CN106330902B - Dual factors rapid authentication method based on ambient sound - Google Patents

Dual factors rapid authentication method based on ambient sound Download PDF

Info

Publication number
CN106330902B
CN106330902B CN201610708096.6A CN201610708096A CN106330902B CN 106330902 B CN106330902 B CN 106330902B CN 201610708096 A CN201610708096 A CN 201610708096A CN 106330902 B CN106330902 B CN 106330902B
Authority
CN
China
Prior art keywords
microphone
mobile phone
phone terminal
computer end
sections
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610708096.6A
Other languages
Chinese (zh)
Other versions
CN106330902A (en
Inventor
朱晓妍
余随育
裴庆祺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201610708096.6A priority Critical patent/CN106330902B/en
Publication of CN106330902A publication Critical patent/CN106330902A/en
Application granted granted Critical
Publication of CN106330902B publication Critical patent/CN106330902B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of dual factors rapid authentication method based on ambient sound, the steps include: (1) user's registration;(2) mobile phone terminal logs in;(3) computer end login authentication;(4) server decryption and analysis voice signal;(5) whether the sound similarity value of two sections of voice signals after judging decryption is higher than threshold value Sm, if so, server authorizes computer end subscriber logon rights, otherwise, server refusal authorizes computer end subscriber logon rights.The communication channel for requiring user to carry out cumbersome authentication operation problem and the prior art the present invention overcomes the prior art is easy monitored problem, so that the present invention has the advantages that convenience, development property and safety.

Description

Dual factors rapid authentication method based on ambient sound
Technical field
The invention belongs to information technology fields, further relate to one of information technology technical field and are based on ambient sound The dual factors rapid authentication method of sound.The present invention can be applied to login authentication process in public environment under different network environments.
Background technique
In order to improve the confidentiality and safety of userspersonal information in a network environment, can generally be recognized using dual factors Card, i.e., guarantee user identity using two or more verification mode.Login can be greatly improved in two-factor authentication Safety, even if working as our password loss, second authentication mode also can allow user to avoid further economic loss.
Patent document " System of Kashyap Merchant, Jack Cai, the Sanjiv Maurya in its joint application and method for authenticating a smart card using an authentication token Transmitted to a smart card reader " (application number US8522326B2, date of application 2008.9.24, it is open Date 2013.8.27) in propose system and method using Card for Authentication.The method use one kind for authenticating System include mobile unit and intelligent card reading.The mobile unit include one prevent the function that is stored thereon of access and The security application of data, and the authentication application program including a secure storage authentication token.Intelligent card reading It may be coupled to a smart card to be communicated, smart card includes certificate data.Authentication application program enables certification Board is sent to intelligent card reading to verify smart card.When the authentication succeeds, authentication application program and security application Shared authentication tokens, authentication token indicate security application to authorize the access authority to function and data.This method Shortcoming be: verifying will carry hardware device every time, and these hardware devices also give the extensive development band of technology Carry out cost problem;It is required that user carries out cumbersome authentication operation process.
Patent document " System and method for secure pairing of of the Chi Wah Lo in its application It is public in bluetooth devices " (application number US9344185B2, date of application 2014.3.24, publication date 2016.5.17) The system and method for having opened a kind of bluetooth equipment safely matched, which includes host equipment and peripheral equipment.It is wherein every A equipment includes audio interface and bluetooth transceiver.In its implementation, phase that host apparatus and peripheral equipment pass through them The audio interface connection answered, the audio interface that connection is passed through by the voice communication channel established outside a band.Host equipment and Peripheral equipment exchanges bluetooth authentication data and passes through band voice communication channel, then safely mutually matches and starts, reinitializes Corresponding bluetooth transceiver and corresponding bluetooth authentication data, realization data exchange.Shortcoming existing for this method is: bluetooth Communication channel is easily controlled and monitors, it is difficult to guarantee the safety in verification process.
Summary of the invention
It is an object of the invention to be directed to the deficiency of above-mentioned prior art, propose that a kind of dual factors based on ambient sound are fast Fast authentication method, to realize that the secure log to commonly used equipment authenticates.
Realize the object of the invention thinking be, on the basis of two-factor authentication, combine convenience, development property and Safety, proposes the present invention, and the present invention is known as the dual factors rapid authentication method based on ambient sound.What the present invention used tests Card mode does not need to carry hardware device or installs additional cell phone software, browser plug-in, but directly by using hand Possessed microphone apparatus on machine and computer records ambient sound, and analyzes the correlation of two sections of voice signals, is come with this true Recognize the distance of two equipment, the more close then correlation of distance is higher, and correlation is higher than certain threshold value and thinks the second factor authentication Pass through.In the first factor authentication, the present invention creatively proposes new thinking, because most of application program of mobile phone have mobile phone Cipher memory function, even if closing application program, it can also be continued to run on mobile phone backstage, using this feature, can be saved Go traditional Password Input the step.
Realize that specific step is as follows for the object of the invention:
(1) user's registration:
The user account in authentication registration logging on authentication, password on the server;
(2) mobile phone terminal logs in:
(2a) user is by mobile cellular network or WiFi, on mobile phone terminal login service device in authentication registration logging on authentication Account, password;
Account after login, encrypted message are stored in mobile phone terminal by (2b) user;
(3) computer end login authentication:
(3a) user, by Internet, sends logging request to server end using the first authentication factor in computer end; User inputs the account on server in authentication registration logging on authentication and carries out the first factor on the login interface that server is specified Certification;
After (3b) server receives the logging request of user, by being sent through mobile cellular network or WiFi to mobile phone terminal Open the request of microphone;
(3c) user opens microphone in mobile phone terminal and uses after the request that mobile phone terminal receives that server opens microphone Ambient sound similarity calculating method carries out the second factor authentication;
(3d) mobile phone terminal and computer end carry out time synchronization, the microphone of mobile phone terminal and the wheat of computer end with server respectively Gram wind records ambient sound 4 seconds simultaneously;
(3e) on the voice signal that the microphone of mobile phone terminal and the microphone of computer end are respectively recorded, when adding respective Between stab, and encrypted with the public key of server, obtain encrypted two sections of voice signals;
Encrypted two sections of voice signals are sent to server through mobile cellular network or WiFi by (3f) mobile phone terminal;
(4) server decryption and analysis voice signal:
The private key of encrypted two sections of voice signals server is decrypted in (4a) server, two after being decrypted Section voice signal;
(4b) safety according to required by user and convenience, arbitrarily choose between 1% to 100% similarity value One value, the threshold value S as similaritym
(4c) server is to two sections of voice signals after decryption, and according to its respective timestamp, use environment sound is similar Calculation method is spent, sound similarity analysis is carried out;
(5) whether the sound similarity value of two sections of voice signals after judging decryption is higher than threshold value Sm, if so, executing step Suddenly (6);Otherwise, step (7) are executed;
(6) server authorizes computer end subscriber logon rights;
(7) server refusal authorizes computer end subscriber logon rights.
Compared with prior art, the invention has the following advantages that
The first, the present invention using mobile phone as carrier by the account of user as the first authentication factor, overcome the prior art and want Ask user to carry out cumbersome authentication operation problem makes so that verification process of the invention allows user to save the operation of Password Input The present invention has convenience.
The second, the microphone for having been used mobile phone terminal and computer end in the second factor authentication due to the present invention is overcome existing Hardware device will be carried by having technology to verify every time, and these hardware devices to technology it is extensive development bring additionally at This problem, so that of the invention has the advantages that development property and development are at low cost.
Third, present invention uses ambient sound similarity calculating methods, carry out to the second authentication factor in the present invention Certification, the communication channel for overcoming the prior art are easily controlled and monitor, it is difficult to guarantee asking for the safety in verification process Topic, enables verification process of the invention to resist the safety advantages of Replay Attack and long-range attack.
Detailed description of the invention
Fig. 1 is flow chart of the invention.
Fig. 2 is in T=4s, and different distance L and sound source number N use method of the invention, obtained average environment Sound similarity value S.
Specific embodiment
The present invention is described further with reference to the accompanying drawing.
Referring to Fig.1, specific steps of the invention include as follows.
Step 1, user's registration.
The user account in authentication registration logging on authentication, password on the server.
Step 2, mobile phone terminal logs in.
User is by mobile cellular network or WiFi, the account on mobile phone terminal login service device in authentication registration logging on authentication Family, password.
Account after login, encrypted message are stored in mobile phone terminal by user.
Step 3, computer end login authentication.
User, by Internet, sends logging request to server end using the first authentication factor in computer end;User On the login interface that server is specified, inputs the first factor of account progress on server in authentication registration logging on authentication and recognize Card.
First authentication factor has referred to the account in authentication registration logging on authentication on the server.
After server receives the logging request of user, opened by being sent through mobile cellular network or WiFi to mobile phone terminal The request of microphone.
User opens microphone use environment after the request that mobile phone terminal receives that server opens microphone, in mobile phone terminal Sound similarity calculating method carries out the second factor authentication.
Specific step is as follows for the ambient sound similarity calculating method:
The first step collects any two sections of voice signals of mobile phone terminal microphone and computer end microphone records;
Second step, by the gross energy standard of mobile phone terminal microphone and any two sections of voice signals of computer end microphone records Turn to 1.
Third step calculates any two sections of voice signals of mobile phone terminal microphone and computer end microphone records according to the following formula Time domain cross correlation value:
Sc(Xi,Xj)=Cross-Corr (Xi,Xj)
Dc(Xi,Xj)=1-Sc(Xi,Xj)
Wherein, Sc(Xi,Xj) indicate mobile phone terminal microphone and computer end microphone records any two sections of voice signal XiWith XjTime domain cross correlation value;Cross-Corr () indicates cross-correlation function;XiAnd XjRespectively indicate mobile phone terminal microphone and electricity Any two sections of voice signals of brain end microphone records;Dc(Xi,Xj) indicate mobile phone terminal microphone and computer end microphone records Any two sections of voice signal XiAnd XjTime domain otherness value.
4th step using Fourier transform formula, calculates mobile phone terminal microphone and computer end microphone records according to the following formula Any two sections of voice signals frequency coefficient: #
Wherein Fi(ω) and Fj(ω) respectively indicates any two sections of sound of mobile phone terminal microphone and computer end microphone records Signal XiAnd XjFrequency coefficient;Indicate integration operation;Xi(t) and Xj(t) mobile phone terminal microphone and computer end are respectively indicated Any two sections of voice signal X of microphone recordsiAnd XjFunction in the time domain.
5th step calculates any two sections of voice signals of mobile phone terminal microphone and computer end microphone records according to the following formula XiAnd XjFrequency coefficient Euclidean Norm distance value:
Dd(Xi,Xj)=| | Xi-Xj||
Wherein, Dd(Xi,Xj) indicate mobile phone terminal microphone and computer end microphone records any two sections of voice signal XiWith XjFrequency coefficient Euclidean Norm distance value, | | | | indicate Euclidean Norm function.
6th step calculates any two of mobile phone terminal microphone and computer end microphone records on two-dimensional space according to the following formula Section voice signal XiAnd XjWhen-frequency similarity value:
S(Xi,Xj)=1-D (Xi,Xj)
Wherein, D (Xi,Xj) indicate mobile phone terminal microphone and computer end microphone records any two sections of voice signal XiWith XjSound differences value;Radical sign operation is opened in expression;Dc(Xi,Xj) indicate mobile phone terminal microphone and computer end microphone records Any two sections of voice signal XiAnd XjTime domain difference value;Dd(Xi,Xj) indicate mobile phone terminal microphone and computer end microphone records Any two sections of voice signal XiAnd XjFrequency coefficient Euclidean Norm distance value;S(Xi,Xj) indicate mobile phone on two-dimensional space Hold any two sections of voice signal X of microphone and computer end microphone recordsiAnd XjWhen-frequency similarity value.Described second is recognized Card factor refers to, the user's distance of mobile phone terminal to computer end when computer end logs in.
After mobile phone terminal and computer end respectively carry out time synchronization with server, the microphone of mobile phone terminal and the Mike of computer end Wind records ambient sound 4 seconds simultaneously.
On the voice signal that the microphone of mobile phone terminal and the microphone of computer end are respectively recorded, respective timestamp is added And it is encrypted with the public key of server.
Encrypted two sections of voice signals are sent to server through mobile cellular network or WiFi by mobile phone terminal.
Step 4, server decryption and analysis voice signal.
The private key of encrypted two sections of voice signals server is decrypted in server, two after being decrypted section sound Sound signal.
The safety according to required by user and convenience arbitrarily choose one between 1% to 100% similarity value Value, the threshold value S as similaritym
Server is to two sections of voice signals after decryption, according to its respective timestamp, use environment sound similarity meter Calculation method carries out sound similarity analysis.
Step 5, whether the sound similarity value of two sections of voice signals after judging decryption is higher than threshold value Sm, if so, holding Row step 6;Otherwise, step 7 is executed.
Step 6, server authorizes computer end subscriber logon rights.
Step 7, server refusal authorizes computer end subscriber logon rights.
Effect of the invention is described further below with reference to emulation experiment.
1. emulation experiment condition:
Condition 1, in Intel (R) Celeron (R) G540 processor, 7 Ultimate operating system of Windows it is desk-top The result that test emulation is tested on computer.
Condition 2 is connect with Mozilla Firefox browser (version number 47.0.1.6018) in-service units on computers By realizing Navigator.getUserMedia () function on mouth, starting microphone obtains audio file, when user need to use wheat When gram wind carries out the second factor authentication, this function will be activated.
2. emulation experiment content and interpretation of result:
Emulation experiment of the invention is to do login test respectively in quiet indoor environment and noisy outdoor environment.
Environment indoors, for emulation experiment of the invention by setting sound source number N=1, sound source is music player, with This simulates indoor environment.
Under outdoor environment, for emulation experiment of the invention by setting sound source number N (N > 1), sound source is music Device simulates outdoor environment with this.
In experiment, Lm is set by the distance of mobile phone terminal and computer end microphone, sets Ts for record length, by environment Sound similarity threshold is set as Sm
Under indoor environment, 1 is set by sound source number N, to obtain different distance Lm and record length Ts and average sound Relationship between sound similarity value S, emulation experiment of the invention have carried out 427 registers.
Using the ambient sound data being collected into, use environment sound similarity calculating method calculates every a pair of of sound number According to ambient sound similarity value, average to obtained ambient sound similarity value, obtain table 1.L indicates mobile phone in table 1 Hold distance of the microphone to computer end microphone, unit: rice (m);T indicates to record the time of ambient sound, unit: second (s).
Table 1: average environment sound similarity list unit: %
From table 1, it can be found that following rule: record length T is longer, and average Voice similarity value S is bigger.Mobile phone terminal Mike The distance L of wind to computer end microphone is remoter, and average environment sound similarity value S is smaller.Record length is longer, mobile phone terminal Mike Influence of the distance L to average Voice similarity value S of wind to computer end microphone is smaller.
For the convenience of the verification process of dual factors rapid authentication method of the raising based on ambient sound, emulation of the invention Experiment discovery can satisfy convenience and require and have ideal average similarity value S, at this time hand as record length T=4s Influence of the distance L to average similarity value S of generator terminal microphone to computer end microphone is also smaller, then in following emulation 4s is set by record length T in experiment.
Under outdoor environment, sound source number is set N (N > 1) by emulation experiment of the invention, sets record length T to 4s, this experiment have carried out 3246 registers.
Using the ambient sound data being collected into, use environment sound similarity calculating method obtains its respective ambient sound Sound similarity value.
Take sound source number N=1, experimental data when 3,6,9 is arranged, and Fig. 2 is obtained.Abscissa indicates mobile phone in Fig. 2 Hold the distance L of computer end, unit: rice.Ordinate in Fig. 2 indicates average environment sound similarity value S.With diamond shape in Fig. 2 The curve of mark indicates to obtain average environment sound similarity curve when sound source number N=1;With the song of square mark in Fig. 2 Line indicates to obtain average environment sound similarity curve when sound source number N=3;Sound is indicated with the curve that triangle indicates in Fig. 2 Average environment sound similarity curve is obtained when the number N=6 of source;Sound source number N=9 is indicated with the curve that fork-shaped indicates in Fig. 2 When obtain average environment sound similarity curve.
It is found from Fig. 2, the average environment sound similarity value S of each curve is slowly reduced within distance 5m.Sound source number N More, average environment sound similarity value S reduces faster other than 5 meters of distance.
For the safety of the verification process of dual factors rapid authentication method of the raising based on ambient sound, remotely attacked with resisting It hits, by ambient sound similarity threshold values SmIt is set as 95%, can either guarantee the success rate of user log-in authentication, can also be guaranteed The safety of process of user login.

Claims (4)

1. a kind of dual factors rapid authentication method based on ambient sound, comprises the following steps that
(1) user's registration:
The user account in authentication registration logging on authentication, password on the server;
(2) mobile phone terminal logs in:
(2a) user is by mobile cellular network or WiFi, the account on mobile phone terminal login service device in authentication registration logging on authentication Family, password;
Account after login, encrypted message are stored in mobile phone terminal by (2b) user;
(3) computer end login authentication:
(3a) user, by Internet, sends logging request to server end using the first authentication factor in computer end;User On the login interface that server is specified, inputs the first factor of account progress on server in authentication registration logging on authentication and recognize Card;
After (3b) server receives the logging request of user, opened by being sent through mobile cellular network or WiFi to mobile phone terminal The request of microphone;
(3c) user opens microphone use environment after the request that mobile phone terminal receives that server opens microphone, in mobile phone terminal Sound similarity calculating method carries out the second factor authentication;
(3d) mobile phone terminal and computer end carry out time synchronization, the microphone of mobile phone terminal and the microphone of computer end with server respectively Record ambient sound 4 seconds simultaneously;
(3e) adds the respective time on the voice signal that the microphone of mobile phone terminal and the microphone of computer end are respectively recorded Stamp, and encrypted with the public key of server, obtain encrypted two sections of voice signals;
Encrypted two sections of voice signals are sent to server through mobile cellular network or WiFi by (3f) mobile phone terminal;
(4) server decryption and analysis voice signal:
The private key of encrypted two sections of voice signals server is decrypted in (4a) server, two after being decrypted section sound Sound signal;
(4b) safety according to required by user and convenience, arbitrarily choose one between 1% to 100% similarity value Value, the threshold value S as similaritym
(4c) server is to two sections of voice signals after decryption, according to its respective timestamp, use environment sound similarity meter Calculation method carries out sound similarity analysis;
(5) whether the sound similarity value of two sections of voice signals after judging decryption is higher than threshold value Sm, if so, thening follow the steps (6);Otherwise, step (7) are executed;
(6) server authorizes computer end subscriber logon rights;
(7) server refusal authorizes computer end subscriber logon rights.
2. the dual factors rapid authentication method according to claim 1 based on ambient sound, which is characterized in that step (3a) Described in the first authentication factor refer to, the account in authentication registration logging on authentication on the server.
3. the dual factors rapid authentication method according to claim 1 based on ambient sound, which is characterized in that step (3c) Described in ambient sound similarity calculating method specific step is as follows:
The first step collects any two sections of voice signals of mobile phone terminal microphone and computer end microphone records;
The gross energy of mobile phone terminal microphone and any two sections of voice signals of computer end microphone records is standardized as by second step 1;
Third step, according to the following formula, calculate any two sections of voice signals of mobile phone terminal microphone and computer end microphone records when Domain cross correlation value:
Sc(Xi,Xj)=Cross-Corr (Xi,Xj)
Dc(Xi,Xj)=1-Sc(Xi,Xj)
Wherein, Sc(Xi,Xj) indicate mobile phone terminal microphone and computer end microphone records any two sections of voice signal XiAnd Xj's Time domain cross correlation value;Cross-Corr () indicates cross-correlation function;XiAnd XjRespectively indicate mobile phone terminal microphone and computer end Any two sections of voice signals of microphone records;Dc(Xi,Xj) indicate any of mobile phone terminal microphone and computer end microphone records Two sections of voice signal XiAnd XjTime domain otherness value;
4th step using Fourier transform formula, calculates times of mobile phone terminal microphone and computer end microphone records according to the following formula It anticipates the frequency coefficients of two sections of voice signals:
Wherein Fi(ω) and Fj(ω) respectively indicates any two sections of voice signals of mobile phone terminal microphone and computer end microphone records XiAnd XjFrequency coefficient;Indicate integration operation;Xi(t) and Xj(t) mobile phone terminal microphone and computer end wheat are respectively indicated Any two sections of voice signal X that gram wind is recordediAnd XjFunction in the time domain;
5th step calculates any two sections of voice signal X of mobile phone terminal microphone and computer end microphone records according to the following formulaiAnd Xj Frequency coefficient Euclidean Norm distance value:
Dd(Xi,Xj)=| | Xi-Xj||
Wherein, Dd(Xi,Xj) indicate mobile phone terminal microphone and computer end microphone records any two sections of voice signal XiAnd Xj's The Euclidean Norm distance value of frequency coefficient, | | | | indicate Euclidean Norm function;
6th step calculates any two sections of sound of mobile phone terminal microphone and computer end microphone records on two-dimensional space according to the following formula Sound signal XiAnd XjWhen-frequency similarity value:
S(Xi,Xj)=1-D (Xi,Xj)
Wherein, D (Xi,Xj) indicate mobile phone terminal microphone and computer end microphone records any two sections of voice signal XiAnd XjSound Sound difference value;Radical sign operation is opened in expression;Dc(Xi,Xj) indicate any the two of mobile phone terminal microphone and computer end microphone records Section voice signal XiAnd XjTime domain difference value;Dd(Xi,Xj) indicate any of mobile phone terminal microphone and computer end microphone records Two sections of voice signal XiAnd XjFrequency coefficient Euclidean Norm distance value;S(Xi,Xj) indicate mobile phone terminal Mike on two-dimensional space Any two sections of voice signal X of wind and computer end microphone recordsiAnd XjWhen-frequency similarity value.
4. the dual factors rapid authentication method according to claim 1 based on ambient sound, which is characterized in that step (3c) Described in the second factor authentication refer to, certification of the user when computer end logs between distance of the mobile phone terminal to computer end.
CN201610708096.6A 2016-08-23 2016-08-23 Dual factors rapid authentication method based on ambient sound Active CN106330902B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610708096.6A CN106330902B (en) 2016-08-23 2016-08-23 Dual factors rapid authentication method based on ambient sound

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610708096.6A CN106330902B (en) 2016-08-23 2016-08-23 Dual factors rapid authentication method based on ambient sound

Publications (2)

Publication Number Publication Date
CN106330902A CN106330902A (en) 2017-01-11
CN106330902B true CN106330902B (en) 2019-07-02

Family

ID=57742336

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610708096.6A Active CN106330902B (en) 2016-08-23 2016-08-23 Dual factors rapid authentication method based on ambient sound

Country Status (1)

Country Link
CN (1) CN106330902B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106847300B (en) * 2017-03-03 2018-06-22 北京捷思锐科技股份有限公司 A kind of voice data processing method and device
CN109818755A (en) * 2019-03-08 2019-05-28 湖南第一师范学院 A kind of transparent two-factor authentication system and method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103813323B (en) * 2012-11-06 2015-12-09 心动网络股份有限公司 Carried out the method for user's certification mutually by collision mode between a kind of mobile terminal
CN103813322A (en) * 2012-11-06 2014-05-21 上海心动企业发展有限公司 Method for mutually authenticating users between mobile terminals by using collision manner
CN203399141U (en) * 2013-09-06 2014-01-15 中国工商银行股份有限公司 Information channel security certificate device
CN104869568B (en) * 2014-02-26 2018-03-02 中国科学院软件研究所 A kind of monitoring system collocation method and system based on audio

Also Published As

Publication number Publication date
CN106330902A (en) 2017-01-11

Similar Documents

Publication Publication Date Title
CN109657450B (en) Method, device, medium, and electronic device for evaluation based on block chain
CN105610938B (en) Logging state synchronous method and system
WO2018166187A1 (en) Server, identity verification method and system, and a computer-readable storage medium
US8862888B2 (en) Systems and methods for three-factor authentication
CN108989278A (en) Identification service system and method
Kim et al. A method of risk assessment for multi-factor authentication
CN103763356B (en) A kind of SSL establishment of connection method, apparatus and system
Truong et al. Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication
CN107070667A (en) Identity identifying method, user equipment and server
CN108959933A (en) Risk analysis device and method for the certification based on risk
WO2017032263A1 (en) Identity authentication method and apparatus
US10360555B2 (en) Near field authentication through communication of enclosed content sound waves
US20190362064A1 (en) Method and Apparatus for Secure and Usable Mobile Two-Factor Authentication
Li et al. Velody: Nonlinear vibration challenge-response for resilient user authentication
US20120159603A1 (en) Mobile out-of-band authentication service
CN105141615A (en) Method and system for opening account remotely, authentication method and system
CN109413096B (en) A kind of login method and device more applied
CN106790260A (en) A kind of multiple-factor identity identifying method
CN106488452A (en) A kind of mobile terminal safety access authentication method of combination fingerprint
KR20220019834A (en) Method and system for authenticating transmission of secure credentials to a device
CN107707356B (en) A kind of mobile device secure binding method and application system based on two dimensional code identification
US20160294822A1 (en) Proximity based authentication using bluetooth
CN104168117B (en) A kind of speech digit endorsement method
US11171958B1 (en) Secure session sharing between computing devices
CN106330902B (en) Dual factors rapid authentication method based on ambient sound

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant