CN103297242A - Identity authentication method, device and system and voice server - Google Patents
Identity authentication method, device and system and voice server Download PDFInfo
- Publication number
- CN103297242A CN103297242A CN2013102320688A CN201310232068A CN103297242A CN 103297242 A CN103297242 A CN 103297242A CN 2013102320688 A CN2013102320688 A CN 2013102320688A CN 201310232068 A CN201310232068 A CN 201310232068A CN 103297242 A CN103297242 A CN 103297242A
- Authority
- CN
- China
- Prior art keywords
- voice
- information
- identity authentication
- module
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 56
- 238000010586 diagram Methods 0.000 description 6
- 238000005336 cracking Methods 0.000 description 2
- 230000009977 dual effect Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The invention discloses an identity authentication method, device and system and a voice server and relates to the communication field. The identity authentication method, device and system and the voice server are invented for solving the problem that users cannot perform using conveniently in the prior art. The identity authentication method includes: obtaining two-dimensional codes provided by users, analyzing the two-dimensional codes and obtaining authentication information; coding the authentication information into voice information according to preset voice coding rules; transmitting the voice information to the voice server to which talking connection is pre-built, and enabling the voice server to perform identity authentication according to the authentication information obtained by analyzing the voice information after receiving the voice information. The identity authentication method, device and system and the voice server can be applied to mobile terminals like cellphones.
Description
Technical Field
The present invention relates to the field of communications, and in particular, to an identity authentication method, apparatus, and system, and a voice server.
Background
With the popularization of public service hotlines and business service phones, the services provided by voice phones are more and more extensive. At present, services such as self-service payment and self-service inquiry can be carried out by using a voice telephone. When the user uses the self-service, the user often needs to manually input authentication information such as an identification number, a card number, a policy number, a password and the like so as to be convenient for the voice telephone system to authenticate.
In the process of implementing the identity authentication, the inventor finds that at least the following problems exist in the prior art: because the user needs to manually input the authentication information in the identity authentication process, the input error is easy, and the use by the user is inconvenient.
Disclosure of Invention
The embodiment of the invention provides an identity authentication method, an identity authentication device, an identity authentication system and a voice server, which are convenient for users to use.
In order to achieve the above purpose, the embodiment of the invention adopts the following technical scheme:
an identity authentication method comprising: acquiring a two-dimensional code provided by a user; analyzing the two-dimensional code to obtain authentication information; according to a preset voice coding rule, coding the authentication information into voice information; and sending the voice information to a voice server which establishes a call connection in advance, so that the voice server receives the voice information and then carries out identity authentication according to authentication information obtained by analyzing the voice information.
An identity authentication method comprising: receiving voice information sent by an identity authentication device with a pre-established call connection, wherein the voice information is obtained by encoding a two-dimensional code provided by a user by the identity authentication device according to a preset voice encoding rule; decoding the sound information into authentication information according to a sound decoding rule corresponding to the sound coding rule; and performing identity authentication according to the authentication information.
An identity authentication apparatus comprising:
the two-dimensional code acquisition module is used for acquiring a two-dimensional code provided by a user;
the analysis module is connected with the two-dimension code acquisition module and is used for analyzing the two-dimension code acquired by the two-dimension code acquisition module to obtain authentication information;
the voice coding module is connected with the analysis module and used for coding the authentication information obtained by the analysis module into voice information according to a preset voice coding rule;
and the voice sending module is connected with the voice coding module and used for sending the voice information obtained by the voice coding module to a voice server which establishes call connection in advance, so that the voice server receives the voice information and then carries out identity authentication according to authentication information obtained by analyzing the voice information.
A voice server, comprising:
the voice receiving module is used for receiving voice information sent by an identity authentication device with a pre-established call connection, wherein the voice information is obtained by encoding a two-dimensional code provided by a user by the identity authentication device according to a preset voice encoding rule;
the decoding module is connected with the sound receiving module and is used for decoding the sound information received by the sound receiving module into authentication information according to a sound decoding rule corresponding to the sound coding rule;
and the authentication module is connected with the decoding module and used for carrying out identity authentication according to the authentication information obtained by the decoding module.
An identity authentication system comprising:
the identity authentication device is used for acquiring the two-dimensional code provided by the user; analyzing the two-dimensional code to obtain authentication information; according to a preset voice coding rule, coding the authentication information into voice information; sending the sound information to a voice server which establishes conversation connection in advance;
the voice server is connected with the identity authentication device and used for receiving the voice information sent by the identity authentication device through the call connection; decoding the voice information into corresponding authentication information according to a decoding rule corresponding to the voice coding rule; and performing identity authentication according to the authentication information.
According to the identity authentication method, the identity authentication device and the identity authentication system and the voice server, the user terminal encodes the two-dimensional code provided by the user into the voice information and then sends the voice information through the call connection, so that the voice server can perform authentication according to the voice information sent by the user terminal, and identity authentication is achieved. Because the authentication can be realized only by providing the two-dimensional code by the user in the identity authentication process, the technical scheme provided by the embodiment of the invention solves the problems that the authentication information is input manually by the user in the identity authentication process, the input is easy to be wrong, and the user is inconvenient to use in the prior art.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of an identity authentication method according to an embodiment of the present invention;
fig. 2 is a flowchart of an identity authentication method according to a second embodiment of the present invention;
fig. 3 is a flowchart of an identity authentication method according to a third embodiment of the present invention;
fig. 4 is a first schematic structural diagram of an identity authentication apparatus according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of an identity authentication apparatus according to a fourth embodiment of the present invention;
fig. 6 is a first schematic structural diagram of a two-dimensional code obtaining module in the identity authentication apparatus shown in fig. 4;
fig. 7 is a schematic structural diagram of a two-dimensional code obtaining module in the identity authentication apparatus shown in fig. 4;
fig. 8 is a schematic structural diagram of a voice server according to a fifth embodiment of the present invention;
fig. 9 is a schematic structural diagram of an identity authentication system according to a sixth embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to solve the problem that the existing identity authentication process needs a user to manually input authentication information and is inconvenient for the user to use, the embodiment of the invention provides an identity authentication method, an identity authentication device, an identity authentication system and a voice server.
The first embodiment is as follows:
as shown in fig. 1, an embodiment of the present invention provides an identity authentication method, including:
In this embodiment, the mobile terminal may obtain a two-dimensional code provided by a user from a file such as a pre-stored picture; the two-dimensional code provided by the user can also be obtained by scanning an external display device such as a computer display screen or an identity authentication card such as a membership card and a rechargeable card. The two-dimensional code displayed on the external display device may be generated by pre-encoding authentication information such as an identification number, a bank card number, a password and the like input by a user.
And 102, analyzing the two-dimensional code to obtain authentication information.
In this embodiment, the process of analyzing the two-dimensional code in step 102 may only include decoding the two-dimensional code to obtain the authentication information; in order to improve the security, the two-dimensional code provided by the user may be an encrypted two-dimensional code, and the process of analyzing the two-dimensional code at this time may include: firstly, decoding the two-dimensional code to obtain a decoding result; and then, decrypting the decoding result to obtain the authentication information.
In this embodiment, the preset voice coding rule in step 103 may be Dual Tone Multi Frequency (DTMF); at this time, the authentication information (authentication information such as identification number, card number, policy number, password) needs to conform to the DTMF coding rule, i.e. the authentication information only includes 0-9, A, B, C, D, # and #.
The preset voice coding rule can also be a character and high-frequency and low-frequency coding table; in this case, the authentication information (authentication information such as an identification number, a card number, a policy number, and a password) may be included in the character. Wherein the characters and the characters in the high frequency and low frequency encoding tables can be set according to the requirement, such as one or more of A-Z and/or one or more of a-Z and/or & ()? One or more of the symbols, and/or one or more of 0-9, may also be set to other characters, and is not limited herein.
In this embodiment, when the preset voice coding rule is a character, a high-frequency coding table and a low-frequency coding table, the selection range of the authentication information such as the password can be expanded, and the difficulty of illegal cracking and the safety coefficient of the authentication information can be improved.
And 104, sending the voice information to a voice server which establishes a call connection in advance, so that the voice server performs identity authentication according to authentication information obtained by analyzing the voice information after receiving the voice information.
In this embodiment, before step 101, a call connection may be established with the voice server, and the connection may be established in a manner that: the user dials the voice service telephone and establishes a call connection with the voice server. And call connection can also be established with the voice server in other ways, which is not described in detail herein. After the call connection is established, the two-dimensional code can be directly obtained through the step 101; or selecting services such as query and recharge according to a voice prompt played by the voice server, and when the voice server sends an input prompt of authentication information such as an identification number, a card number, a policy number, a password and the like according to the service selected by the user, the user can control the mobile terminal to obtain the two-dimensional code provided by the user through the step 101.
In this embodiment, after receiving the voice message, the voice server may sequentially extract the high frequency and the low frequency from the voice message, and then determine the characters corresponding to the high frequency and the low frequency according to a preset DTMF table or according to the characters and the high frequency and low frequency encoding tables, so as to obtain the authentication information.
According to the identity authentication method provided by the embodiment of the invention, the user terminal encodes the two-dimensional code provided by the user into the sound information and then sends the sound information through the call connection, so that the voice server can perform authentication according to the sound information sent by the user terminal, and identity authentication is realized. Because the authentication can be realized only by providing the two-dimensional code by the user in the identity authentication process, the technical scheme provided by the embodiment of the invention solves the problems that the authentication information is input manually by the user in the identity authentication process, the input is easy to be wrong, and the user is inconvenient to use in the prior art.
Example two:
as shown in fig. 2, an embodiment of the present invention provides an identity authentication method, including:
In this embodiment, the user may input authentication information such as an identification number, a bank card number, and a password, which are commonly used for telephone authentication, into the mobile terminal in advance, so that the mobile terminal may obtain at least one authentication information input by the user through step 201.
And 203, respectively storing the two-dimension codes and generating at least one storage file.
In this embodiment, after the mobile terminal encodes at least one piece of authentication information into a two-dimensional code, the two-dimensional code may be stored in a format such as BMP, GIF, JPEG, or the like, or may be stored in a form of another file, which is not limited herein.
And step 205, acquiring a corresponding two-dimensional code according to the target file.
In this implementation, the corresponding two-dimensional code is obtained according to the target file, and the target file may be divided and positioned to obtain the corresponding two-dimensional code; the corresponding two-dimensional code can also be obtained in other manners, which is not described in detail herein.
And step 206 to step 208, the authentication information corresponding to the two-dimensional code is encoded into sound information and then sent to the voice server, so that the voice server performs identity authentication according to the sound information. The above process is similar to steps 102 to 104 shown in fig. 1, and is not repeated here.
According to the identity authentication method provided by the embodiment of the invention, the user terminal encodes the two-dimensional code provided by the user into the sound information and then sends the sound information through the call connection, so that the voice server can perform authentication according to the sound information sent by the user terminal, and identity authentication is realized. Because the authentication can be realized only by providing the two-dimensional code by the user in the identity authentication process, the technical scheme provided by the embodiment of the invention solves the problems that the authentication information is input manually by the user in the identity authentication process, the input is easy to be wrong, and the user is inconvenient to use in the prior art.
Example three:
as shown in fig. 3, the identity authentication method provided in the embodiment of the present invention includes:
In this embodiment, the voice information in step 301 is obtained by the identity authentication apparatus encoding the two-dimensional code provided by the user according to a preset voice encoding rule. The process may include: the identity authentication device analyzes the two-dimensional code provided by the user to obtain authentication information; and coding the authentication information into voice information according to a preset voice coding rule. The preset voice coding rule may be Dual Tone Multi Frequency (DTMF); at this time, the authentication information (authentication information such as identification number, card number, policy number, password) needs to conform to the DTMF coding rule, i.e. the authentication information only includes 0-9, A, B, C, D, # and #.
The preset voice coding rule can also be a character and high-frequency and low-frequency coding table; in this case, the authentication information (authentication information such as an identification number, a card number, a policy number, and a password) may be included in the character. Wherein the characters and the characters in the high frequency and low frequency encoding tables can be set according to the requirement, such as one or more of A-Z and/or one or more of a-Z and/or & ()? One or more of the symbols, and/or one or more of 0-9, may also be set to other characters, and is not limited herein.
In this embodiment, when the preset voice coding rule is a character, a high-frequency coding table and a low-frequency coding table, the selection range of the authentication information such as the password can be expanded, and the difficulty of illegal cracking and the safety coefficient of the authentication information can be improved.
According to the identity authentication method provided by the embodiment of the invention, the voice server can perform authentication according to the voice information sent by the identity authentication device, so that identity authentication is realized. Because the user only needs to provide the two-dimensional code in the identity authentication process, the technical scheme provided by the embodiment of the invention solves the problems that the user needs to manually input authentication information in the identity authentication process, so that the user is easy to input errors and inconvenient to use in the prior art.
Example four:
as shown in fig. 4, an embodiment of the present invention provides an identity authentication apparatus, including:
the two-dimensional code acquisition module 401 is used for acquiring a two-dimensional code provided by a user;
the analysis module 402 is connected with the two-dimension code acquisition module and is used for analyzing the two-dimension code acquired by the two-dimension code acquisition module to obtain authentication information;
the voice coding module 403 is connected to the parsing module, and is configured to code the authentication information obtained by the parsing module into voice information according to a preset voice coding rule;
and the voice sending module 404 is connected to the voice encoding module, and is configured to send the voice information obtained by the voice encoding module to a voice server that establishes a call connection in advance, so that after receiving the voice information, the voice server performs identity authentication according to authentication information obtained by analyzing the voice information.
In this embodiment, the process of implementing identity authentication from the two-dimensional code obtaining module 401 to the sound sending module 404 is similar to the process provided in the first embodiment of the present invention, and is not described in detail here.
Further, as shown in fig. 5, the identity authentication apparatus provided in this embodiment may further include:
an information obtaining module 405, configured to obtain at least one piece of authentication information input by a user;
the two-dimension code encoding module 406 is connected with the information acquisition module and is used for respectively encoding at least one piece of authentication information acquired by the information acquisition module into a two-dimension code according to a preset two-dimension code encoding rule;
and the storage module 407 is connected with the two-dimension code encoding module and is used for respectively storing the two-dimension codes obtained by the two-dimension code encoding module and generating at least one storage file.
In this embodiment, the process of encoding the authentication information by the information obtaining module 405, the two-dimensional code encoding module 406, and the storage module 407 is similar to steps 201 to 203 in the second embodiment of the present invention, and is not repeated here.
At this time, as shown in fig. 6, the two-dimensional code obtaining module 401 in the identity authentication apparatus may include:
the file acquisition submodule 4011 is configured to receive a target file selected by a user from at least one stored file;
the two-dimensional code obtaining sub-module 4012 is connected to the file obtaining sub-module, and is configured to obtain a corresponding two-dimensional code according to the target file obtained by the file obtaining sub-module.
Further, as shown in fig. 7, the two-dimensional code obtaining module 401 in this embodiment may also include:
the scanning sub-module 4013 is configured to scan an external display device or an identity authentication card to obtain a two-dimensional code provided by a user.
Further, the encoding module 403 in this embodiment may include: a DTMF coding sub-module or a high-low frequency coding sub-module;
the DTMF coding sub-module is used for coding the authentication information into voice information according to the dual-tone multi-frequency DTMF;
and the high-low frequency coding sub-module is used for coding the authentication information into sound information according to preset characters and a high-frequency and low-frequency coding table in sequence.
In this embodiment, when the DTMF submodule is used for encoding, the authentication information (authentication information such as identification number, card number, policy number, password, etc.) needs to conform to the DTMF encoding rule, that is, the authentication information only includes 0-9, A, B, C, D, # and a #.
When encoding is performed using the high-frequency and low-frequency encoding sub-module, the authentication information (authentication information such as an identification number, a card number, a policy number, and a password) may be included in the characters. Wherein the characters and the characters in the high frequency and low frequency encoding tables can be set according to the requirement, such as one or more of A-Z and/or one or more of a-Z and/or & ()? One or more of the symbols, and/or one or more of 0-9, may also be set to other characters, and is not limited herein.
The identity authentication device provided by the embodiment of the invention codes the two-dimensional code provided by the user into the sound information and then sends the sound information through the call connection, so that the voice server can perform authentication according to the sound information sent by the user terminal, and identity authentication is realized. Because the authentication can be realized only by providing the two-dimensional code by the user in the identity authentication process, the technical scheme provided by the embodiment of the invention solves the problems that the authentication information is input manually by the user in the identity authentication process, the input is easy to be wrong, and the user is inconvenient to use in the prior art.
Example five:
as shown in fig. 8, a voice server provided in an embodiment of the present invention includes:
the voice receiving module 801 is configured to receive voice information sent by an identity authentication device with which a call connection is established in advance, where the voice information is obtained by encoding a two-dimensional code provided by a user by the identity authentication device according to a preset voice encoding rule;
the decoding module 802 is connected to the sound receiving module, and is configured to decode the sound information received by the sound receiving module into the authentication information according to the sound decoding rule corresponding to the sound encoding rule;
and the authentication module 803 is connected to the decoding module and is configured to perform identity authentication according to the authentication information obtained by the decoding module.
In this embodiment, the process of implementing identity authentication through the sound receiving module 801, the decoding module 802 and the authentication module 803 is similar to that provided in the third embodiment of the present invention, and is not described in detail herein.
According to the voice server provided by the embodiment of the invention, the voice server can carry out authentication according to the voice information sent by the identity authentication device, so that identity authentication is realized. Because the user only needs to provide the two-dimensional code in the identity authentication process, the technical scheme provided by the embodiment of the invention solves the problems that the user needs to manually input authentication information in the identity authentication process, so that the user is easy to input errors and inconvenient to use in the prior art.
Example six:
as shown in fig. 9, an identity authentication system provided in an embodiment of the present invention includes:
an identity authentication device 901, configured to obtain a two-dimensional code provided by a user; analyzing the two-dimensional code to obtain authentication information; according to a preset voice coding rule, coding the authentication information into voice information; sending voice information to a voice server which establishes conversation connection in advance;
a voice server 902 connected to the identity authentication apparatus for receiving the voice information sent by the identity authentication apparatus through the call connection; decoding the voice information into corresponding authentication information according to a decoding rule corresponding to the voice coding rule; and performing identity authentication according to the authentication information.
In this embodiment, the process of implementing identity authentication through the identity authentication apparatus 901 and the voice server 902 is similar to that provided in the fourth and fifth embodiments of the present invention, and is not described in detail herein.
According to the identity authentication system provided by the embodiment of the invention, the identity authentication device encodes the two-dimensional code provided by the user into the sound information and then sends the sound information through the call connection, so that the voice server can perform authentication according to the sound information sent by the user terminal, and identity authentication is realized. Because the authentication can be realized only by providing the two-dimensional code by the user in the identity authentication process, the technical scheme provided by the embodiment of the invention solves the problems that the authentication information is input manually by the user in the identity authentication process, the input is easy to be wrong, and the user is inconvenient to use in the prior art.
The identity authentication method, the identity authentication device, the identity authentication system and the voice server provided by the embodiment of the invention can be applied to mobile terminals such as mobile phones.
Through the above description of the embodiments, those skilled in the art will clearly understand that the present invention may be implemented by software plus necessary general hardware, and certainly may also be implemented by hardware, but in many cases, the former is a better embodiment. Based on such understanding, the technical solutions of the present invention may be substantially implemented or a part of the technical solutions contributing to the prior art may be embodied in the form of a software product, which is stored in a readable storage medium, such as a floppy disk, a hard disk, or an optical disk of a computer, and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute the methods according to the embodiments of the present invention.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.
Claims (13)
1. An identity authentication method, comprising:
acquiring a two-dimensional code provided by a user;
analyzing the two-dimensional code to obtain authentication information;
according to a preset voice coding rule, coding the authentication information into voice information;
and sending the voice information to a voice server which establishes a call connection in advance, so that the voice server receives the voice information and then carries out identity authentication according to authentication information obtained by analyzing the voice information.
2. The identity authentication method of claim 1, wherein before the obtaining the two-dimensional code provided by the user, the method further comprises:
acquiring at least one piece of authentication information input by a user;
respectively encoding the at least one authentication information into two-dimensional codes according to a preset two-dimensional code encoding rule;
and respectively storing the two-dimension codes and generating at least one storage file.
3. The identity authentication method of claim 2, wherein the obtaining of the two-dimensional code provided by the user comprises:
receiving a target file selected by a user from the at least one storage file;
and acquiring a corresponding two-dimensional code according to the target file.
4. The identity authentication method of claim 1, wherein the obtaining of the two-dimensional code provided by the user by the mobile terminal comprises:
and scanning an external display device or an identity authentication card to obtain the two-dimensional code provided by the user.
5. The identity authentication method according to claim 1, wherein the encoding the authentication information into voice information according to a preset voice encoding rule comprises:
according to the DTMF, the authentication information is encoded into voice information; or,
and coding the authentication information into voice information according to a preset character, a high-frequency coding table and a low-frequency coding table in sequence.
6. An identity authentication method, comprising:
receiving voice information sent by an identity authentication device with a pre-established call connection, wherein the voice information is obtained by encoding a two-dimensional code provided by a user by the identity authentication device according to a preset voice encoding rule;
decoding the sound information into authentication information according to a decoding rule corresponding to the sound coding rule;
and performing identity authentication according to the authentication information.
7. An identity authentication apparatus, comprising:
the two-dimensional code acquisition module is used for acquiring a two-dimensional code provided by a user;
the analysis module is connected with the two-dimension code acquisition module and is used for analyzing the two-dimension code acquired by the two-dimension code acquisition module to obtain authentication information;
the voice coding module is connected with the analysis module and used for coding the authentication information obtained by the analysis module into voice information according to a preset voice coding rule;
and the voice sending module is connected with the voice coding module and used for sending the voice information obtained by the voice coding module to a voice server which establishes call connection in advance, so that the voice server receives the voice information and then carries out identity authentication according to authentication information obtained by analyzing the voice information.
8. The identity authentication device of claim 7, further comprising:
the information acquisition module is used for acquiring at least one piece of authentication information input by a user;
the two-dimension code encoding module is connected with the information acquisition module and is used for respectively encoding at least one authentication information acquired by the information acquisition module into a two-dimension code according to a preset two-dimension code encoding rule;
and the storage module is connected with the two-dimension code coding module and is used for respectively storing the two-dimension codes obtained by the two-dimension code coding module and generating at least one storage file.
9. The identity authentication device of claim 8, wherein the two-dimensional code acquisition module comprises:
the file acquisition submodule is used for receiving a target file selected by a user from the at least one storage file;
and the two-dimension code acquisition submodule is connected with the file acquisition submodule and is used for acquiring the corresponding two-dimension code according to the target file acquired by the file acquisition submodule.
10. The identity authentication device of claim 7, wherein the two-dimensional code acquisition module comprises:
and the scanning submodule is used for scanning an external display device or an identity authentication card to acquire the two-dimensional code provided by the user.
11. The identity authentication device of claim 7, wherein the encoding module comprises: a DTMF coding sub-module or a high-low frequency coding sub-module;
the DTMF coding sub-module is used for coding the authentication information into voice information according to dual-tone multi-frequency DTMF;
and the high-low frequency coding submodule is used for coding the authentication information into sound information according to a preset character, a high-frequency coding table and a low-frequency coding table in sequence.
12. A voice server, comprising:
the voice receiving module is used for receiving voice information sent by an identity authentication device with a pre-established call connection, wherein the voice information is obtained by encoding a two-dimensional code provided by a user by the identity authentication device according to a preset voice encoding rule;
the decoding module is connected with the sound receiving module and is used for decoding the sound information received by the sound receiving module into authentication information according to a sound decoding rule corresponding to the sound coding rule;
and the authentication module is connected with the decoding module and used for carrying out identity authentication according to the authentication information obtained by the decoding module.
13. An identity authentication system, comprising:
the identity authentication device is used for acquiring the two-dimensional code provided by the user; analyzing the two-dimensional code to obtain authentication information; according to a preset voice coding rule, coding the authentication information into voice information; sending the sound information to a voice server which establishes conversation connection in advance;
the voice server is connected with the identity authentication device and used for receiving the voice information sent by the identity authentication device through the call connection; decoding the voice information into corresponding authentication information according to a decoding rule corresponding to the voice coding rule; and performing identity authentication according to the authentication information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013102320688A CN103297242A (en) | 2013-06-13 | 2013-06-13 | Identity authentication method, device and system and voice server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2013102320688A CN103297242A (en) | 2013-06-13 | 2013-06-13 | Identity authentication method, device and system and voice server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103297242A true CN103297242A (en) | 2013-09-11 |
Family
ID=49097599
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2013102320688A Pending CN103297242A (en) | 2013-06-13 | 2013-06-13 | Identity authentication method, device and system and voice server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103297242A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103714277A (en) * | 2013-12-06 | 2014-04-09 | 联想(北京)有限公司 | Electronic equipment and application example management method thereof |
CN104518875A (en) * | 2013-09-27 | 2015-04-15 | 深圳市腾讯计算机系统有限公司 | Identity authentication method, account acquisition method and mobile terminal |
WO2015085472A1 (en) * | 2013-12-09 | 2015-06-18 | 华为终端有限公司 | Information interaction method and device for voice communication |
CN104866754A (en) * | 2014-02-21 | 2015-08-26 | 阿里巴巴集团控股有限公司 | Method and device for verifying information |
CN104917929A (en) * | 2014-03-11 | 2015-09-16 | 夏普株式会社 | Image processing apparatus |
CN105281843A (en) * | 2015-09-10 | 2016-01-27 | 移康智能科技(上海)有限公司 | Two-dimensional code transmission and reception methods and transmission and reception devices |
CN106850671A (en) * | 2017-02-27 | 2017-06-13 | 南京聚鲲物联网科技有限公司 | The identity identifying method and its system of a kind of utilization acoustic communication |
CN107506681A (en) * | 2016-06-14 | 2017-12-22 | 智财咨询(北京)有限公司 | A kind of bar code system based on sound wave |
CN108696487A (en) * | 2017-04-10 | 2018-10-23 | 北京京东尚科信息技术有限公司 | Method and system for carrying out client validation automatically based on dtmf signal |
CN109712329A (en) * | 2019-03-01 | 2019-05-03 | 智电(深圳)智能电子科技有限公司 | Identifying code transfer approach, shared charger and shared charging system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009193272A (en) * | 2008-02-13 | 2009-08-27 | Aruze Corp | Authentication system and mobile terminal |
CN102622820A (en) * | 2012-02-29 | 2012-08-01 | 钱袋网(北京)信息技术有限公司 | Terminal device and server |
CN102932793A (en) * | 2012-11-15 | 2013-02-13 | 北京易和迅科技有限公司 | Wireless network authentication method and system based on two-dimension code |
-
2013
- 2013-06-13 CN CN2013102320688A patent/CN103297242A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009193272A (en) * | 2008-02-13 | 2009-08-27 | Aruze Corp | Authentication system and mobile terminal |
CN102622820A (en) * | 2012-02-29 | 2012-08-01 | 钱袋网(北京)信息技术有限公司 | Terminal device and server |
CN102932793A (en) * | 2012-11-15 | 2013-02-13 | 北京易和迅科技有限公司 | Wireless network authentication method and system based on two-dimension code |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104518875A (en) * | 2013-09-27 | 2015-04-15 | 深圳市腾讯计算机系统有限公司 | Identity authentication method, account acquisition method and mobile terminal |
CN104518875B (en) * | 2013-09-27 | 2018-12-11 | 深圳市腾讯计算机系统有限公司 | A kind of method that authentication and account obtain, mobile terminal |
CN103714277A (en) * | 2013-12-06 | 2014-04-09 | 联想(北京)有限公司 | Electronic equipment and application example management method thereof |
WO2015085472A1 (en) * | 2013-12-09 | 2015-06-18 | 华为终端有限公司 | Information interaction method and device for voice communication |
CN104866754A (en) * | 2014-02-21 | 2015-08-26 | 阿里巴巴集团控股有限公司 | Method and device for verifying information |
CN104917929A (en) * | 2014-03-11 | 2015-09-16 | 夏普株式会社 | Image processing apparatus |
CN104917929B (en) * | 2014-03-11 | 2018-09-04 | 夏普株式会社 | Image processing system, image processing apparatus and external communication device |
CN105281843A (en) * | 2015-09-10 | 2016-01-27 | 移康智能科技(上海)有限公司 | Two-dimensional code transmission and reception methods and transmission and reception devices |
CN107506681A (en) * | 2016-06-14 | 2017-12-22 | 智财咨询(北京)有限公司 | A kind of bar code system based on sound wave |
CN106850671A (en) * | 2017-02-27 | 2017-06-13 | 南京聚鲲物联网科技有限公司 | The identity identifying method and its system of a kind of utilization acoustic communication |
CN108696487A (en) * | 2017-04-10 | 2018-10-23 | 北京京东尚科信息技术有限公司 | Method and system for carrying out client validation automatically based on dtmf signal |
CN109712329A (en) * | 2019-03-01 | 2019-05-03 | 智电(深圳)智能电子科技有限公司 | Identifying code transfer approach, shared charger and shared charging system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103297242A (en) | Identity authentication method, device and system and voice server | |
CN1085025C (en) | User authentication method and apparatus | |
US11151176B2 (en) | Method and apparatus for processing text information | |
AU2015201690B2 (en) | User authentication | |
US9473937B2 (en) | Method, system and receiving terminal for processing information based on dual-tone multi-frequency | |
CN102710420A (en) | Method, system and device for setting password | |
CN103957522A (en) | Intelligent communication method, intelligent communication terminals and intelligent communication system | |
CN105657695A (en) | Method, terminal and system for connecting to Wi-Fi | |
CN101764823A (en) | Authentication method, electronic equipment and authentication server | |
US20160345376A1 (en) | Wireless communication methods, apparatuses, and associated application systems and devices | |
CN104253689A (en) | User identity module card generated dynamic password authentication method and system based on QR (quick response) code | |
KR20160143333A (en) | Method for Double Certification by using Double Channel | |
CN113411184B (en) | Integrated management terminal device and integrated management method | |
CN103414560A (en) | Starting method of application, device thereof, system thereof and application server | |
CN116916310B (en) | Verification code generation and verification method and device and electronic equipment | |
CN104935715A (en) | Method and system for displaying calling information of calling party via biometric identification technology | |
CN103476141A (en) | Method and system for transmitting files between mobile terminals | |
CN106559588B (en) | Method and device for uploading text information | |
KR102335892B1 (en) | Method for identifying user using sound and apparatus therefor | |
CN103971042A (en) | Dynamic password booting method based on sound signals | |
CN106302083B (en) | Instant messaging method and server | |
CN109246105B (en) | Communication method and system for preventing information leakage | |
CN109257177B (en) | Key generation method, system, mobile terminal, server and storage medium | |
CN107508782B (en) | Method and device for authenticating user identity in voice customer service | |
CN112118610A (en) | Wireless intelligent device network distribution method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20130911 |