CN105450665A - Secure login method, secure login device and terminal - Google Patents

Secure login method, secure login device and terminal Download PDF

Info

Publication number
CN105450665A
CN105450665A CN201511020571.2A CN201511020571A CN105450665A CN 105450665 A CN105450665 A CN 105450665A CN 201511020571 A CN201511020571 A CN 201511020571A CN 105450665 A CN105450665 A CN 105450665A
Authority
CN
China
Prior art keywords
user
information
voiceprint
login
cipher
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201511020571.2A
Other languages
Chinese (zh)
Other versions
CN105450665B (en
Inventor
陈涌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201511020571.2A priority Critical patent/CN105450665B/en
Publication of CN105450665A publication Critical patent/CN105450665A/en
Application granted granted Critical
Publication of CN105450665B publication Critical patent/CN105450665B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0815Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Biomedical Technology (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Document Processing Apparatus (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention provides a secure login method, a secure login device and a terminal. The secure login method comprises the following steps: when receiving a login request, randomly generating login verification information, wherein the login verification information, wherein comprises preset ciphertext information; receiving voice information of a user reading the login verification information; and carrying out secure login verification on the user according to the voice information. According to the secure login method provided by the technical scheme, a login verification mode combining ciphertext character verification only known to the user with user voiceprint verification is used for ensuring the security of a password and effectively improving the login security of the user, at least two ciphertexts and different matching results are set to effectively ensure the security of the personal property of the user, the password and the terminal under the condition that the user has to log in the terminal in a dangerous environment or based on the demand of privacy protection, and the like, and thus the user experience is improved.

Description

Safe login method and device, terminal
Technical field
The present invention relates to field of terminal technology, in particular to a kind of safe login method, a kind of secure login device and a kind of terminal.
Background technology
At present, in correlation technique, the mode of identifying user identity legitimacy mainly inputs account, password (or gesture motion etc.) by user, logs in after being verified; And in order to increase fail safe, also having and carrying out login authentication by vocal print as password, but traditional vocal print password is by the impact of the factor such as ambient noise, transmission disturbance, and reliability is not high.
Therefore, how to improve the safety and reliability that user logs in further, and protect the privacy of user, thus lifting Consumer's Experience becomes technical problem urgently to be resolved hurrily.
Summary of the invention
The present invention is just based on above-mentioned technical problem, propose a kind of new technical scheme, by the login authentication mode that ciphertext character is verified and user's voice print verification combines only just known with user, the fail safe that user logs in effectively is improve while ensure that the fail safe of password, and arranged by simple ciphertext and meet user and do not wish that password is by the psychological needs expressly shown, and then improve Consumer's Experience.
In view of this, a first aspect of the present invention, proposes a kind of safe login method, comprising: upon receiving the registration request, and stochastic generation login authentication information comprises default cipher-text information in described login authentication information; Receive the voice messaging that described user reads described login authentication information; According to described voice messaging, secure log checking is carried out to described user.
In this technical scheme, when after the logging request receiving user, stochastic generation comprises the login authentication information of default cipher-text information, wherein, login authentication information is can be a string character string comprising numeral and/or letter with certain length comprising default cipher-text information, such as comprise the numeral of 6-20 character of default cipher-text information and the combination of letter, and to preset cipher-text information be a user's numeral of sets itself or letter as required, also can be that character length is shorter than multiple numeral of login authentication information character length and/or the combination of letter, and this login authentication information is presented to user read, and then the voice messaging of this login authentication information is read according to user, secure log checking is carried out to user, such as checking enters terminal operation interface or pays etc., so, by the login authentication mode that ciphertext character is verified and user's voice print verification combines only just known with user, the fail safe that user logs in effectively is improve while ensure that the fail safe of password, and arranged by simple ciphertext and meet user and do not wish that password is by the psychological needs expressly shown, and then improve Consumer's Experience.
In technique scheme, preferably, describedly according to described voice messaging, secure log checking is carried out to described user, specifically comprise: the cryptogram validation information obtaining typing when first voiceprint of described user and described user read described login authentication information according to described voice messaging; Judge whether described first voiceprint matches with default voiceprint, and whether described cryptogram validation information matches with described default cipher-text information; Determine whether described user is verified by secure log according to judged result.
In this technical scheme, when receiving user and reading the voice messaging of login authentication information, voiceprint and the cryptogram validation information of user is obtained according to this voice messaging, thus judge whether the user's voiceprint got matches with default voiceprint, and whether the cryptogram validation information that user inputs for default cipher-text information when reading is accurate, also need of course simultaneously to verify whether other information users in login authentication information except default cipher-text information read accurately, and then determine whether user verifies by secure log according to judged result, so, the login authentication mode that ciphertext character is verified and user's voice print verification combines only just known with user can be realized, improve the safety in utilization of terminal, and the privacy of user can better be protected, promote Consumer's Experience.
In above-mentioned arbitrary technical scheme, preferably, described default cipher-text information comprises the first default cipher-text information and the second default cipher-text information.
In this technical scheme, preferably can arrange two groups and preset cipher-text information, different default cipher-text information can corresponding different matching result, thus improve the fail safe of password further, to tackle emergency case, avoid single setting of Yin Miwen to cause harmful effect to the privacy of user and the safety in utilization of terminal, thus promote Consumer's Experience.
In above-mentioned arbitrary technical scheme, preferably, describedly determine whether described user is verified by secure log according to judged result, specifically comprise: when described first voiceprint of judgement and described default voiceprint match, and described cryptogram validation information and described first presets cipher-text information when matching, and determines that described user is verified by described secure log; When described first voiceprint of judgement and described default voiceprint match, and when described cryptogram validation information and the described second default cipher-text information match, the prompting login authentication system failure, or allow described user login to enter virtual system.
In this technical scheme, when the voiceprint of the user in the voice messaging received and the cryptogram validation information of typing all match with the default voiceprint pre-set and default cipher-text information, difference (namely presetting the difference of cipher-text information) according to the cryptogram validation information of user's typing can obtain different matching results, particularly: match if the cryptogram validation information of user's typing and first presets cipher-text information, then illustrate that the cryptogram validation information that user inputs is correct, allow user to be verified by secure log, match if the cryptogram validation information of user's typing and second presets cipher-text information, then illustrate that the cryptogram validation information of user's typing is wrong, now, the prompting login authentication system failure, or allow user's login to enter the virtual system set, namely user is not allowed to enter real operation interface, and do not point out the authorization information of input wrong, effectively to guarantee the user person property of user when being had to registration terminal or the needs etc. based on protection privacy by the dangerous circumstances of coercing, the fail safe that password and terminal use, thus lifting Consumer's Experience.
In above-mentioned arbitrary technical scheme, preferably, also comprised before the described logging request of reception: gather second voiceprint of described user as described default voiceprint; Cipher-text information is set as described default cipher-text information.
In this technical scheme, by the voiceprint of acquisition terminal user in advance and pre-set cipher-text information as judgment standard, be user and whether Successful login terminal can provide foundation, guarantee effective enforcement of the login authentication mode that ciphertext character is verified and user's voice print verification combines only just known with user, reach and improve cipher safety and user's safety in utilization object, and then promote Consumer's Experience.
According to a second aspect of the invention, propose a kind of secure login device, comprise generation module, for upon receiving the registration request, stochastic generation login authentication information, comprises default cipher-text information in described login authentication information; Receiver module, reads the voice messaging of the described login authentication information of described generation module stochastic generation for receiving described user; Authentication module, carries out secure log checking for the described voice messaging received according to described receiver module to described user.
In this technical scheme, when after the logging request receiving user, stochastic generation comprises the login authentication information of default cipher-text information, wherein, login authentication information is can be a string character string comprising numeral and/or letter with certain length comprising default cipher-text information, such as comprise the numeral of 6-20 character of default cipher-text information and the combination of letter, and to preset cipher-text information be a user's numeral of sets itself or letter as required, also can be that character length is shorter than multiple numeral of login authentication information character length and/or the combination of letter, and this login authentication information is presented to user read, and then the voice messaging of this login authentication information is read according to user, secure log checking is carried out to user, such as checking enters terminal operation interface or pays etc., so, by the login authentication mode that ciphertext character is verified and user's voice print verification combines only just known with user, the fail safe that user logs in effectively is improve while ensure that the fail safe of password, and arranged by simple ciphertext and meet user and do not wish that password is by the psychological needs expressly shown, and then improve Consumer's Experience.
In technique scheme, preferably, described authentication module specifically comprises: acquisition module, and the described voice messaging for receiving according to described receiver module obtains the cryptogram validation information of typing when first voiceprint of described user and described user read the described login authentication information of described generation module stochastic generation; Judge module, for judging whether described first voiceprint that described acquisition module gets matches with default voiceprint, and whether the described cryptogram validation information that described acquisition module gets matches with described default cipher-text information; Determination module, the judged result for generating according to described judge module determines whether described user is verified by secure log.
In this technical scheme, when receiving user and reading the voice messaging of login authentication information, voiceprint and the cryptogram validation information of user is obtained according to this voice messaging, thus judge whether the user's voiceprint got matches with default voiceprint, and whether the cryptogram validation information that user inputs for default cipher-text information when reading is accurate, also need of course simultaneously to verify whether other information users in login authentication information except default cipher-text information read accurately, and then determine whether user verifies by secure log according to judged result, so, the login authentication mode that ciphertext character is verified and user's voice print verification combines only just known with user can be realized, improve the safety in utilization of terminal, and the privacy of user can better be protected, promote Consumer's Experience.
In above-mentioned arbitrary technical scheme, preferably, described default cipher-text information comprises the first default cipher-text information and the second default cipher-text information.
In this technical scheme, preferably can arrange two groups and preset cipher-text information, different default cipher-text information can corresponding different matching result, thus improve the fail safe of password further, to tackle emergency case, avoid single setting of Yin Miwen to cause harmful effect to the privacy of user and the safety in utilization of terminal, thus promote Consumer's Experience.
In above-mentioned arbitrary technical scheme, preferably, described determination module specifically for: when described judge module judges that described first voiceprint and described default voiceprint match, and described cryptogram validation information and described first presets cipher-text information when matching, and determines that described user is verified by described secure log; When described judge module judges that described first voiceprint and described default voiceprint match, and described cryptogram validation information and described second presets cipher-text information when matching, the prompting login authentication system failure, or allow described user login to enter virtual system.
In this technical scheme, when the voiceprint of the user in the voice messaging received and the cryptogram validation information of typing all match with the default voiceprint pre-set and default cipher-text information, difference (namely presetting the difference of cipher-text information) according to the cryptogram validation information of user's typing can obtain different matching results, particularly: match if the cryptogram validation information of user's typing and first presets cipher-text information, then illustrate that the cryptogram validation information that user inputs is correct, allow user to be verified by secure log, match if the cryptogram validation information of user's typing and second presets cipher-text information, then illustrate that the cryptogram validation information of user's typing is wrong, now, the prompting login authentication system failure, or allow user's login to enter the virtual system set, namely user is not allowed to enter real operation interface, and do not point out the authorization information of input wrong, effectively to guarantee the user person property of user when being had to registration terminal or the needs etc. based on protection privacy by the dangerous circumstances of coercing, the fail safe that password and terminal use, thus lifting Consumer's Experience.
In above-mentioned arbitrary technical scheme, preferably, also comprise: acquisition module, for gathering second voiceprint of described user as described default voiceprint; Module is set, for arranging cipher-text information as described default cipher-text information.
In this technical scheme, by the voiceprint of acquisition terminal user in advance and pre-set cipher-text information as judgment standard, be user and whether Successful login terminal can provide foundation, guarantee effective enforcement of the login authentication mode that ciphertext character is verified and user's voice print verification combines only just known with user, reach and improve cipher safety and user's safety in utilization object, and then promote Consumer's Experience.
A third aspect of the present invention, proposes a kind of terminal, comprises the secure login device according to any one of technique scheme, and therefore, this terminal has the technique effect identical with the secure login device according to any one of technique scheme, does not repeat them here.
By above technical scheme; by the login authentication mode that ciphertext character is verified and user's voice print verification combines only just known with user; the fail safe that user logs in effectively is improve while ensure that the fail safe of password; and by arranging at least two cover ciphertexts; and different matching results is set; effectively to guarantee the fail safe that the user person property, password and the terminal of user when being had to registration terminal or the needs etc. based on protection privacy by the dangerous circumstances of coercing use, thus promote Consumer's Experience.
Accompanying drawing explanation
Fig. 1 shows the schematic flow sheet of safe login method according to an embodiment of the invention;
Fig. 2 shows the block diagram of secure login device according to an embodiment of the invention;
Fig. 3 shows the block diagram of terminal according to an embodiment of the invention;
Fig. 4 shows according to an embodiment of the invention hiding character and arranges the schematic diagram at interface;
Fig. 5 shows the display interface schematic diagram of login authentication information according to an embodiment of the invention.
Embodiment
In order to more clearly understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, when not conflicting, the feature in the embodiment of the application and embodiment can combine mutually.
Set forth a lot of detail in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not by the restriction of following public specific embodiment.
Fig. 1 shows the schematic flow sheet of safe login method according to an embodiment of the invention.
As shown in Figure 1, safe login method according to an embodiment of the invention, comprising: step 102, and upon receiving the registration request, stochastic generation login authentication information, comprises default cipher-text information in described login authentication information; Step 104, receives the voice messaging that described user reads described login authentication information; Step 106, carries out secure log checking according to described voice messaging to described user.
In this technical scheme, when after the logging request receiving user, stochastic generation comprises the login authentication information of default cipher-text information, wherein, login authentication information is can be a string character string comprising numeral and/or letter with certain length comprising default cipher-text information, such as comprise the numeral of 6-20 character of default cipher-text information and the combination of letter, and to preset cipher-text information be a user's numeral of sets itself or letter as required, also can be that character length is shorter than multiple numeral of login authentication information character length and/or the combination of letter, and this login authentication information is presented to user read, and then the voice messaging of this login authentication information is read according to user, secure log checking is carried out to user, such as checking enters terminal operation interface or pays etc., so, by the login authentication mode that ciphertext character is verified and user's voice print verification combines only just known with user, the fail safe that user logs in effectively is improve while ensure that the fail safe of password, and arranged by simple ciphertext and meet user and do not wish that password is by the psychological needs expressly shown, and then improve Consumer's Experience.
In technique scheme, preferably, described step 106 specifically comprises: the cryptogram validation information obtaining typing when first voiceprint of described user and described user read described login authentication information according to described voice messaging; Judge whether described first voiceprint matches with default voiceprint, and whether described cryptogram validation information matches with described default cipher-text information; Determine whether described user is verified by secure log according to judged result.
In this technical scheme, when receiving user and reading the voice messaging of login authentication information, voiceprint and the cryptogram validation information of user is obtained according to this voice messaging, thus judge whether the user's voiceprint got matches with default voiceprint, and whether the cryptogram validation information that user inputs for default cipher-text information when reading is accurate, also need of course simultaneously to verify whether other information users in login authentication information except default cipher-text information read accurately, and then determine whether user verifies by secure log according to judged result, so, the login authentication mode that ciphertext character is verified and user's voice print verification combines only just known with user can be realized, improve the safety in utilization of terminal, and the privacy of user can better be protected, promote Consumer's Experience.
In above-mentioned arbitrary technical scheme, preferably, described default cipher-text information comprises the first default cipher-text information and the second default cipher-text information.
In this technical scheme, preferably can arrange two groups and preset cipher-text information, different default cipher-text information can corresponding different matching result, thus improve the fail safe of password further, to tackle emergency case, avoid single setting of Yin Miwen to cause harmful effect to the privacy of user and the safety in utilization of terminal, thus promote Consumer's Experience.
In above-mentioned arbitrary technical scheme, preferably, describedly determine whether described user is verified by secure log according to judged result, specifically comprise: when described first voiceprint of judgement and described default voiceprint match, and described cryptogram validation information and described first presets cipher-text information when matching, and determines that described user is verified by described secure log; When described first voiceprint of judgement and described default voiceprint match, and when described cryptogram validation information and the described second default cipher-text information match, the prompting login authentication system failure, or allow described user login to enter virtual system.
In this technical scheme, when the voiceprint of the user in the voice messaging received and the cryptogram validation information of typing all match with the default voiceprint pre-set and default cipher-text information, difference (namely presetting the difference of cipher-text information) according to the cryptogram validation information of user's typing can obtain different matching results, particularly: match if the cryptogram validation information of user's typing and first presets cipher-text information, then illustrate that the cryptogram validation information that user inputs is correct, allow user to be verified by secure log, match if the cryptogram validation information of user's typing and second presets cipher-text information, then illustrate that the cryptogram validation information of user's typing is wrong, now, the prompting login authentication system failure, or allow user's login to enter the virtual system set, namely user is not allowed to enter real operation interface, and do not point out the authorization information of input wrong, effectively to guarantee the user person property of user when being had to registration terminal or the needs etc. based on protection privacy by the dangerous circumstances of coercing, the fail safe that password and terminal use, thus lifting Consumer's Experience.
In above-mentioned arbitrary technical scheme, preferably, also comprised before the described logging request of reception: gather second voiceprint of described user as described default voiceprint; Cipher-text information is set as described default cipher-text information.
In this technical scheme, by the voiceprint of acquisition terminal user in advance and pre-set cipher-text information as judgment standard, be user and whether Successful login terminal can provide foundation, guarantee effective enforcement of the login authentication mode that ciphertext character is verified and user's voice print verification combines only just known with user, reach and improve cipher safety and user's safety in utilization object, and then promote Consumer's Experience.
Fig. 2 shows the block diagram of secure login device according to an embodiment of the invention.
As shown in Figure 2, secure login device 200 according to an embodiment of the invention, comprising: generation module 202, receiver module 204 and authentication module 206.
Wherein, generation module 202 is for upon receiving the registration request, and stochastic generation login authentication information, comprises default cipher-text information in described login authentication information; Receiver module 204 reads the voice messaging of the described login authentication information of described generation module 202 stochastic generation for receiving described user; Authentication module 206 carries out secure log checking for the described voice messaging received according to described receiver module 204 to described user.
In this technical scheme, when after the logging request receiving user, stochastic generation comprises the login authentication information of default cipher-text information, wherein, login authentication information is can be a string character string comprising numeral and/or letter with certain length comprising default cipher-text information, such as comprise the numeral of 6-20 character of default cipher-text information and the combination of letter, and to preset cipher-text information be a user's numeral of sets itself or letter as required, also can be that character length is shorter than multiple numeral of login authentication information character length and/or the combination of letter, and this login authentication information is presented to user read, and then the voice messaging of this login authentication information is read according to user, secure log checking is carried out to user, such as checking enters terminal operation interface or pays etc., so, by the login authentication mode that ciphertext character is verified and user's voice print verification combines only just known with user, the fail safe that user logs in effectively is improve while ensure that the fail safe of password, and arranged by simple ciphertext and meet user and do not wish that password is by the psychological needs expressly shown, and then improve Consumer's Experience.
In technique scheme, preferably, described authentication module 206 specifically comprises: acquisition module 2062, judge module 2064 and determination module 2066.
Wherein, acquisition module 2062 obtains the cryptogram validation information of typing when first voiceprint of described user and described user read the described login authentication information of described generation module 202 stochastic generation for the described voice messaging received according to described receiver module 204; Whether judge module 2064 matches with default voiceprint for described first voiceprint judging described acquisition module 2062 and get, and whether the described cryptogram validation information that described acquisition module 2062 gets matches with described default cipher-text information; For the judged result generated according to described judge module 2064, determination module 2066 determines whether described user is verified by secure log.
In this technical scheme, when receiving user and reading the voice messaging of login authentication information, voiceprint and the cryptogram validation information of user is obtained according to this voice messaging, thus judge whether the user's voiceprint got matches with default voiceprint, and whether the cryptogram validation information that user inputs for default cipher-text information when reading is accurate, also need of course simultaneously to verify whether other information users in login authentication information except default cipher-text information read accurately, and then determine whether user verifies by secure log according to judged result, so, the login authentication mode that ciphertext character is verified and user's voice print verification combines only just known with user can be realized, improve the safety in utilization of terminal, and the privacy of user can better be protected, promote Consumer's Experience.
In above-mentioned arbitrary technical scheme, preferably, described default cipher-text information comprises the first default cipher-text information and the second default cipher-text information.
In this technical scheme, preferably can arrange two groups and preset cipher-text information, different default cipher-text information can corresponding different matching result, thus improve the fail safe of password further, to tackle emergency case, avoid single setting of Yin Miwen to cause harmful effect to the privacy of user and the safety in utilization of terminal, thus promote Consumer's Experience.
In above-mentioned arbitrary technical scheme, preferably, described determination module 2066 specifically for: when described judge module 2064 judges that described first voiceprint and described default voiceprint match, and described cryptogram validation information and described first presets cipher-text information when matching, and determines that described user is verified by described secure log; When described judge module 2064 judges that described first voiceprint and described default voiceprint match, and described cryptogram validation information and described second presets cipher-text information when matching, the prompting login authentication system failure, or allow described user login to enter virtual system.
In this technical scheme, when the voiceprint of the user in the voice messaging received and the cryptogram validation information of typing all match with the default voiceprint pre-set and default cipher-text information, difference (namely presetting the difference of cipher-text information) according to the cryptogram validation information of user's typing can obtain different matching results, particularly: match if the cryptogram validation information of user's typing and first presets cipher-text information, then illustrate that the cryptogram validation information that user inputs is correct, allow user to be verified by secure log, match if the cryptogram validation information of user's typing and second presets cipher-text information, then illustrate that the cryptogram validation information of user's typing is wrong, now, the prompting login authentication system failure, or allow user's login to enter the virtual system set, namely user is not allowed to enter real operation interface, and do not point out the authorization information of input wrong, effectively to guarantee the user person property of user when being had to registration terminal or the needs etc. based on protection privacy by the dangerous circumstances of coercing, the fail safe that password and terminal use, thus lifting Consumer's Experience.
In above-mentioned arbitrary technical scheme, preferably, also comprise: acquisition module 208, for gathering second voiceprint of described user as described default voiceprint; Module 210 is set, for arranging cipher-text information as described default cipher-text information.
In this technical scheme, by the voiceprint of acquisition terminal user in advance and pre-set cipher-text information as judgment standard, be user and whether Successful login terminal can provide foundation, guarantee effective enforcement of the login authentication mode that ciphertext character is verified and user's voice print verification combines only just known with user, reach and improve cipher safety and user's safety in utilization object, and then promote Consumer's Experience.
Fig. 3 shows the block diagram of terminal according to an embodiment of the invention.
As shown in Figure 3, terminal 300 according to an embodiment of the invention, comprises the secure login device 200 according to any one of technique scheme, therefore, this terminal 300 has the technique effect identical with the secure login device 200 according to any one of technique scheme, does not repeat them here.
Below in conjunction with Fig. 4 and Fig. 5, technical scheme of the present invention is further described.
Fig. 4 shows according to an embodiment of the invention hiding character and arranges the schematic diagram at interface.
Fig. 5 shows the display interface schematic diagram of login authentication information according to an embodiment of the invention.
Vocal print collection and setting hide character (as password figure): system first gathers, keep the voiceprint of user and set and hide character (as password protection numeral), namely gather pre-set user voiceprint and cipher-text information is set as default cipher-text information, what hide character arranges one of interface illustrated embodiment as shown in Figure 4, as above hide character (as password protection numeral), user will arrange two covers, corresponding real password (such as, 8) and dummy letter (such as, 9).
So, during login, require all characters (comprise and hiding character (as password protection numeral)) of user's verification tip on request, namely the login authentication information that prompting comprises default cipher-text information is read for user, the display interface schematic diagram of login authentication information as shown in Figure 5, when (as the password protection numeral) coupling that hides character is for dummy letter, prompt cipher mistake can not be pointed out, the non-user reasons such as user's cue circuit, service fault should be given, certainly also can allow and be verified, but what enter is another set of virtual system; When (as the password protection numeral) coupling that hides character is for real password, normally log in.
As above hide character (as password protection numeral), and user according to circumstances can say real password, or dummy letter, to reach the object of safety and protection privacy.
Technical scheme of the present invention stresses to utilize two covers to hide character (as password protection numeral) by providing one, also more can ensure user by the dangerous circumstances of coercing or based on the state of protection privacy under the safety of user.
More than be described with reference to the accompanying drawings technical scheme of the present invention; by the login authentication mode that ciphertext character is verified and user's voice print verification combines only just known with user; the fail safe that user logs in effectively is improve while ensure that the fail safe of password; and by arranging at least two cover ciphertexts; and different matching results is set; effectively to guarantee the fail safe that the user person property, password and the terminal of user when being had to registration terminal or the needs etc. based on protection privacy by the dangerous circumstances of coercing use, thus promote Consumer's Experience.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (11)

1. a safe login method, is characterized in that, comprising:
Upon receiving the registration request, stochastic generation login authentication information, comprises default cipher-text information in described login authentication information;
Receive the voice messaging that described user reads described login authentication information;
According to described voice messaging, secure log checking is carried out to described user.
2. safe login method according to claim 1, is characterized in that, describedly carries out secure log checking according to described voice messaging to described user, specifically comprises:
The cryptogram validation information of typing when first voiceprint of described user and described user read described login authentication information is obtained according to described voice messaging;
Judge whether described first voiceprint matches with default voiceprint, and whether described cryptogram validation information matches with described default cipher-text information;
Determine whether described user is verified by secure log according to judged result.
3. safe login method according to claim 2, is characterized in that, described default cipher-text information comprises first and presets cipher-text information and the second default cipher-text information.
4. safe login method according to claim 3, is characterized in that, describedly determines whether described user is verified by secure log, specifically comprises according to judged result:
When described first voiceprint of judgement and described default voiceprint match, and when described cryptogram validation information and the described first default cipher-text information match, determine that described user is verified by described secure log;
When described first voiceprint of judgement and described default voiceprint match, and when described cryptogram validation information and the described second default cipher-text information match, the prompting login authentication system failure, or allow described user login to enter virtual system.
5. the safe login method according to any one of claim 2 to 4, is characterized in that, also comprises before the described logging request of reception:
Gather second voiceprint of described user as described default voiceprint;
Cipher-text information is set as described default cipher-text information.
6. a secure login device, is characterized in that, comprising:
Generation module, for upon receiving the registration request, stochastic generation login authentication information, comprises default cipher-text information in described login authentication information;
Receiver module, reads the voice messaging of the described login authentication information of described generation module stochastic generation for receiving described user;
Authentication module, carries out secure log checking for the described voice messaging received according to described receiver module to described user.
7. secure login device according to claim 6, is characterized in that, described authentication module specifically comprises:
Acquisition module, the described voice messaging for receiving according to described receiver module obtains the cryptogram validation information of typing when first voiceprint of described user and described user read the described login authentication information of described generation module stochastic generation;
Judge module, for judging whether described first voiceprint that described acquisition module gets matches with default voiceprint, and whether the described cryptogram validation information that described acquisition module gets matches with described default cipher-text information;
Determination module, the judged result for generating according to described judge module determines whether described user is verified by secure log.
8. secure login device according to claim 7, is characterized in that, described default cipher-text information comprises first and presets cipher-text information and the second default cipher-text information.
9. secure login device according to claim 8, is characterized in that, described determination module specifically for:
When described judge module judges that described first voiceprint and described default voiceprint match, and when described cryptogram validation information and the described first default cipher-text information match, determine that described user is verified by described secure log;
When described judge module judges that described first voiceprint and described default voiceprint match, and described cryptogram validation information and described second presets cipher-text information when matching, the prompting login authentication system failure, or allow described user login to enter virtual system.
10. the secure login device according to any one of claim 7 to 9, is characterized in that, also comprises:
Acquisition module, for gathering second voiceprint of described user as described default voiceprint;
Module is set, for arranging cipher-text information as described default cipher-text information.
11. 1 kinds of terminals, is characterized in that, comprise the secure login device according to any one of claim 6 to 10.
CN201511020571.2A 2015-12-30 2015-12-30 Safe login method and device, terminal Active CN105450665B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511020571.2A CN105450665B (en) 2015-12-30 2015-12-30 Safe login method and device, terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511020571.2A CN105450665B (en) 2015-12-30 2015-12-30 Safe login method and device, terminal

Publications (2)

Publication Number Publication Date
CN105450665A true CN105450665A (en) 2016-03-30
CN105450665B CN105450665B (en) 2018-11-06

Family

ID=55560441

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511020571.2A Active CN105450665B (en) 2015-12-30 2015-12-30 Safe login method and device, terminal

Country Status (1)

Country Link
CN (1) CN105450665B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107784211A (en) * 2017-11-06 2018-03-09 北京小米移动软件有限公司 Method of password authentication and device
CN108664784A (en) * 2017-04-01 2018-10-16 阿里巴巴集团控股有限公司 Alarm method, apparatus and system
CN109327446A (en) * 2018-10-23 2019-02-12 中国银行股份有限公司 Identity identifying method, server, client and system
CN109515385A (en) * 2018-12-05 2019-03-26 上海博泰悦臻电子设备制造有限公司 Prevent the method, vehicle device and vehicle of vocal print Replay Attack
CN109639724A (en) * 2019-01-14 2019-04-16 平安科技(深圳)有限公司 Password method for retrieving, password device for retrieving, computer equipment and storage medium
CN111090846A (en) * 2019-12-06 2020-05-01 中信银行股份有限公司 Login authentication method and device, electronic equipment and computer readable storage medium
CN112086099A (en) * 2019-06-14 2020-12-15 上海观轶教育科技有限公司 Student-leaving teaching guidance management system and method
CN117457006A (en) * 2023-12-25 2024-01-26 北京语艺星光文化传媒有限公司 Dubbing decision method and system for 3D printing handhold

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102402985A (en) * 2010-09-14 2012-04-04 盛乐信息技术(上海)有限公司 Voiceprint authentication system for improving voiceprint identification safety and method for realizing the same
CN102543084A (en) * 2010-12-29 2012-07-04 盛乐信息技术(上海)有限公司 Online voiceprint recognition system and implementation method thereof
US20140359736A1 (en) * 2013-05-31 2014-12-04 Deviceauthority, Inc. Dynamic voiceprint authentication
CN104717219A (en) * 2015-03-20 2015-06-17 百度在线网络技术(北京)有限公司 Vocal print login method and device based on artificial intelligence
CN104821934A (en) * 2015-03-20 2015-08-05 百度在线网络技术(北京)有限公司 Artificial intelligence based voice print login method and device
CN105007267A (en) * 2015-06-29 2015-10-28 蔡桂钧 Privacy protection method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102402985A (en) * 2010-09-14 2012-04-04 盛乐信息技术(上海)有限公司 Voiceprint authentication system for improving voiceprint identification safety and method for realizing the same
CN102543084A (en) * 2010-12-29 2012-07-04 盛乐信息技术(上海)有限公司 Online voiceprint recognition system and implementation method thereof
US20140359736A1 (en) * 2013-05-31 2014-12-04 Deviceauthority, Inc. Dynamic voiceprint authentication
CN104717219A (en) * 2015-03-20 2015-06-17 百度在线网络技术(北京)有限公司 Vocal print login method and device based on artificial intelligence
CN104821934A (en) * 2015-03-20 2015-08-05 百度在线网络技术(北京)有限公司 Artificial intelligence based voice print login method and device
CN105007267A (en) * 2015-06-29 2015-10-28 蔡桂钧 Privacy protection method and device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108664784A (en) * 2017-04-01 2018-10-16 阿里巴巴集团控股有限公司 Alarm method, apparatus and system
CN107784211A (en) * 2017-11-06 2018-03-09 北京小米移动软件有限公司 Method of password authentication and device
CN109327446A (en) * 2018-10-23 2019-02-12 中国银行股份有限公司 Identity identifying method, server, client and system
CN109515385A (en) * 2018-12-05 2019-03-26 上海博泰悦臻电子设备制造有限公司 Prevent the method, vehicle device and vehicle of vocal print Replay Attack
CN109639724A (en) * 2019-01-14 2019-04-16 平安科技(深圳)有限公司 Password method for retrieving, password device for retrieving, computer equipment and storage medium
CN109639724B (en) * 2019-01-14 2023-04-07 平安科技(深圳)有限公司 Password retrieving method, password retrieving device, computer device and storage medium
CN112086099A (en) * 2019-06-14 2020-12-15 上海观轶教育科技有限公司 Student-leaving teaching guidance management system and method
CN111090846A (en) * 2019-12-06 2020-05-01 中信银行股份有限公司 Login authentication method and device, electronic equipment and computer readable storage medium
CN117457006A (en) * 2023-12-25 2024-01-26 北京语艺星光文化传媒有限公司 Dubbing decision method and system for 3D printing handhold
CN117457006B (en) * 2023-12-25 2024-03-12 北京语艺星光文化传媒有限公司 Dubbing decision method and system for 3D printing handhold

Also Published As

Publication number Publication date
CN105450665B (en) 2018-11-06

Similar Documents

Publication Publication Date Title
CN105450665A (en) Secure login method, secure login device and terminal
CN101192926B (en) Account protection method and system
US8037511B1 (en) Utilizing a mobile device to operate an electronic locking mechanism
US8590024B2 (en) Method for generating digital fingerprint using pseudo random number code
CN106453205B (en) identity verification method and device
CN104202338B (en) A kind of safety access method being applicable to enterprise-level Mobile solution
CN106161348B (en) Single sign-on method, system and terminal
CN105553926A (en) Authentication method, server, and terminal
CN106650404A (en) Terminal legality verifying method and device
CN103795724A (en) Method for protecting account security based on asynchronous dynamic password technology
CN105791282B (en) A kind of method for protecting privacy, mobile terminal and wearable device
WO2017076216A1 (en) Server, mobile terminal, and internet real name authentication system and method
CN105405185A (en) Safety verifying method and apparatus thereof
KR20150011305A (en) Biometric authentication electronic signature registration methods using an instant messenger
KR101679771B1 (en) Method, device, and system for identity authentication
CN104219303A (en) Access control verification method and access control verification system
CN101795196A (en) Authentication method and authentication system for logging in to online banks
JPWO2020004486A5 (en)
CN102609656A (en) USB (universal serial bus) key safety enhancing method and USB key safety enhancing system based on image identification
CN105722084A (en) Authentication method based on embedded subscriber identity module, and terminal
KR101548933B1 (en) System for securiting mobile and method therefor
CN101854357B (en) Method and system for monitoring network authentication
CN106529232A (en) Startup method and device
KR101635598B1 (en) Method, device, and system for authentication
CN106982214A (en) A kind of cloud desktop security of use NFC technique logs in ID card and cloud desktop security login method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant