CN103390123B - User authen method, user authentication device and intelligent terminal - Google Patents
User authen method, user authentication device and intelligent terminal Download PDFInfo
- Publication number
- CN103390123B CN103390123B CN201210139519.9A CN201210139519A CN103390123B CN 103390123 B CN103390123 B CN 103390123B CN 201210139519 A CN201210139519 A CN 201210139519A CN 103390123 B CN103390123 B CN 103390123B
- Authority
- CN
- China
- Prior art keywords
- user
- password
- speech cipher
- verbal instructions
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
The present invention relates to a kind of user authen method, and it includes:Store at least one password and speech cipher corresponding with each password;The verbal instructions of typing user;Compare verbal instructions and speech cipher;The password corresponding with the speech cipher of matching is sent if one of verbal instructions matching speech cipher and is authenticated into server.In above-mentioned user authen method and intelligent terminal, user need only read one section of verbal instructions, you can send the cryptogram to server and be authenticated, can avoid user that input password is repeated several times.Especially in the terminal, because the limitation of mobile terminal inputting interface, lifting of this scheme for user experience are more obvious.In addition, the present invention also provides a kind of intelligent terminal.
Description
Technical field
The present invention relates to authenticating user identification technology, more particularly to a kind of user authen method, user authentication device and intelligence
Can terminal.
Background technology
In the common moving equipment of one family formula(Such as iPad), some need the software of identity class or apply meeting
Because the difference of user, and different accounts be present, need username and password of cumbersome input when changing user every time,
The problem of mobile device is because of keyboard size, causes input password pretty troublesome, capital and small letter switching, numeral switching, waste time and energy.And
And the time one grows the situation for occurring and forgetting Password.
The content of the invention
In view of this, it is necessary to a kind of improved user authen method, user authentication device and intelligent terminal are provided, can be with
Cumbersome user name and Password Input process are avoided, lifts the usage experience of intelligent terminal.
Above-mentioned user authen method, user authentication device and intelligent terminal is achieved through the following technical solutions:
A kind of user authen method, it includes:Store at least one password and the speech cipher corresponding with each password;
The verbal instructions of typing user;Compare verbal instructions and speech cipher;If the verbal instructions and any one voice stored are close
Matched on code, the password corresponding with the speech cipher of matching is sent and is authenticated into server.
As the further improvement of above-mentioned user authen method, it also includes:Store at least one user name, user name with
The password of storage corresponds;It will also be sent when sending the password with by the corresponding user name of transmission password to server.
As the further improvement of above-mentioned user authen method, it also includes:Store at least one user name;User is provided
Log-in interface one at least one user name for selection by the user;Selected user name is sent into the server.
As the further improvement of above-mentioned user authen method, it also includes:In the verbal instructions of typing user to
Family shows prompt message.
As the further improvement of above-mentioned user authen method, prompt message is pre-entered and stored by user, or
Person is identified to obtain to the speech cipher.
As the further improvement of above-mentioned user authen method, password is text password, graphical passwords or key text
Part.
As the further improvement of above-mentioned user authen method, send the password corresponding with the speech cipher of matching it
It is preceding to be also filled with into logon form.
A kind of user authentication device, it includes storage device, recording device, comparison means and dispensing device.Wherein store
Device is used to store at least one password and the speech cipher corresponding with each password storage;Recording device is used for typing user
Verbal instructions;Comparison means is used to compare verbal instructions and speech cipher;Dispensing device is used for when verbal instructions and storage
Any one speech cipher matches to send in the password corresponding with the speech cipher of matching to be authenticated into server.As
The further improvement of above-mentioned user authentication device, storage device are additionally operable to store at least one user name, user name and the password
Correspond;Dispensing device will be sent to server with by the corresponding user name of transmission password when being additionally operable to send the password.
As the further improvement of above-mentioned user authentication device, storage device is additionally operable to store at least one user name;Intelligence
Can terminal also include logon device, for providing user's log-in interface one for selection by the user at least one user name
It is individual;Dispensing device is additionally operable to send selected user name into server.
As the further improvement of above-mentioned user authentication device, logon device is additionally operable to will be relative with the speech cipher of matching
The password answered is filled in a logon form into the log-in interface.
A kind of intelligent terminal, it includes display screen and user authentication device, and user authentication device includes storage device, recording
Device, comparison means and dispensing device.Wherein storage device is used to store at least one password and relative with each password storage
The speech cipher answered;Recording device is used for the verbal instructions of typing user;Comparison means is close with voice for comparing verbal instructions
Code;Match will be corresponding with the speech cipher of matching for any one speech cipher that dispensing device is used for when verbal instructions and storage
Password send and be authenticated into server.
In above-mentioned user authen method, user authentication device and intelligent terminal, user need only read one section of verbal instructions,
Server can be sent the cryptogram to be authenticated, can avoid user that input password is repeated several times.Especially in the terminal,
Because the limitation of mobile terminal inputting interface, lifting of this scheme for user experience are more obvious.
For the above and other objects, features and advantages of the present invention can be become apparent, preferred embodiment cited below particularly,
And coordinate institute's accompanying drawings, it is described in detail below.
Brief description of the drawings
Fig. 1 is a kind of flow chart of disclosed user authen method.
Fig. 2 is the schematic diagram of disclosed user authen method first embodiment.
Fig. 3 is showing for the information such as the user name of disclosed user authen method first embodiment storage, password
It is intended to.
Fig. 4 is the schematic diagram that disclosed user authen method first embodiment selects user name.
Fig. 5 is interface schematic diagram when disclosed user authen method first embodiment enrolls verbal instructions.
Fig. 6 is the schematic diagram of disclosed user authen method second embodiment.
Fig. 7 is the schematic diagram of disclosed user authen method 3rd embodiment.
Fig. 8 is another schematic diagram of disclosed user authen method 3rd embodiment.
Fig. 9 is the structured flowchart of disclosed user authentication device.
Figure 10 is the structured flowchart of disclosed intelligent terminal.
Embodiment
Further to illustrate that the present invention is to realize technological means and effect that predetermined goal of the invention taken, below in conjunction with
Accompanying drawing and preferred embodiment, to according to the embodiment of user authen method proposed by the present invention and intelligent terminal, structure,
Feature and its effect, describe in detail as after.
Fig. 1 is a kind of flow chart of disclosed user authen method.The method for example can be by an intelligence eventually
End performs, and intelligent terminal for example can be mobile terminal such as tablet personal computer either smart mobile phone or desktop computer etc..
As shown in figure 1, the user authen method comprises the following steps:
Step S101, store at least one password and speech cipher corresponding with each password;
Step S102, the verbal instructions of typing user;
Step S103, compare the verbal instructions and the speech cipher;And
Step S104, will be relative with the speech cipher of matching if the verbal instructions match one of the speech cipher
The password answered is sent to be authenticated into server.
In above-mentioned user authen method, user need only read one section of verbal instructions, you can send the cryptogram to server
It is authenticated, can avoids user that input password is repeated several times.Especially in the terminal, due to mobile terminal inputting interface
Limitation, lifting of this scheme for user experience are more obvious.
First embodiment
Fig. 2 is the schematic diagram of the user's log-in interface 100 shown in the user authen method of first embodiment.Such as Fig. 2 institutes
Show, include drop-down list 110, Text Entry 120, button 130 and button 140 in log-in interface 100.
Drop-down list 110 is used to allow user to select user name, and the user name in list is obtained according to historical record.Also
That is, the user authen method in the present embodiment can also store user name.Fig. 3 show the user name, close stored in the present embodiment
The schematic diagram of code, speech cipher etc..User data as shown in Figure 3, correspondingly, as shown in figure 4, when expansion drop-down list 110
When, 5 user name TEST_1 to TEST_5 are shared in list.
Text Entry 120 is used to allow user to input text password, and button 130 is used to allow user to start speech cipher knowledge
Other process.When user presses button 130, prompting interface as shown in Figure 5 is shown, simultaneity factor starts to record(That is step
S102), by the verbal instructions recorded compared with speech cipher voice1.wav, illustrate that current user is exactly if matching
TEST_1, then password corresponding with TEST_1 can be automatically filled in Text Entry 120.Now, user clicks on and logged in
Complete user authentication process.
Button 140 is used for the recording operation for allowing user to complete speech cipher.As shown in Fig. 2 user can be in drop-down list
Selecting or directly inputting needs the user name of customized voice password, then the input text password in Text Entry 120.This
When can click on button 140.Interface 150 is ejected after click.Include Text Entry 160 and button 170 in interface 150.Text
This input frame 160 is used to allow user to input the words and phrases as speech cipher, such as " I loves Beijing Tian An-men " in the present embodiment.
It is worth noting that, tip1 is " I loves Beijing Tian An-men " in Fig. 3.User completes to show boundary after clicking on button 170 after inputting
Face 180 simultaneously starts to record.Interface 180 includes allowing user to read aloud " I loves Beijing Tian An-men " prompting, detects that user completes
Speech cipher of the recording that will be enrolled after reading aloud as user TEST_1(That is the voice1.wav in Fig. 3), it is so then complete
Into the customization of user speech password.
It is appreciated that the prompt message in Fig. 3 can not also be inputted by user, and obtained by speech cipher via speech recognition
Arrive, in this way, can need not then show interface 150 as shown in Figure 2.
In order to prevent that speech cipher from arbitrarily being override, for existing user name in present data, above-mentioned boundary is being shown
Step can be also authenticated before face 150 and/or before preserving speech cipher.This authenticating step can be manually in text by user
Password is inputted in this input frame 120, ability display interface 150 or preservation voice when this password is identical with saved password
Password;This authenticating step, which can also be, allows user to say existing speech cipher.
Although only being illustrated above by taking text password as an example, it being understood, however, that password can also be graphical passwords, or
Person's key file.
In the user authen method of the present embodiment, user name can easily be chosen by drop-down list 110, and password
Input can allow user to read verbal instructions and replace, when verbal instructions and the stored voice corresponding with the user name of reading
When code matches can automatically stopping code in Text Entry 120, user click on Button Login can complete to use
Family authentication operation, overall process is simple and convenient, can avoid the input through keyboard operation of complexity.Further, since it is sent to server
It is still text password, it is identical with original framework, without the design for changing server end, i.e., realize voice in client and recognize
The framework demonstrate,proved without changing server.
Second embodiment
In the present embodiment, as shown in fig. 6, when carrying out user authentication, user can not select user name, also not in text
Text password is inputted in input frame.After user clicks on button 130, its flow is substantially similar with first embodiment, but by user
Process of the verbal instructions of reading compared with speech cipher is slightly different.In the present embodiment, due to non-selected user name and password,
Speech cipher can not be associated by user name, it is necessary to by verbal instructions and speech cipher one by one compared with, when successful match language
After sound password, user name and password are determined according to speech cipher in turn.User name and password can now be filled respectively to
Drop-down list 110 logs in button completion user authentication with Text Entry 120, being clicked on by user.Further, it is also possible to without
Filling, is directly sent to server with password by user name or authentication procedure is authenticated.
The user authen method of the present embodiment can further reduce the process of selection user name compared to first embodiment,
It is easier using user authentication process.
3rd embodiment
In the present embodiment, as shown in fig. 7, be no longer one-to-one relation between user name and password, it is in general, close
Yardage can be more than number of users, i.e. a user name might have multiple passwords.
In this way, when carrying out user authentication, as shown in figure 4, user can be selected in drop-down list 110 user name or
User name is voluntarily inputted, then when user presses button 130(Fig. 2)When eject interface as shown in Figure 8, prompt user to read aloud language
Sound password, this verbal instructions can be determined by user according to practical situation, system record after verbal instructions by verbal instructions
With the speech cipher shown in Fig. 7 one by one compared with, password is then determined according to the speech cipher of matching and password can be filled
Into Text Entry 120, password is either sent jointly into server with user name or authentication procedure is authenticated.
For example, certain user is in certain microblogging website (http://t.qq.com) and another microblogging website (http://
Weibo.com the user name in) is all TEST_1, but is security consideration, and the password two microblogging websites but and differs, example
Such as it is respectively password1 and password2.When user is logging in certain microblogging website, user is in selection user name TEST_1
Afterwards, button 130 is clicked on, reads password1, and at another microblogging website, user clicks on after user name TEST_1 is selected
Button 130, read password2.Accordingly, the password answered can be inserted Text Entry 120 automatically or will be close by system
Code and user name send to server and are authenticated.
No longer it is one-to-one relation between user name and password, for same in the user authen method of the present embodiment
One user name, user can determine use which password according to actual conditions, and such a mode same user that is particularly suitable for use in exists
There is same subscriber name, the situation for but there are different passwords in different web sites.
Fig. 9 is the structured flowchart of the user authentication device disclosed in the embodiment of the present invention.In specific implementation, user authentication
Device can be for example built into tablet personal computer, smart mobile phone, desktop computer or notebook computer.As shown in figure 9, user recognizes
Card device 200 includes storage device 210, recording device 220, comparison means 230, dispensing device 240 and logon device 250.
Wherein, storage device 210 is used to store the information such as user name, password, speech cipher;Recording device 220 is used to record
Take the verbal instructions at family;Comparison means 230 is used to compare the verbal instructions speech ciphers;Dispensing device 240 is in when voice mouth
The password corresponding with the speech cipher of matching is sent during one of order matching speech cipher and is authenticated into server
Or filling is into logon form.Logon device 250 be used for provide user's log-in interface for selection by the user or input user
Name, it is additionally operable to show prompt message to user when enrolling the verbal instructions of user.On storage device 210, recording device
220th, comparison means 230, dispensing device 240 and logon device 250 can further regard to the description of foregoing user authen method.
In above-mentioned user authentication device, user need only read one section of verbal instructions, you can send the cryptogram to server and enter
Row certification or filling can avoid user that input password is repeated several times into logon form.Especially in the terminal, due to
The limitation of mobile terminal inputting interface, lifting of this scheme for user experience are more obvious.
Figure 10 is the structured flowchart for the intelligent terminal that the embodiment of the present invention discloses.In specific implementation, intelligent terminal is for example
Can be tablet personal computer, smart mobile phone, desktop computer or notebook computer.As shown in Figure 10, intelligent terminal includes display screen 310
With user authentication device 200.Display screen 310 is used for the log-in interface for showing that user authentication device 200 provides.
In the intelligent terminal of the present embodiment, user need only read one section of verbal instructions, you can send the cryptogram to server
Authentication verification or filling are carried out into logon form, can avoid user that input password is repeated several times.Especially in mobile terminal
In, because the limitation of mobile terminal inputting interface, lifting of this scheme for user experience are more obvious.
The above described is only a preferred embodiment of the present invention, any formal limitation not is made to the present invention, though
So the present invention is disclosed as above with preferred embodiment, but is not limited to the present invention, any those skilled in the art, not
Depart from the range of technical solution of the present invention, when the technology contents using the disclosure above make a little change or are modified to equivalent change
The equivalent embodiment of change, as long as being without departing from technical solution of the present invention content, the technical spirit according to the present invention is implemented to more than
Example any brief introduction modification, equivalent variations and the modification made, in the range of still falling within technical solution of the present invention.
Claims (10)
- A kind of 1. user authen method, it is characterised in that including:Store at least one password and the speech cipher corresponding with each password;Acquisition prompt message is identified to the speech cipher in the words and phrases of the speech cipher inputted according to user;The verbal instructions of typing user;Compare the verbal instructions and the speech cipher;If the vocal print and words and phrases of the verbal instructions and any one speech cipher of the storage match, by the voice with matching The corresponding password of password is sent to be authenticated into server;Wherein, the prompt message is shown to user in the verbal instructions of typing user.
- 2. user authen method as claimed in claim 1, it is characterised in that this method also includes:At least one user name is stored, the user name and the password of storage correspond;Will also be with being sent when sending the password The corresponding user name of password is sent to the server.
- 3. user authen method as claimed in claim 1, it is characterised in that this method also includes:Store at least one user name;One of user log-in interface for selection by the user at least one user name is provided;Selected user name is sent into the server.
- 4. user authen method as claimed in claim 1, it is characterised in that corresponding in the speech cipher for sending with matching Also it is filled with before password into logon form.
- 5. the user authen method as described in claim any one of 1-4, it is characterised in that the password is text password, figure Password or key file.
- A kind of 6. user authentication device, it is characterised in that including:Storage device, for storing at least one password and the speech cipher corresponding with each password storage;Recording device, the verbal instructions for typing user;Comparison means, for comparing the verbal instructions and the speech cipher;Dispensing device, for when the vocal print and words and phrases of the verbal instructions and any one speech cipher of the storage match then will be with The corresponding password of the speech cipher of matching is sent to be authenticated into server;Wherein, the user authentication device also includes acquisition device and exhibiting device, and acquisition device is used for what is inputted according to user The words and phrases of the speech cipher speech cipher are identified acquisition prompt message, and the exhibiting device is used in typing During the verbal instructions of user the prompt message is shown to user.
- 7. user authentication device as claimed in claim 6, it is characterised in that the storage device is additionally operable to store at least one use Name in an account book, the user name correspond with the password;The dispensing device will be corresponding with by transmission password when being additionally operable to send the password User name send to the server.
- 8. user authentication device as claimed in claim 6, it is characterised in that:The storage device is additionally operable to store at least one user name;User's logon device also includes:Logon device, for providing user's log-in interface one for selection by the user at least one user name;The dispensing device is additionally operable to send selected user name into the server.
- 9. user authentication device as claimed in claim 8, it is characterised in that the logon device is additionally operable to the voice with matching The corresponding password of password is filled in a logon form into the log-in interface.
- 10. a kind of intelligent terminal, it includes display screen and user authentication device, it is characterised in that the user authentication device is power Profit requires the user authentication device described in any one of 6-9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210139519.9A CN103390123B (en) | 2012-05-08 | 2012-05-08 | User authen method, user authentication device and intelligent terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210139519.9A CN103390123B (en) | 2012-05-08 | 2012-05-08 | User authen method, user authentication device and intelligent terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103390123A CN103390123A (en) | 2013-11-13 |
CN103390123B true CN103390123B (en) | 2018-01-09 |
Family
ID=49534392
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210139519.9A Active CN103390123B (en) | 2012-05-08 | 2012-05-08 | User authen method, user authentication device and intelligent terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103390123B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103961869A (en) * | 2014-04-14 | 2014-08-06 | 林云帆 | Device control method |
CN105991280A (en) * | 2015-02-02 | 2016-10-05 | 中国移动通信集团湖北有限公司 | User authentication method and system |
CN106161018A (en) * | 2015-03-23 | 2016-11-23 | 中兴通讯股份有限公司 | A kind of method and apparatus managing classification password |
WO2017124444A1 (en) * | 2016-01-22 | 2017-07-27 | 华为技术有限公司 | Method, device and terminal for inputting login password of application |
CN105760045A (en) * | 2016-01-29 | 2016-07-13 | 宇龙计算机通信科技(深圳)有限公司 | Application program login method, application program login device and terminal |
CN106850539A (en) * | 2016-12-07 | 2017-06-13 | 广东小天才科技有限公司 | A kind of checking information acquisition methods and device |
CN107220532B (en) * | 2017-04-08 | 2020-10-23 | 网易(杭州)网络有限公司 | Method and apparatus for recognizing user identity through voice |
CN107193391A (en) * | 2017-04-25 | 2017-09-22 | 北京百度网讯科技有限公司 | The method and apparatus that a kind of upper screen shows text message |
WO2019036904A1 (en) * | 2017-08-22 | 2019-02-28 | 福建联迪商用设备有限公司 | Cash register user management method and terminal |
CN111402896B (en) * | 2019-01-02 | 2023-09-19 | 中国移动通信有限公司研究院 | Voice verification method and network equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002288140A (en) * | 2001-03-23 | 2002-10-04 | Nec Corp | System for personal identification |
CN1533121A (en) * | 2003-03-20 | 2004-09-29 | 日本电气株式会社 | Device and method for preventing unauthorized use of information processing device |
CN101154252A (en) * | 2006-09-28 | 2008-04-02 | 知网生物识别科技股份有限公司 | Window login and authentication system and method thereof |
CN101179385A (en) * | 2007-11-22 | 2008-05-14 | 北京金山软件有限公司 | Method, network game server and system for improving security of user account |
CN102377729A (en) * | 2010-08-10 | 2012-03-14 | 朱建政 | User registration and logon method by combining speaker speech identity authentication and account code protection in network games |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7536304B2 (en) * | 2005-05-27 | 2009-05-19 | Porticus, Inc. | Method and system for bio-metric voice print authentication |
-
2012
- 2012-05-08 CN CN201210139519.9A patent/CN103390123B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002288140A (en) * | 2001-03-23 | 2002-10-04 | Nec Corp | System for personal identification |
CN1533121A (en) * | 2003-03-20 | 2004-09-29 | 日本电气株式会社 | Device and method for preventing unauthorized use of information processing device |
CN101154252A (en) * | 2006-09-28 | 2008-04-02 | 知网生物识别科技股份有限公司 | Window login and authentication system and method thereof |
CN101179385A (en) * | 2007-11-22 | 2008-05-14 | 北京金山软件有限公司 | Method, network game server and system for improving security of user account |
CN102377729A (en) * | 2010-08-10 | 2012-03-14 | 朱建政 | User registration and logon method by combining speaker speech identity authentication and account code protection in network games |
Also Published As
Publication number | Publication date |
---|---|
CN103390123A (en) | 2013-11-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103390123B (en) | User authen method, user authentication device and intelligent terminal | |
US10599832B2 (en) | Password check by decomposing password | |
US9178866B2 (en) | Techniques for user authentication | |
US20210377264A1 (en) | Out-of-Band Biometric Enrollment and Verification Using Interactive Messaging | |
US10812485B1 (en) | Wearable device-based user authentication | |
US20180123799A1 (en) | Portable device interface methods and systems | |
US20150269369A1 (en) | Methods and systems for data entry | |
Mihajlov et al. | On designing usable and secure recognition-based graphical authentication mechanisms | |
CN103747000B (en) | Access the authentication method and device of wireless network | |
US20130340057A1 (en) | Image Facilitated Password Generation User Authentication And Password Recovery | |
US20150088760A1 (en) | Automatic injection of security confirmation | |
US11822895B1 (en) | Passive user authentication | |
CN104283682A (en) | Method, device and system conducting verification through verification codes | |
WO2016209499A1 (en) | Speech recognition services | |
CN106888086B (en) | System and method for managing account password | |
US11706340B2 (en) | Caller deflection and response system and method | |
CN108122102A (en) | Self-service Internetbank transfer account method, equipment, storage medium and long-distance video automatic teller machine | |
CN108170785A (en) | Bootstrap technique, device and the computer readable storage medium of terminal searching operation | |
JP5311999B2 (en) | User information management apparatus, user registration management system, user information management method, and user information management program | |
WO2016114937A1 (en) | Out-of-band biometric enrollment and verification using interactive messaging | |
US11914690B2 (en) | Systems and methods for using typing characteristics for authentication | |
CN110245485A (en) | A kind of the verifying system and its verification method of combination advertisement video | |
CN107276962B (en) | Dynamic password voice authentication system capable of combining any gesture | |
EP3740928A1 (en) | Speech recognition ordering system and related methods | |
JP2012068779A (en) | Authentication device, authentication method and authentication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |