the vocal print feature that described vocal print feature and described user register matches, then determine one's identity authentication success; Otherwise determine one's identity authentification failure.
A kind of wireless traffic identity identifying method, comprising:
After wireless traffic terminal receives Client-initiated business operating instructions, send ID authentication request to server;
After described server receives the ID authentication request of wireless traffic terminal transmission, generate dynamic text, and described dynamic text is handed down to described wireless traffic terminal;
After described wireless traffic terminal receives described dynamic text, show described dynamic text and point out user to read aloud described dynamic text;
Described wireless traffic terminal gathers voice and the vocal print feature that user reads aloud described dynamic text, is speech recognition text, described speech recognition text and vocal print feature are sent to server by the speech conversion of collection;
After described server receives described speech recognition text and vocal print feature, described speech recognition text and vocal print feature is utilized to carry out authentication to described user, if described speech recognition text and described dynamic text match, and the vocal print feature that described vocal print feature and described user register matches, then authentication success; Otherwise authentication failure.
A kind of server, comprising:
Request reception unit, for receiving the ID authentication request that wireless traffic terminal sends;
Text issues unit, for after described request receiving element receives described ID authentication request, generates dynamic text, and described dynamic text is handed down to described wireless traffic terminal;
Information receiving unit, for receiving according to user the speech recognition text reading aloud generation of described dynamic text and vocal print feature from described wireless traffic terminal;
Identification authenticating unit, for utilizing described speech recognition text and vocal print feature, authentication is carried out to described user, if described speech recognition text and described dynamic text match, and the vocal print feature that described vocal print feature and described user register matches, then determine one's identity authentication success; Otherwise determine one's identity authentification failure.
A kind of Radio Service system, comprising: server and wireless traffic terminal;
Described service terminal comprises:
Authentication request unit, for after receiving Client-initiated business operating instructions, sends ID authentication request to server;
Receiving element, for receiving the dynamic text that described server issues;
Display unit, for showing described dynamic text and pointing out described user to read aloud described dynamic text;
Information acquisition unit, reads aloud voice and the vocal print feature of described dynamic text for gathering described user;
Converting unit, the speech conversion for described information acquisition unit being gathered is speech recognition text;
Transmitting element, for sending to described server by described speech recognition text and vocal print feature;
Described server comprises:
Request reception unit, for the ID authentication request that described reception wireless traffic terminal sends;
Text issues unit, for after described request receiving element receives described ID authentication request, generates dynamic text, and described dynamic text is handed down to described wireless traffic terminal;
Information receiving unit, for receiving described speech recognition text and vocal print feature from described wireless traffic terminal;
Identification authenticating unit, for utilizing described speech recognition text and vocal print feature, authentication is carried out to described user, if described speech recognition text and described dynamic text match, and the vocal print feature that described vocal print feature and described user register matches, then determine one's identity authentication success; Otherwise determine one's identity authentification failure.
The technical scheme that the embodiment of the present application provides, adopt the mode that dynamic voice identification combines with Application on Voiceprint Recognition, when user carries out business or account operation by wireless authentication, issue to user and show the word of one section of stochastic generation, i.e. dynamic text, then obtain according to user the speech recognition text reading aloud generation of described dynamic text and vocal print feature, whether the text that user reads aloud matches with this dynamic text to utilize speech recognition technology to determine, and determine whether the vocal print feature of vocal print feature and the user's registered in advance obtained matches further, if both all match, then determine one's identity authentication success otherwise the authentification failure that determines one's identity, thus ensure that the reliability of authentication.
Further, if authentication failure, then server forbids that user performs business operation corresponding to this authentication, and then ensure that the fail safe of wireless traffic.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present application or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, the accompanying drawing that the following describes is only some embodiments recorded in the application, for those of ordinary skill in the art, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of flow chart of the embodiment of the present application wireless traffic identity identifying method;
Fig. 2 is a kind of flow chart of the embodiment of the present application wireless traffic identity identifying method;
Fig. 3 is a kind of structural representation of the embodiment of the present application server;
Fig. 4 is a kind of structural representation of the embodiment of the present application wireless traffic terminal.
Embodiment
Technical scheme in the application is understood better in order to make those skilled in the art person, below in conjunction with the accompanying drawing in the embodiment of the present application, technical scheme in the embodiment of the present application is clearly and completely described, obviously, described embodiment is only some embodiments of the present application, instead of whole embodiments.Based on the embodiment in the application, the every other embodiment that those of ordinary skill in the art obtain, all should belong to the scope of the application's protection.
At present, speech recognition technology is widely used in the multiple fields such as signal transacting, pattern recognition, artificial intelligence, and its target is computer-readable input by the vocabulary Content Transformation in the voice of the mankind, such as button, binary coding or character string.
The generation of human speech is a complicated physiology physical process between Body Languages maincenter and vocal organs, the phonatory organ such as tongue, tooth, larynx, lung, nasal cavity that people uses when talking everyone widely different in size and form, so the vocal print collection of illustrative plates of any two people is all variant.Everyone existing relative stability of Speech acoustics feature, has variability again, is not absolute, unalterable.This variation can from physiology, pathology, psychology, simulation, camouflage, also relevant with environmental interference.However, because everyone vocal organs are not quite similar, therefore in the ordinary course of things, still can distinguish the sound of different people or judge whether it is the sound of same people.
For this reason, the embodiment of the present application wireless traffic identity identifying method, equipment and system, adopt the identification authentication mode that dynamic voice identification combines with Application on Voiceprint Recognition, when user carries out account operation by wireless traffic, issue to user and show the word of one section of stochastic generation, i.e. dynamic text, then obtain according to user the speech recognition text reading aloud generation of described dynamic text and vocal print feature, utilize speech recognition technology, determine whether the text that user reads aloud matches with this dynamic text, and determine whether the vocal print feature of vocal print feature and the user's registered in advance obtained matches further, if both all match, then authentication success, user is allowed to perform business operation corresponding to this authentication, otherwise authentication failure, forbid this business operation, thus the fail safe of abundant guarantee business.
Described speech recognition refers to, is computer-readable input by the vocabulary Content Transformation in voice, to identify wherein comprised word content.
Described Application on Voiceprint Recognition refers to, automatically extracts the voiceprint of speaker from the voice signal that speaker sends, and to the research field that speaker identifies.Similar with fingerprint, the vocal print of different people is different, the behavior difference that everyone will be formed due to the differences of Physiological of vocal organs and the day after tomorrow, is made the vocal print in their voice all with strong personal colors, is gone out the vocal print feature in voice by prior art identifiable design.
In an embodiment of the application, provide a kind of wireless traffic identity identifying method, as shown in Figure 1, the method comprises following basic step:
Step 101, server receives the ID authentication request that wireless traffic terminal sends.
Described wireless traffic terminal can be to carry with and by WLAN (WirelessLocalAreaNetworks, WLAN), GPRS (GeneralPacketRadioService, general packet radio service), 3G (3rd-generation, G mobile communication) etc. the terminal equipment of wireless mode accessing Internet, such as mobile phone, net book etc.
Wireless traffic terminal can by the data cube computation (by WLAN, GPRS or 3G etc.) set up, based on agreements such as Https, Http, Socket, specifically can automatically select according to the equipment performance of the level of security of wireless traffic, client and network state at that time or pre-set protocol type, submit the ID authentication request of user by sending predefined required parameter, the packet through encryption or the private message transmitted in frame mode through encryption to server to.
Step 102, generates dynamic text and described dynamic text is handed down to described wireless traffic terminal.
After server receives the ID authentication request of described wireless traffic terminal transmission, generate the dynamic text for this ID authentication request, this dynamic text can be the random passage produced, for the ID authentication request of different user or the ID authentication request of same user's different time, the dynamic text produced can be identical, also can be different.
Such as, after service end receives the ID authentication request that user initiated by wireless traffic client, stochastic generation one section of dynamic text is as " fail safe is high ", and the interface channel set up by current wireless client and service end is as Wi-Fi, GPRS (GeneralPacketRadioService, general packet radio service technology) etc. radio channel be handed down to wireless traffic terminal, after wireless traffic terminal successfully receives dynamic text, in the wireless traffic client of correspondence, show " fail safe is high ", and point out user to read aloud text.
In order to ensure the fail safe of described dynamic text in transmitting procedure further, wireless traffic terminal can also be encrypted transmission to described dynamic text, certainly, the mode of encryption can be that server and wireless traffic terminal both sides consult, and also can make an appointment.
Step 103, receives according to user the speech recognition text reading aloud generation of described dynamic text and vocal print feature from described wireless traffic terminal.
Wireless traffic terminal shows described dynamic text and points out described user to read aloud described dynamic text after receiving the dynamic text that server issues, and such as when showing described dynamic text, can show following information: " please read aloud following word " simultaneously.Certainly, also can adopt other prompting mode, to this, the embodiment of the present application does not limit.
When user reads aloud described dynamic text, wireless traffic terminal gathers voice and the vocal print feature that user reads aloud described dynamic text, and is speech recognition text by the speech conversion of collection; Then described speech recognition text and vocal print feature are sent to described server.
Described wireless traffic terminal gathers voice and the vocal print feature that user reads aloud described dynamic text, and specifically can be realized by microphone, sound card, described sound card provides following functions: to signal filtering, amplification, sampling maintenance, A/D and D/A conversion etc.
Described is speech recognition text and speech recognition by the speech conversion of collection, refers to that by the vocabulary Content Transformation in voice be computer-readable input, to identify wherein comprised word content.Particularly, can adopt based on channel model and the method for phonic knowledge, the method for template matches and utilize in the method for artificial neural net one or more.The specific implementation process of speech recognition can be same as the prior art, do not repeat them here.
Step 104, judge whether described speech recognition text and described dynamic text match, and whether the vocal print feature that described vocal print feature and described user register matches, and if so, then performs step 105; Otherwise, perform step 106.
The vocal print feature of described user's registration can be the vocal print feature of reading aloud the extraction of pronunciation custom according to user by server of user preset, such as can be undertaken by following process:
User activate the service or registering account time, after submitting Association Identity documentary evidence to, select to open vocal print identity authentication function.Also can in business use procedure, when the susceptible of proof account holder really of submission Association Identity documentary evidence, vocal print identity authentication function is opened in application.
User is by terminal, and the voice call equipment such as such as PC terminal, mobile phone, landline telephone, carry out vocal print registering characteristics.Particularly, user initiates to open voiceprint registration request by terminal to server, after server receives this registration request, application terminal to user sends passage, and read aloud this section of word by the application terminal notifying user that user is current, such as, mobile terminal when user uses PC to apply for, then the screen display held by PC or speaker sound prompting; During as used the application of voice call equipment, then carry out voice message by current speech verbal system, after terminal collection user reads aloud the voice messaging of this section of word, by this transmission of speech information to server, after server receives this voice messaging, extraction user reads aloud the vocal print feature in the voice messaging of this section of word.Wherein, the vocal print feature in voice messaging also can be extracted by terminal, and then by terminal, by the vocal print feature of acquisition, non-voice information is sent to server, and concrete which kind of mode that adopts is determined by client at that time or environmental condition.Server is characterized as this user according to the vocal print in this voice messaging and sets up vocal print payment cipher, i.e. the vocal print feature of above-mentioned described user's registration.
Step 105, determine one's identity authentication success.
After authentication success, described server can allow described user to perform business operation corresponding to this authentication.
Step 106, determine one's identity authentification failure.
After authentication failure, described server can forbid that described user performs business operation corresponding to this authentication.
Further, after authentication failure, described server can also to described wireless traffic terminal return authentication failed message.Correspondingly, described wireless traffic terminal shows this message after receiving described authentification failure message.
And perform after business operation corresponding to this authentication complete user, described server can also return successful operation message to described wireless traffic terminal.Correspondingly, after described wireless traffic terminal receives described operation information, show this message, confirm this business operation success to make user.
The method of the embodiment of the present application wireless traffic authentication, the mode that the identification of employing dynamic voice combines with Application on Voiceprint Recognition is to realize the authentication in wireless traffic, the text read aloud due to user is by server end stochastic generation, even if therefore the vocal print feature of user is stolen, is also difficult to simulation and forges; And the coupling of vocal print feature completes at server end, completely isolated with wireless traffic terminal, and be that the vocal print feature registered with user matches, prevent machine simulation to read aloud, cannot be cracked in wireless traffic terminal.
In actual applications, fail safe can also be improved further by the mode of restriction single authenticated time and number of times.Such as, service end can require that wireless traffic terminal must return information to be certified in 30 seconds after receiving this authentication information, otherwise cancels this Business Processing by certification time-out.And for example, after continuous three authentification failures of user or time-out, this Business Processing of service end immediate cancel, to ensure the fail safe of customer service.
The embodiment of the present application wireless traffic identity identifying method, to hardware requirement and all lower to environmental requirement, can be widely used in multiple wireless traffic terminal, be specially adapted in the wireless traffic needing to carry out authentication, such as wireless payment business etc., fully ensure the fail safe of user account.
As shown in Figure 2, be a kind of flow chart of the embodiment of the present application wireless traffic identity identifying method, comprise the following steps:
Step 201, after wireless traffic terminal receives Client-initiated business operating instructions, sends ID authentication request to server;
Step 202, after described server receives the ID authentication request of wireless traffic terminal transmission, generates dynamic text;
Step 203, described dynamic text is handed down to described wireless traffic terminal by described server;
Step 204, after described wireless traffic terminal receives described dynamic text, shows described dynamic text and points out user to read aloud described dynamic text;
Step 205, described wireless traffic terminal gathers voice and the vocal print feature that user reads aloud described dynamic text, is speech recognition text by the speech conversion of collection;
Step 206, described speech recognition text and vocal print feature are sent to server by described wireless traffic terminal;
Step 207, after described server receives described speech recognition text and vocal print feature, described speech recognition text and vocal print feature is utilized to carry out authentication to described user, if described speech recognition text and described dynamic text match, and the vocal print feature that described vocal print feature and described user register matches, then authentication success; Otherwise authentication failure.
In embodiments of the present invention, after authentication success, described server can allow described user to perform business operation corresponding to this authentication.After authentication failure, described server can forbid that described user performs business operation corresponding to this authentication.
And after authentication failure, described server can also to described wireless traffic terminal return authentication failed message, step 208 as shown in Figure 2.Correspondingly, described wireless traffic terminal can show this message after receiving described authentification failure message.
In addition, perform after business operation corresponding to this authentication complete user, described server can also return successful operation message to described wireless traffic terminal.Correspondingly, after described wireless traffic terminal receives described operation information, show this message, confirm this business operation success to make user.
Correspondingly, in another embodiment of the application, provide a kind of server, as shown in Figure 3, this server 300 comprises:
Request reception unit 301, for receiving the ID authentication request that wireless traffic terminal sends;
Text issues unit 302, for after described request receiving element 201 receives described ID authentication request, generates dynamic text, and described dynamic text is handed down to described wireless traffic terminal;
Information receiving unit 303, for receiving according to user the speech recognition text reading aloud generation of described dynamic text and vocal print feature from described wireless traffic terminal;
Identification authenticating unit 304, for utilizing described speech recognition text and vocal print feature, authentication is carried out to described user, if described speech recognition text and described dynamic text match, and the vocal print feature that described vocal print feature and described user register matches, then determine one's identity authentication success; Otherwise determine one's identity authentification failure.
In another embodiment of the application, described server 300 also can comprise further:
Control unit (not shown), for after described identification authenticating unit 304 determines one's identity authentication success, allows described user to perform business operation corresponding to this authentication; After described identification authenticating unit 304 determines one's identity authentification failure, forbid that described user performs business operation corresponding to this authentication.
In another embodiment of the application, described server 300 also can comprise further: notification unit (not shown), for confirm authentication failure at described identification authenticating unit 304 after, to described wireless traffic terminal return authentication failed message.
Certainly, conveniently whether successfully user understands this operation, and described notification unit, after being also used in business operation success, returns successful operation message to described wireless traffic terminal, confirms this business operation success to make user.
The server of the embodiment of the present application, the mode adopting dynamic voice identification to combine with Application on Voiceprint Recognition realizes authenticating user identification, when user is by the operation of wireless traffic terminal carrying out service, dynamic text is issued to user, then obtain according to user the speech recognition text reading aloud generation of described dynamic text and vocal print feature, described speech recognition text and vocal print feature is utilized to carry out authentication to described user, if described speech recognition text and described dynamic text match, and the vocal print feature that described vocal print feature and described user register matches, then determine one's identity authentication success, otherwise determine one's identity authentification failure.Thus ensure that the reliability of authentication.Further, if authentication failure, server forbids that user performs business operation corresponding to this authentication, and then ensure that the fail safe of wireless traffic.
Correspondingly, in another embodiment of the application, provide a kind of Radio Service system, this system comprises: server and wireless traffic terminal.Wherein:
Described server, for receiving the ID authentication request that described wireless traffic terminal sends, and generates dynamic text, described dynamic text is handed down to described wireless traffic terminal after receiving described ID authentication request; Receive according to user the speech recognition text reading aloud generation of described dynamic text and vocal print feature from described wireless traffic terminal; Described speech recognition text and vocal print feature is utilized to carry out authentication to described user, if described speech recognition text and described dynamic text match, and the vocal print feature that described vocal print feature and described user register matches, then determine one's identity authentication success; Otherwise determine one's identity authentification failure.The concrete structure of described server with reference to the description of preceding embodiment, may not repeat them here.
Described wireless traffic terminal, for after receiving described Client-initiated business operating instructions, send described ID authentication request to described server, and receive the dynamic text of described server transmission, show described dynamic text and point out described user to read aloud described dynamic text; Gather voice and vocal print feature that described user reads aloud described dynamic text; Be speech recognition text by the speech conversion of collection; Described speech recognition text and vocal print feature are sent to described server.
As shown in Figure 4, a kind of structural representation of the wireless traffic terminal in the embodiment of the present application.
In this embodiment, described wireless traffic terminal 400 comprises:
Authentication request unit 401, for after receiving Client-initiated business operating instructions, sends ID authentication request to server;
Receiving element 402, for receiving the dynamic text that described server issues;
Display unit 403, for showing described dynamic text and pointing out described user to read aloud described dynamic text;
Information acquisition unit 404, reads aloud voice and the vocal print feature of described dynamic text for gathering described user;
Converting unit 405, the speech conversion for described information acquisition unit 404 being gathered is speech recognition text;
Transmitting element 406, for sending to described server by described speech recognition text and vocal print feature.
Conveniently user understands this certification whether success, and in the embodiment of the present application, described receiving element 402, also can be further used for receiving the authentification failure message that described server returns; Correspondingly, described display unit 403, is also further used for showing described authentification failure message.
Certainly, described receiving element 402 also can be further used for receiving the successful operation message that described server returns; Correspondingly, described display unit 403 also can be further used for showing described successful operation message.
The wireless traffic terminal of the embodiment of the present application can be to carry with and by the terminal equipment of the wireless mode accessing Internets such as WLAN, GPRS, 3G, such as mobile phone, net book etc.
The Radio Service system of the embodiment of the present application, the mode that the identification of employing dynamic voice combines with Application on Voiceprint Recognition, to realize the authentication in wireless traffic, fully ensures the reliability of authentication, and then ensure that the fail safe of customer service.
For convenience of description, various unit is divided into describe respectively with function when describing above equipment.Certainly, the function of each unit can be realized in same or multiple software and/or hardware when implementing the application.
As seen through the above description of the embodiments, those skilled in the art can be well understood to the mode that the application can add required general hardware platform by software and realizes.Based on such understanding, the technical scheme of the application can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product can be stored in storage medium, as ROM/RAM, magnetic disc, CD etc., comprising some instructions in order to make a computer equipment (can be personal computer, server, or the network equipment etc.) perform the method described in some part of each embodiment of the application or embodiment.
Each embodiment in this specification all adopts the mode of going forward one by one to describe, between each embodiment identical similar part mutually see, what each embodiment stressed is the difference with other embodiments.Especially, for system embodiment, because it is substantially similar to embodiment of the method, so describe fairly simple, relevant part illustrates see the part of embodiment of the method.System embodiment described above is only schematic, the wherein said unit illustrated as separating component or can may not be and physically separates, parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed in multiple network element.Some or all of module wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.Those of ordinary skill in the art, when not paying creative work, are namely appreciated that and implement.
The application can be used in numerous general or special purpose computing system environment or configuration.Such as: personal computer, server computer, handheld device or portable set, laptop device, multicomputer system, system, set top box, programmable consumer-elcetronics devices, network PC, minicom, mainframe computer, the distributed computing environment (DCE) comprising above any system or equipment etc. based on microprocessor.
The application can describe in the general context of computer executable instructions, such as program module.Usually, program module comprises the routine, program, object, assembly, data structure etc. that perform particular task or realize particular abstract data type.Also can put into practice the application in a distributed computing environment, in these distributed computing environment (DCE), be executed the task by the remote processing devices be connected by communication network.In a distributed computing environment, program module can be arranged in the local and remote computer-readable storage medium comprising memory device.
The above is only the embodiment of the application; it should be pointed out that for those skilled in the art, under the prerequisite not departing from the application's principle; can also make some improvements and modifications, these improvements and modifications also should be considered as the protection range of the application.

Claims (8)

1. realize the identity identifying method in wireless traffic, it is characterized in that, comprising:
Server receives wireless traffic terminal and is receiving the ID authentication request sent after user carries out the business operating instructions of business operation initiation by wireless traffic;
Generate the dynamic text for this ID authentication request and described dynamic text is handed down to described wireless traffic terminal, described dynamic text is the random passage produced, for the ID authentication request of different user or the ID authentication request of same user's different time, the dynamic text of generation is identical or different;
Receive according to user the speech recognition text reading aloud generation of described dynamic text and vocal print feature from described wireless traffic terminal;
Described speech recognition text and vocal print feature is utilized to carry out authentication to described user, if described speech recognition text and described dynamic text match, and the vocal print feature that described vocal print feature and described user register matches, then determine one's identity authentication success, and server allows described user to perform business operation corresponding to this authentication; Otherwise determine one's identity authentification failure, server forbids that described user performs business operation corresponding to this authentication.
2. method according to claim 1, is characterized in that, described method also comprises:
If determine one's identity authentification failure, then server is to described wireless traffic terminal return authentication failed message.
3. realize the identity identifying method in wireless traffic, it is characterized in that, comprising:
Wireless traffic terminal receives after user carries out the business operating instructions of business operation initiation by wireless traffic, sends ID authentication request to server;
Described server generates the dynamic text for this ID authentication request, and described dynamic text is handed down to described wireless traffic terminal after receiving the ID authentication request of wireless traffic terminal transmission;
After described wireless traffic terminal receives described dynamic text, show described dynamic text and point out user to read aloud described dynamic text, described dynamic text is the random passage produced, for the ID authentication request of different user or the ID authentication request of same user's different time, the dynamic text of generation is identical or different;
Described wireless traffic terminal gathers voice and the vocal print feature that user reads aloud described dynamic text, is speech recognition text, described speech recognition text and vocal print feature are sent to server by the speech conversion of collection;
After described server receives described speech recognition text and vocal print feature, described speech recognition text and vocal print feature is utilized to carry out authentication to described user, if described speech recognition text and described dynamic text match, and the vocal print feature that described vocal print feature and described user register matches, then authentication success, server allows described user to perform business operation corresponding to this authentication; Otherwise authentication failure, server forbids that described user performs business operation corresponding to this authentication.
4. method according to claim 3, is characterized in that, described method also comprises:
If authentication failure, then described server is to wireless traffic terminal return authentication failed message;
After described wireless traffic terminal receives described authentification failure message, show described authentification failure message.
5. a server, is characterized in that, comprising:
Request reception unit, is receiving for receiving wireless traffic terminal the ID authentication request sent after user carries out the business operating instructions of business operation initiation by wireless traffic;
Text issues unit, for after described request receiving element receives described ID authentication request, generate the dynamic text for this ID authentication request, and described dynamic text is handed down to described wireless traffic terminal, described dynamic text is the random passage produced, for the ID authentication request of different user or the ID authentication request of same user's different time, the dynamic text of generation is identical or different;
Information receiving unit, for receiving according to user the speech recognition text reading aloud generation of described dynamic text and vocal print feature from described wireless traffic terminal;
Identification authenticating unit, for utilizing described speech recognition text and vocal print feature, authentication is carried out to described user, if described speech recognition text and described dynamic text match, and the vocal print feature that described vocal print feature and described user register matches, then determine one's identity authentication success; Otherwise determine one's identity authentification failure;
Described server also comprises:
Control unit, for after described identification authenticating unit determines one's identity authentication success, allows described user to perform business operation corresponding to this authentication; After the authentification failure that determines one's identity, forbid that described user performs business operation corresponding to this authentication.
6. server according to claim 5, is characterized in that, described server also comprises:
Notification unit, after confirming authentication failure at described identification authenticating unit, to described wireless traffic terminal return authentication failed message.
7. a Radio Service system, is characterized in that, comprising: server and wireless traffic terminal;
Described service terminal comprises:
Authentication request unit, for after receiving user and being carried out the business operating instructions of business operation initiation by wireless traffic, sends ID authentication request to server;
Receiving element, for receiving the dynamic text for this ID authentication request that described server issues, described dynamic text is the random passage produced, for the ID authentication request of different user or the ID authentication request of same user's different time, the dynamic text of generation is identical or different;
Display unit, for showing described dynamic text and pointing out described user to read aloud described dynamic text;
Information acquisition unit, reads aloud voice and the vocal print feature of described dynamic text for gathering described user;
Converting unit, the speech conversion for described information acquisition unit being gathered is speech recognition text;
Transmitting element, for sending to described server by described speech recognition text and vocal print feature;
Described server comprises:
Request reception unit, for receiving the ID authentication request that described wireless traffic terminal sends;
Text issues unit, for after described request receiving element receives described ID authentication request, generates dynamic text, and described dynamic text is handed down to described wireless traffic terminal;
Information receiving unit, for receiving described speech recognition text and vocal print feature from described wireless traffic terminal;
Identification authenticating unit, for utilizing described speech recognition text and vocal print feature, authentication is carried out to described user, if described speech recognition text and described dynamic text match, and the vocal print feature that described vocal print feature and described user register matches, then determine one's identity authentication success; Otherwise determine one's identity authentification failure;
Described server also comprises:
Control unit, for after described identification authenticating unit determines one's identity authentication success, allows described user to perform business operation corresponding to this authentication; After the authentification failure that determines one's identity, forbid that described user performs business operation corresponding to this authentication.
8. Radio Service system according to claim 7, is characterized in that,
Described server also comprises: notification unit, after confirming authentication failure at described identification authenticating unit, to described wireless traffic terminal return authentication failed message;
Described receiving element, also for receiving described authentification failure message;
Described display unit, also for showing described authentification failure message.
CN201010512593.1A 2010-10-14 2010-10-14 Wireless traffic identity identifying method, equipment and system Active CN102457845B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201610157889.3A CN105873050A (en) 2010-10-14 2010-10-14 Wireless service identity authentication, server and system
CN201010512593.1A CN102457845B (en) 2010-10-14 2010-10-14 Wireless traffic identity identifying method, equipment and system
HK12106884.2A HK1166214A1 (en) 2010-10-14 2012-07-12 Method, device and system for identity authentication of radio service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010512593.1A CN102457845B (en) 2010-10-14 2010-10-14 Wireless traffic identity identifying method, equipment and system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201610157889.3A Division CN105873050A (en) 2010-10-14 2010-10-14 Wireless service identity authentication, server and system

Publications (2)

Publication Number Publication Date
CN102457845A CN102457845A (en) 2012-05-16
CN102457845B true CN102457845B (en) 2016-04-13

Family

ID=46040399

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201610157889.3A Pending CN105873050A (en) 2010-10-14 2010-10-14 Wireless service identity authentication, server and system
CN201010512593.1A Active CN102457845B (en) 2010-10-14 2010-10-14 Wireless traffic identity identifying method, equipment and system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201610157889.3A Pending CN105873050A (en) 2010-10-14 2010-10-14 Wireless service identity authentication, server and system

Country Status (2)

Country Link
CN (2) CN105873050A (en)
HK (1) HK1166214A1 (en)

Families Citing this family (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8903360B2 (en) * 2012-05-17 2014-12-02 International Business Machines Corporation Mobile device validation
CN102984152A (en) * 2012-11-27 2013-03-20 江苏乐买到网络科技有限公司 Password authentication method based on online shopping
CN103118002A (en) * 2012-12-21 2013-05-22 北京飞漫软件技术有限公司 Method of speech sound used as secret key to achieve data resource cloud storage management
CN103903622A (en) * 2012-12-28 2014-07-02 腾讯科技(深圳)有限公司 Voice verification method, apparatus and system
CN104104664A (en) * 2013-04-11 2014-10-15 腾讯科技(深圳)有限公司 Method, server, client and system for verifying verification code
CN104217149B (en) * 2013-05-31 2017-05-24 国际商业机器公司 Biometric authentication method and equipment based on voice
CN104348621A (en) * 2013-08-02 2015-02-11 成都林海电子有限责任公司 Authentication system based on voiceprint recognition and method thereof
CN105096954A (en) * 2014-05-06 2015-11-25 中兴通讯股份有限公司 Identity identifying method and device
CN103986711B (en) * 2014-05-16 2017-09-19 天地融科技股份有限公司 A kind of data processing method of voice call
CN105321514A (en) * 2014-05-28 2016-02-10 西安中兴新软件有限责任公司 Alarm method and terminal
CN105224844B (en) * 2014-07-01 2020-01-24 腾讯科技(深圳)有限公司 Verification method, system and device
WO2016015687A1 (en) 2014-07-31 2016-02-04 腾讯科技(深圳)有限公司 Voiceprint verification method and device
CN104168270B (en) * 2014-07-31 2016-01-13 腾讯科技(深圳)有限公司 Auth method, server, client and system
CN104184587B (en) * 2014-08-08 2016-04-20 腾讯科技(深圳)有限公司 Vocal print generation method, server, client and system
CN104392353A (en) * 2014-10-08 2015-03-04 无锡指网生物识别科技有限公司 Payment method and system of voice recognition terminal
CN105991605A (en) * 2015-02-27 2016-10-05 中兴通讯股份有限公司 WIFI connection verification method, WIFI hot spot device and terminal
CN104869497B (en) * 2015-03-24 2018-12-11 广东欧珀移动通信有限公司 A kind of the wireless network setting method and device of WIFI speaker
CN106302339A (en) * 2015-05-25 2017-01-04 腾讯科技(深圳)有限公司 Login validation method and device, login method and device
CN105933272A (en) * 2015-12-30 2016-09-07 中国银联股份有限公司 Voiceprint recognition method capable of preventing recording attack, server, terminal, and system
CN107221333B (en) * 2016-03-21 2019-11-08 中兴通讯股份有限公司 A kind of identity authentication method and device
CN107526951A (en) * 2016-06-21 2017-12-29 深圳市中兴微电子技术有限公司 A kind of method for sending information and device
CN106098069B (en) * 2016-06-21 2019-12-20 佛山科学技术学院 Identity authentication method and terminal equipment
CN106485499A (en) * 2016-10-24 2017-03-08 安徽百慕文化科技有限公司 One kind is based on voice-operated on-line payment system
CN106531154A (en) * 2016-11-15 2017-03-22 传世未来(北京)信息科技有限公司 Authentication method and device
CN106789957A (en) * 2016-11-30 2017-05-31 无锡小天鹅股份有限公司 The voice login method and its smart machine of laundry applications
WO2018126338A1 (en) * 2017-01-03 2018-07-12 Nokia Technologies Oy Apparatus, method and computer program product for authentication
KR102640423B1 (en) * 2017-01-31 2024-02-26 삼성전자주식회사 Voice input processing method, electronic device and system supporting the same
CN106961418A (en) * 2017-02-08 2017-07-18 北京捷通华声科技股份有限公司 Identity identifying method and identity authorization system
CN107046483A (en) * 2017-05-11 2017-08-15 广东美的制冷设备有限公司 The collocation method of wireless network, device and system
CN112802459B (en) * 2017-05-23 2024-06-18 创新先进技术有限公司 Consultation service processing method and device based on voice recognition
CN107221331A (en) * 2017-06-05 2017-09-29 深圳市讯联智付网络有限公司 A kind of personal identification method and equipment based on vocal print
CN107342079A (en) * 2017-07-05 2017-11-10 谌勋 A kind of acquisition system of the true voice based on internet
CN110349585B (en) * 2018-04-04 2023-05-05 富士通株式会社 Voice authentication method and information processing apparatus
CN109192213B (en) * 2018-08-21 2023-10-20 平安科技(深圳)有限公司 Method and device for real-time transcription of court trial voice, computer equipment and storage medium
CN109325771A (en) * 2018-09-20 2019-02-12 北京得意音通技术有限责任公司 Auth method, device, computer program, storage medium and electronic equipment
CN110675880B (en) * 2019-10-21 2021-01-05 北京声智科技有限公司 Identity verification method and device and electronic equipment
CN111883140B (en) * 2020-07-24 2023-07-21 中国平安人寿保险股份有限公司 Authentication method, device, equipment and medium based on knowledge graph and voiceprint recognition
CN112751838A (en) * 2020-12-25 2021-05-04 中国人民解放军陆军装甲兵学院 Identity authentication method, device and system
CN113378134A (en) * 2021-06-08 2021-09-10 国科政信科技(北京)股份有限公司 Identity authentication method and device
CN113989998A (en) * 2021-11-05 2022-01-28 中国工商银行股份有限公司 Voice recognition payment method, apparatus, device, medium, and program product
CN114285614A (en) * 2021-12-16 2022-04-05 北京安捷金科信息技术有限公司 Identity authentication method, identity authentication system and readable storage medium
CN115565539B (en) * 2022-11-21 2023-02-07 中网道科技集团股份有限公司 Data processing method for realizing self-help correction terminal anti-counterfeiting identity verification

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1877697A (en) * 2006-07-25 2006-12-13 北京理工大学 Method for identifying speaker based on distributed structure
CN101437227A (en) * 2007-11-16 2009-05-20 中国移动通信集团公司 Application access control system and method
CN101494540A (en) * 2009-03-04 2009-07-29 北京英立讯科技有限公司 Remote voice identification authentication system and method
CN101685635A (en) * 2008-09-23 2010-03-31 吕共欣 Identity authentication system and method

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7254383B2 (en) * 2004-07-30 2007-08-07 At&T Knowledge Ventures, L.P. Voice over IP based biometric authentication
US7536304B2 (en) * 2005-05-27 2009-05-19 Porticus, Inc. Method and system for bio-metric voice print authentication
CN1905445B (en) * 2005-07-27 2012-02-15 国际商业机器公司 System and method of speech identification using mobile speech identification card
CN101311953A (en) * 2007-05-25 2008-11-26 上海电虹软件有限公司 Network payment method and system based on voiceprint authentication
CN101231737B (en) * 2008-02-25 2014-06-04 飞天诚信科技股份有限公司 Method and system for enhancing internet bank trade security
CN101635743B (en) * 2009-04-02 2014-11-26 杭州亚泽信息科技有限公司 System and method using biologic characteristic certification result to validate identity of mobile terminal holder

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1877697A (en) * 2006-07-25 2006-12-13 北京理工大学 Method for identifying speaker based on distributed structure
CN101437227A (en) * 2007-11-16 2009-05-20 中国移动通信集团公司 Application access control system and method
CN101685635A (en) * 2008-09-23 2010-03-31 吕共欣 Identity authentication system and method
CN101494540A (en) * 2009-03-04 2009-07-29 北京英立讯科技有限公司 Remote voice identification authentication system and method

Also Published As

Publication number Publication date
CN102457845A (en) 2012-05-16
HK1166214A1 (en) 2012-10-19
CN105873050A (en) 2016-08-17

Similar Documents

Publication Publication Date Title
CN102457845B (en) Wireless traffic identity identifying method, equipment and system
CN102523213B (en) Server and terminal authenticating method and server and terminal
CN106487511A (en) Identity identifying method and device
CN105512535A (en) User authentication method and user authentication device
CN103986725A (en) Client side, server side and identity authentication system and method
CN104104664A (en) Method, server, client and system for verifying verification code
CN103477604A (en) Continuous voice authentication for a mobile device
CN104683302A (en) Authentication method, authentication device, terminal equipment, authentication server and system
CN104158664A (en) Identity authentication method and system
CN103780620B (en) Network security method and network security system
CN110087241B (en) Service authorization method, device and system
CN104253818B (en) Server, terminal authentication method and server, terminal
EP3386165B1 (en) Method and device for implementing and managing secure communications, provisioning systems, authentication and signing systems
CN107919961A (en) Identity authentication protocol and server based on dynamic code and dynamic voiceprint update
CN110599190B (en) Identity authentication method and device based on block chain
CN107995200A (en) A kind of certificate issuance method, identity identifying method and system based on smart card
CN103024706A (en) Short message based device and short message based method for bidirectional multiple-factor dynamic identity authentication
CN107113613A (en) Server, mobile terminal, real-name network authentication system and method
CN107886320A (en) It is a kind of to handle the method, equipment and computer-readable storage medium for tying up card
CN106357411A (en) Identity verification method and device
CN105847292B (en) A kind of cloud method for authenticating, apparatus and system based on NFC-HCE
CN104734750B (en) Shield and its method of work, Mobile terminal signature method, mobile terminal and system
CN103200325A (en) Peripheral device for mobile terminal and communication method for mobile terminal and peripheral device
CN202026326U (en) Digital signature device
CN104935548A (en) Identity verification method, device and system based on intelligent tattooing equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1166214

Country of ref document: HK

C14 Grant of patent or utility model
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: GR

Ref document number: 1166214

Country of ref document: HK

TR01 Transfer of patent right

Effective date of registration: 20211011

Address after: Third floor, No. 665, Zhangjiang Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai

Patentee after: Shanghai Lingxi Interactive Entertainment Co.,Ltd.

Address before: Cayman Islands Grand Cayman capital building, a four storey No. 847 mailbox

Patentee before: ALIBABA GROUP HOLDING Ltd.

TR01 Transfer of patent right