CN105991280A - User authentication method and system - Google Patents

User authentication method and system Download PDF

Info

Publication number
CN105991280A
CN105991280A CN201510052985.7A CN201510052985A CN105991280A CN 105991280 A CN105991280 A CN 105991280A CN 201510052985 A CN201510052985 A CN 201510052985A CN 105991280 A CN105991280 A CN 105991280A
Authority
CN
China
Prior art keywords
speech cipher
voice
imei
user
imsi
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510052985.7A
Other languages
Chinese (zh)
Inventor
周成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Hubei Co Ltd
Original Assignee
China Mobile Group Hubei Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Hubei Co Ltd filed Critical China Mobile Group Hubei Co Ltd
Priority to CN201510052985.7A priority Critical patent/CN105991280A/en
Publication of CN105991280A publication Critical patent/CN105991280A/en
Pending legal-status Critical Current

Links

Abstract

The present invention discloses a user authentication method. The method comprises: collecting N voice at a terminal to take as user's voice passwords and editing numbers of the collected N voice to upload a server, wherein the N is a positive integer larger than 1; inputting corresponding voice passwords of an assigned number in the prompt information according the prompt information in the user interface of the terminal at the terminal, packaging the voice passwords into an authentication request and sending the voice passwords to the sever; receiving the authentication request and analyzing the voice passwords through the server, matching voice content and/or voiceprint of the voice passwords according to the numbers corresponding to the voice passwords, and performing authentication passing after successful matching.

Description

A kind of user authen method and system
Technical field
The present invention relates to authentication techniques, particularly relate to a kind of user authen method and system.
Background technology
Present inventor, during realizing the embodiment of the present application technical scheme, at least finds correlation technique The following technical problem of middle existence:
Along with the gradually development of Mobile Market, mobile terminal client terminal emerges in an endless stream, and is not only users' Mobile APP, also occurs in that inside operator that many (palm warp point, palm 4A etc.) are relevant with production APP, and current user authentication mode is simple and dangerous, faces a severe challenge.
Existing technical scheme mainly includes several or the most several following combination:
Mode one: by the user authentication mode of user name+static password;
Mode two: by the user authentication mode of user name+dynamic password;
Mode three: by the user authentication mode of user name+gesture password;
Above several ways there is the problem that security of system is poor, the user name of user, password or Person's gesture password is the most stolen by others, after once user name, password or gesture password are stolen, simultaneously If lost mobile phone, other people can enter easily system access user data, system cannot discover user's exception feelings Condition, if mobile phone is obtained by rival, leakage of data will bring the biggest loss to enterprise.
For the problems referred to above, correlation technique does not exist effective solution.
Summary of the invention
In view of this, the embodiment of the present invention, desirable to provide a kind of user authen method and system, solve at least The problems referred to above that prior art exists.
The technical scheme of the embodiment of the present invention is achieved in that
A kind of user authen method of the embodiment of the present invention, described method includes:
Gather N number of voice speech cipher as user in end side, and the described N number of voice gathered is divided It is uploaded to server after not corresponding editor's sequence number;Described N is the positive integer more than 1;
Corresponding described information middle finger sequencing is inputted according to the information of end side user interface in end side Number speech cipher, and described speech cipher is encapsulated into certification request in be sent to described server;
Described server receives described certification request, and parses described speech cipher, by described speech cipher Carry out the coupling of voice content and/or vocal print according to the sequence number corresponding with described speech cipher, recognize after the match is successful Card passes through.
In such scheme, described method also includes:
Described gather N number of voice as the speech cipher of user in end side, and the described N number of language that will gather Before being uploaded to server after the not corresponding editor's sequence number of cent, simultaneously or after, go back the first of acquisition terminal Number and the second number, and by described first number and the second number and described speech cipher simultaneously or successively on Pass to described server, to realize the encryption certification that trigram merges.
In such scheme, described method also includes:
Described speech cipher is carried out voice content and/or vocal print according to the sequence number corresponding with described speech cipher Coupling before, simultaneously or after, by extracting described first number and the second number close with described voice The matching result of code realizes the decrypted authentication that trigram merges together.
In such scheme, described first number is IMEI, and described second number is IMSI number;
Described by extracting described first number and the second number and together with the matching result of described speech cipher Realize the decrypted authentication that trigram merges, including:
Matching result to described speech cipher is that the match is successful, then speech cipher certification is passed through, IMSI number Code, IMEI, all by certification, enter system.
In such scheme, described first number is IMEI, and described second number is IMSI number;
Described by extracting described first number and the second number and together with the matching result of described speech cipher Realize the decrypted authentication that trigram merges, including:
Unsuccessful for coupling to the matching result of described speech cipher, then speech cipher certification is not passed through, and returns Login failure information;Or,
Matching result to described speech cipher is that the match is successful, then voice authentication passes through, IMSI number and IMEI checking is not passed through, and returns login failure information.
In such scheme, described first number is IMEI, and described second number is IMSI number;
Described by extracting described first number and the second number and together with the matching result of described speech cipher Realize the decrypted authentication that trigram merges, including:
Matching result to described speech cipher is that the match is successful, then voice authentication passes through, IMSI number is correct, IMEI is incorrect, and prompting user updates IMEI;Or,
Matching result to described speech cipher is that the match is successful, then voice authentication passes through, and IMSI number is the most just Really, IMEI is correct, and prompting user updates IMSI.
A kind of customer certification system of the embodiment of the present invention, described system includes:
Terminal, for gathering N number of voice speech cipher as user, and the described N number of voice that will gather It is uploaded to server respectively after corresponding editor's sequence number;Described N is the positive integer more than 1;Use according to end side The information at interface, family inputs the speech cipher of appointed sequence number in corresponding described information, and by institute's predicate The loading certification request of sound cipher seal is sent to described server;
Server, receives described certification request for described server, and parses described speech cipher, will Described speech cipher carries out the coupling of voice content and/or vocal print according to the sequence number corresponding with described speech cipher, After the match is successful, certification is passed through.
In such scheme, described terminal, it is further used for gathering N number of voice language as user in end side Before being uploaded to server after sound password, and the described N number of voice that will gather correspondence editor sequence number respectively, Simultaneously or after, go back the first number and second number of acquisition terminal, and by described first number and No. second Code and described speech cipher upload to described server simultaneously or successively, to realize the encryption certification that trigram merges.
In such scheme, described server, it is further used for described speech cipher according to close with described voice Before the sequence number that code is corresponding carries out the coupling of voice content and/or vocal print, simultaneously or after, described by extracting First number and the second number also realize the deciphering that trigram merges together with the matching result of described speech cipher and recognize Card.
In such scheme, described server, being further used for described first number is IMEI, described In the case of second number is IMSI number, the matching result to described speech cipher is that the match is successful, then Speech cipher certification is passed through, IMSI number, IMEI all by certification, enter system.
In such scheme, described server, being further used for described first number is IMEI, described It is in the case of second number is IMSI number, unsuccessful for coupling to the matching result of described speech cipher, Then speech cipher certification is not passed through, and returns login failure information;Or, the coupling of described speech cipher is tied Fruit is that the match is successful, then voice authentication passes through, and IMSI number and IMEI checking are not passed through, and return is stepped on Record failure information.
In such scheme, described server, being further used for described first number is IMEI, described In the case of second number is IMSI number, the matching result to described speech cipher is that the match is successful, then Voice authentication passes through, and IMSI number is correct, IMEI is incorrect, and prompting user updates IMEI;Or, Matching result to described speech cipher is that the match is successful, then voice authentication passes through, and IMSI number is incorrect, IMEI is correct, and prompting user updates IMSI.
The method of the embodiment of the present invention includes: gather N number of voice speech cipher as user in end side, And it is uploaded to server after the described N number of voice gathered respectively corresponding editor's sequence number;Described N is more than 1 Positive integer;Input in corresponding described information according to the information of end side user interface in end side The speech cipher of appointed sequence number, and described speech cipher is encapsulated into certification request in be sent to described server; Described server receives described certification request, and parses described speech cipher, by described speech cipher according to The sequence number corresponding with described speech cipher carries out the coupling of voice content and/or vocal print, and after the match is successful, certification is led to Cross.
Use the embodiment of the present invention, by the corresponding preservation of speech cipher and sequence number thereof, in order to follow-up to sequence The content of number corresponding speech cipher and/or vocal print carry out mating the mode of certification, due to voice content and sound thereof Stricture of vagina is uniquely corresponding to user, it is not easy to stolen by other people, therefore can improve security of system, thus Avoiding the existing authentication techniques of employing makes other people can enter system access user data easily, and system cannot be examined Feel user's abnormal conditions, if mobile phone is obtained by rival, leakage of data will bring the biggest damage to enterprise The problem lost.
Accompanying drawing explanation
Fig. 1 is the flowchart of embodiment of the present invention user authen method;
Fig. 2 is that the user speech password of the application embodiment of the present invention one scene arranges schematic diagram;
Fig. 3 is that when applying the user of the embodiment of the present invention one scene to log in client, prompting user speech password is defeated The schematic diagram entered;
Fig. 4 is the user speech cipher setting procedures figure of the application embodiment of the present invention one scene present invention;
Fig. 5 is the user log-in authentication flow chart of the application embodiment of the present invention one scene present invention.
Detailed description of the invention
Enforcement to technical scheme is described in further detail below in conjunction with the accompanying drawings.
A kind of user authen method of the embodiment of the present invention, as it is shown in figure 1, include:
Step 101, gather N number of voice as the speech cipher of user in end side, and described in gathering It is uploaded to server after N number of voice corresponding editor's sequence number respectively;Described N is the positive integer more than 1;
Step 102, input corresponding described prompting letter in end side according to the information of end side user interface The speech cipher of appointed sequence number in breath, and described speech cipher is encapsulated into certification request in be sent to described clothes Business device;
Step 103, described server receive described certification request, and parse described speech cipher, by institute State speech cipher and carry out the coupling of voice content and/or vocal print according to the sequence number corresponding with described speech cipher, After being made into merit, certification is passed through.
In the embodiment of the present invention one embodiment, described method also includes:
Described gather N number of voice as the speech cipher of user in end side, and the described N number of language that will gather Before being uploaded to server after the not corresponding editor's sequence number of cent, simultaneously or after, go back the first of acquisition terminal Number and the second number, and by described first number and the second number and described speech cipher simultaneously or successively on Pass to described server, to realize the encryption certification that trigram merges.
In the embodiment of the present invention one embodiment, described method also includes:
Described speech cipher is carried out voice content and/or vocal print according to the sequence number corresponding with described speech cipher Coupling before, simultaneously or after, by extracting described first number and the second number close with described voice The matching result of code realizes the decrypted authentication that trigram merges together.
In the embodiment of the present invention one embodiment, described first number is IMEI, described No. second Code is IMSI number;
Described by extracting described first number and the second number and together with the matching result of described speech cipher Realize the decrypted authentication that trigram merges, including:
Matching result to described speech cipher is that the match is successful, then speech cipher certification is passed through, IMSI number Code, IMEI, all by certification, enter system.
In the embodiment of the present invention one embodiment, described first number is IMEI, described No. second Code is IMSI number;
Described by extracting described first number and the second number and together with the matching result of described speech cipher Realize the decrypted authentication that trigram merges, including:
Unsuccessful for coupling to the matching result of described speech cipher, then speech cipher certification is not passed through, and returns Login failure information;Or,
Matching result to described speech cipher is that the match is successful, then voice authentication passes through, IMSI number and IMEI checking is not passed through, and returns login failure information.
In the embodiment of the present invention one embodiment, described first number is IMEI, described No. second Code is IMSI number;
Described by extracting described first number and the second number and together with the matching result of described speech cipher Realize the decrypted authentication that trigram merges, including:
Matching result to described speech cipher is that the match is successful, then voice authentication passes through, IMSI number is correct, IMEI is incorrect, and prompting user updates IMEI;Or,
Matching result to described speech cipher is that the match is successful, then voice authentication passes through, and IMSI number is the most just Really, IMEI is correct, and prompting user updates IMSI.
A kind of customer certification system of the embodiment of the present invention, including:
Terminal, for gathering N number of voice speech cipher as user, and the described N number of voice that will gather It is uploaded to server respectively after corresponding editor's sequence number;Described N is the positive integer more than 1;Use according to end side The information at interface, family inputs the speech cipher of appointed sequence number in corresponding described information, and by institute's predicate The loading certification request of sound cipher seal is sent to described server;
Server, receives described certification request for described server, and parses described speech cipher, will Described speech cipher carries out the coupling of voice content and/or vocal print according to the sequence number corresponding with described speech cipher, After the match is successful, certification is passed through.
In the embodiment of the present invention one embodiment, described terminal, it is further used for gathering N number of in end side Voice is as the speech cipher of user, and uploads after the described N number of voice gathered respectively corresponding editor's sequence number Before server, simultaneously or after, go back the first number and second number of acquisition terminal, and by described First number and the second number upload to described server, to realize three with described speech cipher simultaneously or successively The encryption certification that code merges.
In the embodiment of the present invention one embodiment, described server, it is further used for described speech cipher Carry out the coupling of voice content and/or vocal print according to the sequence number corresponding with described speech cipher before, simultaneously or it After, by extracting described first number and the second number and realizing together with the matching result of described speech cipher The decrypted authentication that trigram merges.
In the embodiment of the present invention one embodiment, described server, being further used for described first number is IMEI, in the case of described second number is IMSI number, the matching result to described speech cipher For the match is successful, then speech cipher certification is passed through, IMSI number, IMEI all by certification, enter Enter system.
In the embodiment of the present invention one embodiment, described server, being further used for described first number is IMEI, in the case of described second number is IMSI number, the matching result to described speech cipher Unsuccessful for coupling, then speech cipher certification is not passed through, and returns login failure information;Or, to institute's predicate The matching result of sound password is that the match is successful, then voice authentication passes through, IMSI number and IMEI checking Do not pass through, return login failure information.
In the embodiment of the present invention one embodiment, described server, being further used for described first number is IMEI, in the case of described second number is IMSI number, the matching result to described speech cipher For the match is successful, then voice authentication passes through, and IMSI number is correct, IMEI is incorrect, points out user Update IMEI;Or, the matching result to described speech cipher is that the match is successful, then voice authentication passes through, IMSI number is incorrect, and IMEI is correct, and prompting user updates IMSI.
Hereinafter by a real world applications scene, the embodiment of the present invention is described below:
The user security that the application scenarios of the application embodiment of the present invention relates in mobile terminal client terminal application is recognized Card.By this user authentication to mobile terminal client terminal, it is possible to provide the user more perfect user and recognize Card means, greatly promote safety, described separately below.
Application scenarios one:
The mobile terminal client terminal user authen method of the application embodiment of the present invention, as in figure 2 it is shown, include using The process that family speech cipher is arranged.Concrete, the process that user speech password is arranged is:
A1, gather user's N number of voice speech cipher as user respectively at client-side;Such as, Fig. 2 In client user interface eject information " Article 1 sound password is set ", user is according to this prompting The requirement of information, reads out the Article 1 sound password of oneself in center Screen region.
A2, the user speech cryptographic libraries of side that the N number of voice collected is uploaded onto the server.
Application scenarios two:
The mobile terminal client terminal user authen method of the application embodiment of the present invention, as it is shown on figure 3, include language Sound password verification process, concrete, speech cipher proof procedure is:
When b1, user log in the client of mobile terminal, the random digit numbering input be given according to client The speech cipher of the respective digital numbering set in advance, such as the information ejected in client user interface " speech cipher checking ", user, according to the requirement of this information, reads out oneself in center Screen region Article 5, sound password.
B2, background server side carry out voice content checking and voice print verification to the speech cipher of input.
It is to be herein pointed out client can be to possess authentication function what mobile terminal system carried Application, or the application possessing authentication function that user installs voluntarily.
It is to be herein pointed out except the speech verification in above-mentioned scene, the embodiment of the present invention can also be simultaneously Automatically extract the IMEI of mobile phone and IMSI number to carry out other checkings assisted, to realize based on language Sound password, user's IMEI, IMSI combined ciphering trigram checking, described auxiliary other checking include with The most what time:
1, user logs in number of times checking: when user IMEI, IMSI are verified, and server can check user Logging in whether number of times exceedes server predetermined number of times, as exceeded, account can be locked;
2, checking user IMSI is incorrect: if user IMSI is incorrect, and IMEI is correct, then system can carry Show cell-phone number when user inputs registration, complete the replacement of IMSI;If user mobile phone number is forgotten, cannot Log in, can only coupled system manager;
3, checking user IMEI is incorrect: if IMSI is correct, IMEI is incorrect, then need user certainly Row certification, server can ask to reset user IMEI according to user;
4, user IMSI, IMEI is the most incorrect, then system can directly point out user's input handset taken in conjunction Manager, completes the initialization of log-on message.
By the above-mentioned application embodiment of the present invention preferred trigram binding validatation, it may be assumed that defeated when being logged in by user As checking foundation after the speech cipher that enters, user's IMEI, IMSI combined ciphering, by and remote service Management component completes whole proof procedure.Proof procedure sufficiently may be sent out in view of in authentication procedures Raw multiple abnormal conditions, machine as hand-off in user causes IMEI to change, user changes Mobile phone card and causes IMSI to change Change, user mobile phone and cell-phone number all change different situations such as (then need to contact manager and be equal to newly open user).
Hereinafter, the mobile client user authentication side of the application embodiment of the present invention is described in detail in conjunction with accompanying drawing 4-5 Method.
Application scenarios three: user speech password scene set, as shown in Figure 4, including:
Step 201: client provides initial speech password sequence number.
Step 202: user inputs random voice after seeing system prompt.
Step 203: user chooses whether to terminate input speech cipher, if it is, perform step 204;If No, speech cipher sequence number adds up, and continues to allow user input voice password simultaneously.
Step 204, all of speech cipher sequence number and corresponding speech cipher are sent to server end, make Foundation for user log-in authentication.
After having performed the process of above-mentioned steps 201-204, can continue execution step shown in Fig. 5.
Application scenarios four: user log-in authentication scene, as it is shown in figure 5, include:
When step 301, user log in, the phase that the input of numeral immediately be given according to client sets in advance Should the digital speech cipher numbered.
Step 302, program obtain sim card unique identifier IMSI number, as IMSI parameter.
Step 303, program obtain terminal unique identifier IMEI, as IMEI parameter.
Here, the order of above-mentioned steps 301-303 can be in no particular order.
Speech cipher, IMSI number, IMEI are combined and encrypt by step 304, client, please Asking subscriber authentication, by http protocol, request remote service user verifies assembly.
Here, ending step 304, client completes three code encryptions, and request server side carries out user cipher Checking, follow-up, the user cipher of input and the combination of IMSI number, IMEI are deciphered by server side Checking.
Step 305, the user of server side verify that speech cipher, IMSI number, IMEI are entered by assembly Row deciphering.
Step 306, user verify that speech cipher content is verified by assembly, verify whether set by me Put speech cipher.
Step 307, user verify that speech cipher vocal print is verified by assembly, verify whether as me.
Step 308, user verify that IMSI number is verified by assembly.
Step 309, user verify that IMEI is verified by assembly.
The identity identification information of client request is analyzed in the checking of step 310, service end, and parsing obtains different The result, and the corresponding process performed for different the results.
Here, step 310 particularly as follows:
Whether step 3101, voice, IMSI, IMEI checking be full by, it is judged that branch 1): if voice Password, IMSI number, IMEI, all by checking, enter system;Judge branch 2): if language Sound password authentification is not passed through, and returns login failure information;Judge branch 3): if speech verification is passed through, IMSI Number and IMEI checking are not passed through, and return login failure information;Judge branch 4): if voice is tested Card passes through, and IMSI is correct, user IMEI is incorrect, and prompting user updates IMEI, i.e. needs user voluntarily Certification, server can ask to reset user IMEI according to user;Judge branch 5): user IMSI is incorrect, IMEI is correct, and prompting user updates IMSI, cell-phone number when i.e. system can point out user to input registration, complete Become the replacement of IMSI.Separately, if user mobile phone number is forgotten, cannot log in, can only coupled system manager.
In sum, the beneficial effect using the embodiment of the present invention to reach includes:
1. checking IMEI can ensure that unique legitimacy of user terminal, thus has evaded user mobile phone Or after a number card is lost, the risk usurped of being changed planes by other people;
2. checking IMSI number can ensure that the uniqueness legitimacy of Subscriber Number, thus has evaded user's hands The risk that machine is usurped by other people number of changing after losing;
3.IMEI with IMSI number is automatically extracted by system, be not required to user's input, compare present mode and simplify User operation;
4. the use of speech cipher technology will bring client and preferably experience and safety, the extremely difficult quilt of speech cipher Stealing, even if being stolen speech cipher content by other people, vocal print comparison technology can avoid the copying voice by other people;
Owing to the combined authentication mode of speech cipher, IMEI and IMSI can meet case above, therefore simultaneously There is more preferable safety and more preferable Consumer's Experience.
If module integrated described in the embodiment of the present invention realizes and as independent using the form of software function module Production marketing or use time, it is also possible to be stored in a computer read/write memory medium.Based on so Understanding, the part that prior art is contributed by the technical scheme of the embodiment of the present invention the most in other words can Embodying with the form with software product, this computer software product is stored in a storage medium, bag Include some instructions with so that a computer equipment (can be personal computer, server or network Equipment etc.) perform all or part of of method described in each embodiment of the present invention.And aforesaid storage medium bag Include: USB flash disk, portable hard drive, read only memory (ROM, Read-Only Memory), random access memory are deposited Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can store program generation The medium of code.So, the embodiment of the present invention is not restricted to the combination of any specific hardware and software.
Accordingly, the embodiment of the present invention also provides for a kind of computer-readable storage medium, and wherein storage has computer journey Sequence, this computer program is for performing the user authen method of the embodiment of the present invention.
The above, only presently preferred embodiments of the present invention, it is not intended to limit the protection model of the present invention Enclose.

Claims (12)

1. a user authen method, it is characterised in that described method includes:
Gather N number of voice speech cipher as user in end side, and the described N number of voice gathered is divided It is uploaded to server after not corresponding editor's sequence number;Described N is the positive integer more than 1;
Corresponding described information middle finger sequencing is inputted according to the information of end side user interface in end side Number speech cipher, and described speech cipher is encapsulated into certification request in be sent to described server;
Described server receives described certification request, and parses described speech cipher, by described speech cipher Carry out the coupling of voice content and/or vocal print according to the sequence number corresponding with described speech cipher, recognize after the match is successful Card passes through.
Method the most according to claim 1, it is characterised in that described method also includes:
Described gather N number of voice as the speech cipher of user in end side, and the described N number of language that will gather Before being uploaded to server after the not corresponding editor's sequence number of cent, simultaneously or after, go back the first of acquisition terminal Number and the second number, and by described first number and the second number and described speech cipher simultaneously or successively on Pass to described server, to realize the encryption certification that trigram merges.
Method the most according to claim 2, it is characterised in that described method also includes:
Described speech cipher is carried out voice content and/or vocal print according to the sequence number corresponding with described speech cipher Coupling before, simultaneously or after, by extracting described first number and the second number close with described voice The matching result of code realizes the decrypted authentication that trigram merges together.
Method the most according to claim 3, it is characterised in that described first number is IMEI, Described second number is IMSI number;
Described by extracting described first number and the second number and together with the matching result of described speech cipher Realize the decrypted authentication that trigram merges, including:
Matching result to described speech cipher is that the match is successful, then speech cipher certification is passed through, IMSI number Code, IMEI, all by certification, enter system.
Method the most according to claim 3, it is characterised in that described first number is IMEI, Described second number is IMSI number;
Described by extracting described first number and the second number and together with the matching result of described speech cipher Realize the decrypted authentication that trigram merges, including:
Unsuccessful for coupling to the matching result of described speech cipher, then speech cipher certification is not passed through, and returns Login failure information;Or,
Matching result to described speech cipher is that the match is successful, then voice authentication passes through, IMSI number and IMEI checking is not passed through, and returns login failure information.
Method the most according to claim 3, it is characterised in that described first number is IMEI, Described second number is IMSI number;
Described by extracting described first number and the second number and together with the matching result of described speech cipher Realize the decrypted authentication that trigram merges, including:
Matching result to described speech cipher is that the match is successful, then voice authentication passes through, IMSI number is correct, IMEI is incorrect, and prompting user updates IMEI;Or,
Matching result to described speech cipher is that the match is successful, then voice authentication passes through, and IMSI number is the most just Really, IMEI is correct, and prompting user updates IMSI.
7. a customer certification system, it is characterised in that described system includes:
Terminal, for gathering N number of voice speech cipher as user, and the described N number of voice that will gather It is uploaded to server respectively after corresponding editor's sequence number;Described N is the positive integer more than 1;Use according to end side The information at interface, family inputs the speech cipher of appointed sequence number in corresponding described information, and by institute's predicate The loading certification request of sound cipher seal is sent to described server;
Server, receives described certification request for described server, and parses described speech cipher, will Described speech cipher carries out the coupling of voice content and/or vocal print according to the sequence number corresponding with described speech cipher, After the match is successful, certification is passed through.
System the most according to claim 7, it is characterised in that described terminal, was further used at end Side gathers N number of voice speech cipher as user, and the described N number of voice gathered correspondence is respectively compiled Before being uploaded to server after volume sequence number, simultaneously or after, the first number of acquisition terminal and No. second are gone back Code, and described first number and the second number are uploaded to described service with described speech cipher simultaneously or successively Device, to realize the encryption certification that trigram merges.
System the most according to claim 8, it is characterised in that described server, be further used for by Described speech cipher carries out the coupling of voice content and/or vocal print according to the sequence number corresponding with described speech cipher Before, simultaneously or after, by extract described first number and the second number and with described speech cipher Join result and realize the decrypted authentication that trigram merges together.
System the most according to claim 9, it is characterised in that described server, is further used for Described first number is IMEI, in the case of described second number is IMSI number, to described voice The matching result of password is that the match is successful, then speech cipher certification is passed through, IMSI number, IMEI complete Portion passes through certification, enters system.
11. systems according to claim 9, it is characterised in that described server, are further used for Described first number is IMEI, in the case of described second number is IMSI number, to described voice The matching result of password is unsuccessful for coupling, then speech cipher certification is not passed through, and returns login failure information; Or, the matching result to described speech cipher is that the match is successful, then voice authentication passes through, IMSI number and IMEI checking is not passed through, and returns login failure information.
12. systems according to claim 9, it is characterised in that described server, are further used for Described first number is IMEI, in the case of described second number is IMSI number, to described voice The matching result of password is that the match is successful, then voice authentication passes through, IMSI number is correct, IMEI not Correctly, prompting user updates IMEI;Or, the matching result to described speech cipher is that the match is successful, then Voice authentication passes through, and IMSI number is incorrect, and IMEI is correct, and prompting user updates IMSI.
CN201510052985.7A 2015-02-02 2015-02-02 User authentication method and system Pending CN105991280A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510052985.7A CN105991280A (en) 2015-02-02 2015-02-02 User authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510052985.7A CN105991280A (en) 2015-02-02 2015-02-02 User authentication method and system

Publications (1)

Publication Number Publication Date
CN105991280A true CN105991280A (en) 2016-10-05

Family

ID=57036857

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510052985.7A Pending CN105991280A (en) 2015-02-02 2015-02-02 User authentication method and system

Country Status (1)

Country Link
CN (1) CN105991280A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112580007A (en) * 2019-09-29 2021-03-30 北京安云世纪科技有限公司 Verification method and device
CN113193964A (en) * 2021-05-08 2021-07-30 国民认证科技(北京)有限公司 Method and system for recognizing identity by combining gesture password with FIDO (fixed Internet data Access)
CN114467283A (en) * 2021-11-24 2022-05-10 百果园技术(新加坡)有限公司 Identity authentication method, device, terminal, storage medium and program product

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090006264A1 (en) * 2007-06-27 2009-01-01 Verizon Business Network Services, Inc. Methods and Systems For Secure Voice-Authenticated Electronic Payment
CN103118000A (en) * 2012-12-07 2013-05-22 大连奥林匹克电子城咨信商行 Online login identity authentication method based on voice matching
CN103390123A (en) * 2012-05-08 2013-11-13 腾讯科技(深圳)有限公司 User authentication method, user authentication device and intelligent terminal
CN104066085A (en) * 2014-01-16 2014-09-24 苏州天鸣信息科技有限公司 Safety protection method applied for mobile terminal and system thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090006264A1 (en) * 2007-06-27 2009-01-01 Verizon Business Network Services, Inc. Methods and Systems For Secure Voice-Authenticated Electronic Payment
CN103390123A (en) * 2012-05-08 2013-11-13 腾讯科技(深圳)有限公司 User authentication method, user authentication device and intelligent terminal
CN103118000A (en) * 2012-12-07 2013-05-22 大连奥林匹克电子城咨信商行 Online login identity authentication method based on voice matching
CN104066085A (en) * 2014-01-16 2014-09-24 苏州天鸣信息科技有限公司 Safety protection method applied for mobile terminal and system thereof

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112580007A (en) * 2019-09-29 2021-03-30 北京安云世纪科技有限公司 Verification method and device
CN112580007B (en) * 2019-09-29 2023-01-10 北京安云世纪科技有限公司 Verification method and device
CN113193964A (en) * 2021-05-08 2021-07-30 国民认证科技(北京)有限公司 Method and system for recognizing identity by combining gesture password with FIDO (fixed Internet data Access)
CN113193964B (en) * 2021-05-08 2023-02-07 国民认证科技(北京)有限公司 Method and system for recognizing identity by combining gesture password with FIDO (fixed Internet data Access)
CN114467283A (en) * 2021-11-24 2022-05-10 百果园技术(新加坡)有限公司 Identity authentication method, device, terminal, storage medium and program product
WO2023092345A1 (en) * 2021-11-24 2023-06-01 百果园技术(新加坡)有限公司 Identity authentication method and apparatus, and terminal, storage medium and program product
CN114467283B (en) * 2021-11-24 2024-02-09 百果园技术(新加坡)有限公司 Identity authentication method, device, terminal, storage medium and program product

Similar Documents

Publication Publication Date Title
CN106487511B (en) Identity authentication method and device
US20130262873A1 (en) Method and system for authenticating remote users
US10771471B2 (en) Method and system for user authentication
CN103856472B (en) A kind of method and device of Account Logon
CN106034123B (en) Authentication method, application system server and client
CN110086608A (en) User authen method, device, computer equipment and computer readable storage medium
CN104883351B (en) Multiple-factor authentication method and device
CN105119722B (en) A kind of auth method, equipment and system
CN109150541A (en) A kind of Verification System and its working method
CN108632231A (en) A kind of internet of things equipment, Internet of Things authentication platform, authentication method and system
CN107196922A (en) Identity identifying method, user equipment and server
CN104717648B (en) A kind of uniform authentication method and equipment based on SIM card
CN104486343A (en) Method and system for double-factor bidirectional authentication
US9882719B2 (en) Methods and systems for multi-factor authentication
CN104717224B (en) A kind of login method and device
US10069820B2 (en) Linked registration
CN107545188B (en) Application management method, device and system
CN108965222A (en) Identity identifying method, system and computer readable storage medium
CN105656627A (en) Identity verification method, device and system
CN107484032A (en) Prevent the verification method and device brushed
CN107533598B (en) Input method and device of login password of application program and terminal
CN107529078A (en) Prevent the verification method and device brushed
CN105991280A (en) User authentication method and system
CN104883341B (en) Application management device, terminal and application management method
CN104918241B (en) A kind of user authen method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161005

RJ01 Rejection of invention patent application after publication