CN106330902B - Dual factors rapid authentication method based on ambient sound - Google Patents
Dual factors rapid authentication method based on ambient sound Download PDFInfo
- Publication number
- CN106330902B CN106330902B CN201610708096.6A CN201610708096A CN106330902B CN 106330902 B CN106330902 B CN 106330902B CN 201610708096 A CN201610708096 A CN 201610708096A CN 106330902 B CN106330902 B CN 106330902B
- Authority
- CN
- China
- Prior art keywords
- microphone
- mobile phone
- phone terminal
- computer end
- sections
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of dual factors rapid authentication method based on ambient sound, the steps include: (1) user's registration;(2) mobile phone terminal logs in;(3) computer end login authentication;(4) server decryption and analysis voice signal;(5) whether the sound similarity value of two sections of voice signals after judging decryption is higher than threshold value Sm, if so, server authorizes computer end subscriber logon rights, otherwise, server refusal authorizes computer end subscriber logon rights.The communication channel for requiring user to carry out cumbersome authentication operation problem and the prior art the present invention overcomes the prior art is easy monitored problem, so that the present invention has the advantages that convenience, development property and safety.
Description
Technical field
The invention belongs to information technology fields, further relate to one of information technology technical field and are based on ambient sound
The dual factors rapid authentication method of sound.The present invention can be applied to login authentication process in public environment under different network environments.
Background technique
In order to improve the confidentiality and safety of userspersonal information in a network environment, can generally be recognized using dual factors
Card, i.e., guarantee user identity using two or more verification mode.Login can be greatly improved in two-factor authentication
Safety, even if working as our password loss, second authentication mode also can allow user to avoid further economic loss.
Patent document " System of Kashyap Merchant, Jack Cai, the Sanjiv Maurya in its joint application
and method for authenticating a smart card using an authentication token
Transmitted to a smart card reader " (application number US8522326B2, date of application 2008.9.24, it is open
Date 2013.8.27) in propose system and method using Card for Authentication.The method use one kind for authenticating
System include mobile unit and intelligent card reading.The mobile unit include one prevent the function that is stored thereon of access and
The security application of data, and the authentication application program including a secure storage authentication token.Intelligent card reading
It may be coupled to a smart card to be communicated, smart card includes certificate data.Authentication application program enables certification
Board is sent to intelligent card reading to verify smart card.When the authentication succeeds, authentication application program and security application
Shared authentication tokens, authentication token indicate security application to authorize the access authority to function and data.This method
Shortcoming be: verifying will carry hardware device every time, and these hardware devices also give the extensive development band of technology
Carry out cost problem;It is required that user carries out cumbersome authentication operation process.
Patent document " System and method for secure pairing of of the Chi Wah Lo in its application
It is public in bluetooth devices " (application number US9344185B2, date of application 2014.3.24, publication date 2016.5.17)
The system and method for having opened a kind of bluetooth equipment safely matched, which includes host equipment and peripheral equipment.It is wherein every
A equipment includes audio interface and bluetooth transceiver.In its implementation, phase that host apparatus and peripheral equipment pass through them
The audio interface connection answered, the audio interface that connection is passed through by the voice communication channel established outside a band.Host equipment and
Peripheral equipment exchanges bluetooth authentication data and passes through band voice communication channel, then safely mutually matches and starts, reinitializes
Corresponding bluetooth transceiver and corresponding bluetooth authentication data, realization data exchange.Shortcoming existing for this method is: bluetooth
Communication channel is easily controlled and monitors, it is difficult to guarantee the safety in verification process.
Summary of the invention
It is an object of the invention to be directed to the deficiency of above-mentioned prior art, propose that a kind of dual factors based on ambient sound are fast
Fast authentication method, to realize that the secure log to commonly used equipment authenticates.
Realize the object of the invention thinking be, on the basis of two-factor authentication, combine convenience, development property and
Safety, proposes the present invention, and the present invention is known as the dual factors rapid authentication method based on ambient sound.What the present invention used tests
Card mode does not need to carry hardware device or installs additional cell phone software, browser plug-in, but directly by using hand
Possessed microphone apparatus on machine and computer records ambient sound, and analyzes the correlation of two sections of voice signals, is come with this true
Recognize the distance of two equipment, the more close then correlation of distance is higher, and correlation is higher than certain threshold value and thinks the second factor authentication
Pass through.In the first factor authentication, the present invention creatively proposes new thinking, because most of application program of mobile phone have mobile phone
Cipher memory function, even if closing application program, it can also be continued to run on mobile phone backstage, using this feature, can be saved
Go traditional Password Input the step.
Realize that specific step is as follows for the object of the invention:
(1) user's registration:
The user account in authentication registration logging on authentication, password on the server;
(2) mobile phone terminal logs in:
(2a) user is by mobile cellular network or WiFi, on mobile phone terminal login service device in authentication registration logging on authentication
Account, password;
Account after login, encrypted message are stored in mobile phone terminal by (2b) user;
(3) computer end login authentication:
(3a) user, by Internet, sends logging request to server end using the first authentication factor in computer end;
User inputs the account on server in authentication registration logging on authentication and carries out the first factor on the login interface that server is specified
Certification;
After (3b) server receives the logging request of user, by being sent through mobile cellular network or WiFi to mobile phone terminal
Open the request of microphone;
(3c) user opens microphone in mobile phone terminal and uses after the request that mobile phone terminal receives that server opens microphone
Ambient sound similarity calculating method carries out the second factor authentication;
(3d) mobile phone terminal and computer end carry out time synchronization, the microphone of mobile phone terminal and the wheat of computer end with server respectively
Gram wind records ambient sound 4 seconds simultaneously;
(3e) on the voice signal that the microphone of mobile phone terminal and the microphone of computer end are respectively recorded, when adding respective
Between stab, and encrypted with the public key of server, obtain encrypted two sections of voice signals;
Encrypted two sections of voice signals are sent to server through mobile cellular network or WiFi by (3f) mobile phone terminal;
(4) server decryption and analysis voice signal:
The private key of encrypted two sections of voice signals server is decrypted in (4a) server, two after being decrypted
Section voice signal;
(4b) safety according to required by user and convenience, arbitrarily choose between 1% to 100% similarity value
One value, the threshold value S as similaritym;
(4c) server is to two sections of voice signals after decryption, and according to its respective timestamp, use environment sound is similar
Calculation method is spent, sound similarity analysis is carried out;
(5) whether the sound similarity value of two sections of voice signals after judging decryption is higher than threshold value Sm, if so, executing step
Suddenly (6);Otherwise, step (7) are executed;
(6) server authorizes computer end subscriber logon rights;
(7) server refusal authorizes computer end subscriber logon rights.
Compared with prior art, the invention has the following advantages that
The first, the present invention using mobile phone as carrier by the account of user as the first authentication factor, overcome the prior art and want
Ask user to carry out cumbersome authentication operation problem makes so that verification process of the invention allows user to save the operation of Password Input
The present invention has convenience.
The second, the microphone for having been used mobile phone terminal and computer end in the second factor authentication due to the present invention is overcome existing
Hardware device will be carried by having technology to verify every time, and these hardware devices to technology it is extensive development bring additionally at
This problem, so that of the invention has the advantages that development property and development are at low cost.
Third, present invention uses ambient sound similarity calculating methods, carry out to the second authentication factor in the present invention
Certification, the communication channel for overcoming the prior art are easily controlled and monitor, it is difficult to guarantee asking for the safety in verification process
Topic, enables verification process of the invention to resist the safety advantages of Replay Attack and long-range attack.
Detailed description of the invention
Fig. 1 is flow chart of the invention.
Fig. 2 is in T=4s, and different distance L and sound source number N use method of the invention, obtained average environment
Sound similarity value S.
Specific embodiment
The present invention is described further with reference to the accompanying drawing.
Referring to Fig.1, specific steps of the invention include as follows.
Step 1, user's registration.
The user account in authentication registration logging on authentication, password on the server.
Step 2, mobile phone terminal logs in.
User is by mobile cellular network or WiFi, the account on mobile phone terminal login service device in authentication registration logging on authentication
Family, password.
Account after login, encrypted message are stored in mobile phone terminal by user.
Step 3, computer end login authentication.
User, by Internet, sends logging request to server end using the first authentication factor in computer end;User
On the login interface that server is specified, inputs the first factor of account progress on server in authentication registration logging on authentication and recognize
Card.
First authentication factor has referred to the account in authentication registration logging on authentication on the server.
After server receives the logging request of user, opened by being sent through mobile cellular network or WiFi to mobile phone terminal
The request of microphone.
User opens microphone use environment after the request that mobile phone terminal receives that server opens microphone, in mobile phone terminal
Sound similarity calculating method carries out the second factor authentication.
Specific step is as follows for the ambient sound similarity calculating method:
The first step collects any two sections of voice signals of mobile phone terminal microphone and computer end microphone records;
Second step, by the gross energy standard of mobile phone terminal microphone and any two sections of voice signals of computer end microphone records
Turn to 1.
Third step calculates any two sections of voice signals of mobile phone terminal microphone and computer end microphone records according to the following formula
Time domain cross correlation value:
Sc(Xi,Xj)=Cross-Corr (Xi,Xj)
Dc(Xi,Xj)=1-Sc(Xi,Xj)
Wherein, Sc(Xi,Xj) indicate mobile phone terminal microphone and computer end microphone records any two sections of voice signal XiWith
XjTime domain cross correlation value;Cross-Corr () indicates cross-correlation function;XiAnd XjRespectively indicate mobile phone terminal microphone and electricity
Any two sections of voice signals of brain end microphone records;Dc(Xi,Xj) indicate mobile phone terminal microphone and computer end microphone records
Any two sections of voice signal XiAnd XjTime domain otherness value.
4th step using Fourier transform formula, calculates mobile phone terminal microphone and computer end microphone records according to the following formula
Any two sections of voice signals frequency coefficient: #
Wherein Fi(ω) and Fj(ω) respectively indicates any two sections of sound of mobile phone terminal microphone and computer end microphone records
Signal XiAnd XjFrequency coefficient;Indicate integration operation;Xi(t) and Xj(t) mobile phone terminal microphone and computer end are respectively indicated
Any two sections of voice signal X of microphone recordsiAnd XjFunction in the time domain.
5th step calculates any two sections of voice signals of mobile phone terminal microphone and computer end microphone records according to the following formula
XiAnd XjFrequency coefficient Euclidean Norm distance value:
Dd(Xi,Xj)=| | Xi-Xj||
Wherein, Dd(Xi,Xj) indicate mobile phone terminal microphone and computer end microphone records any two sections of voice signal XiWith
XjFrequency coefficient Euclidean Norm distance value, | | | | indicate Euclidean Norm function.
6th step calculates any two of mobile phone terminal microphone and computer end microphone records on two-dimensional space according to the following formula
Section voice signal XiAnd XjWhen-frequency similarity value:
S(Xi,Xj)=1-D (Xi,Xj)
Wherein, D (Xi,Xj) indicate mobile phone terminal microphone and computer end microphone records any two sections of voice signal XiWith
XjSound differences value;Radical sign operation is opened in expression;Dc(Xi,Xj) indicate mobile phone terminal microphone and computer end microphone records
Any two sections of voice signal XiAnd XjTime domain difference value;Dd(Xi,Xj) indicate mobile phone terminal microphone and computer end microphone records
Any two sections of voice signal XiAnd XjFrequency coefficient Euclidean Norm distance value;S(Xi,Xj) indicate mobile phone on two-dimensional space
Hold any two sections of voice signal X of microphone and computer end microphone recordsiAnd XjWhen-frequency similarity value.Described second is recognized
Card factor refers to, the user's distance of mobile phone terminal to computer end when computer end logs in.
After mobile phone terminal and computer end respectively carry out time synchronization with server, the microphone of mobile phone terminal and the Mike of computer end
Wind records ambient sound 4 seconds simultaneously.
On the voice signal that the microphone of mobile phone terminal and the microphone of computer end are respectively recorded, respective timestamp is added
And it is encrypted with the public key of server.
Encrypted two sections of voice signals are sent to server through mobile cellular network or WiFi by mobile phone terminal.
Step 4, server decryption and analysis voice signal.
The private key of encrypted two sections of voice signals server is decrypted in server, two after being decrypted section sound
Sound signal.
The safety according to required by user and convenience arbitrarily choose one between 1% to 100% similarity value
Value, the threshold value S as similaritym。
Server is to two sections of voice signals after decryption, according to its respective timestamp, use environment sound similarity meter
Calculation method carries out sound similarity analysis.
Step 5, whether the sound similarity value of two sections of voice signals after judging decryption is higher than threshold value Sm, if so, holding
Row step 6;Otherwise, step 7 is executed.
Step 6, server authorizes computer end subscriber logon rights.
Step 7, server refusal authorizes computer end subscriber logon rights.
Effect of the invention is described further below with reference to emulation experiment.
1. emulation experiment condition:
Condition 1, in Intel (R) Celeron (R) G540 processor, 7 Ultimate operating system of Windows it is desk-top
The result that test emulation is tested on computer.
Condition 2 is connect with Mozilla Firefox browser (version number 47.0.1.6018) in-service units on computers
By realizing Navigator.getUserMedia () function on mouth, starting microphone obtains audio file, when user need to use wheat
When gram wind carries out the second factor authentication, this function will be activated.
2. emulation experiment content and interpretation of result:
Emulation experiment of the invention is to do login test respectively in quiet indoor environment and noisy outdoor environment.
Environment indoors, for emulation experiment of the invention by setting sound source number N=1, sound source is music player, with
This simulates indoor environment.
Under outdoor environment, for emulation experiment of the invention by setting sound source number N (N > 1), sound source is music
Device simulates outdoor environment with this.
In experiment, Lm is set by the distance of mobile phone terminal and computer end microphone, sets Ts for record length, by environment
Sound similarity threshold is set as Sm。
Under indoor environment, 1 is set by sound source number N, to obtain different distance Lm and record length Ts and average sound
Relationship between sound similarity value S, emulation experiment of the invention have carried out 427 registers.
Using the ambient sound data being collected into, use environment sound similarity calculating method calculates every a pair of of sound number
According to ambient sound similarity value, average to obtained ambient sound similarity value, obtain table 1.L indicates mobile phone in table 1
Hold distance of the microphone to computer end microphone, unit: rice (m);T indicates to record the time of ambient sound, unit: second (s).
Table 1: average environment sound similarity list unit: %
From table 1, it can be found that following rule: record length T is longer, and average Voice similarity value S is bigger.Mobile phone terminal Mike
The distance L of wind to computer end microphone is remoter, and average environment sound similarity value S is smaller.Record length is longer, mobile phone terminal Mike
Influence of the distance L to average Voice similarity value S of wind to computer end microphone is smaller.
For the convenience of the verification process of dual factors rapid authentication method of the raising based on ambient sound, emulation of the invention
Experiment discovery can satisfy convenience and require and have ideal average similarity value S, at this time hand as record length T=4s
Influence of the distance L to average similarity value S of generator terminal microphone to computer end microphone is also smaller, then in following emulation
4s is set by record length T in experiment.
Under outdoor environment, sound source number is set N (N > 1) by emulation experiment of the invention, sets record length T to
4s, this experiment have carried out 3246 registers.
Using the ambient sound data being collected into, use environment sound similarity calculating method obtains its respective ambient sound
Sound similarity value.
Take sound source number N=1, experimental data when 3,6,9 is arranged, and Fig. 2 is obtained.Abscissa indicates mobile phone in Fig. 2
Hold the distance L of computer end, unit: rice.Ordinate in Fig. 2 indicates average environment sound similarity value S.With diamond shape in Fig. 2
The curve of mark indicates to obtain average environment sound similarity curve when sound source number N=1;With the song of square mark in Fig. 2
Line indicates to obtain average environment sound similarity curve when sound source number N=3;Sound is indicated with the curve that triangle indicates in Fig. 2
Average environment sound similarity curve is obtained when the number N=6 of source;Sound source number N=9 is indicated with the curve that fork-shaped indicates in Fig. 2
When obtain average environment sound similarity curve.
It is found from Fig. 2, the average environment sound similarity value S of each curve is slowly reduced within distance 5m.Sound source number N
More, average environment sound similarity value S reduces faster other than 5 meters of distance.
For the safety of the verification process of dual factors rapid authentication method of the raising based on ambient sound, remotely attacked with resisting
It hits, by ambient sound similarity threshold values SmIt is set as 95%, can either guarantee the success rate of user log-in authentication, can also be guaranteed
The safety of process of user login.
Claims (4)
1. a kind of dual factors rapid authentication method based on ambient sound, comprises the following steps that
(1) user's registration:
The user account in authentication registration logging on authentication, password on the server;
(2) mobile phone terminal logs in:
(2a) user is by mobile cellular network or WiFi, the account on mobile phone terminal login service device in authentication registration logging on authentication
Family, password;
Account after login, encrypted message are stored in mobile phone terminal by (2b) user;
(3) computer end login authentication:
(3a) user, by Internet, sends logging request to server end using the first authentication factor in computer end;User
On the login interface that server is specified, inputs the first factor of account progress on server in authentication registration logging on authentication and recognize
Card;
After (3b) server receives the logging request of user, opened by being sent through mobile cellular network or WiFi to mobile phone terminal
The request of microphone;
(3c) user opens microphone use environment after the request that mobile phone terminal receives that server opens microphone, in mobile phone terminal
Sound similarity calculating method carries out the second factor authentication;
(3d) mobile phone terminal and computer end carry out time synchronization, the microphone of mobile phone terminal and the microphone of computer end with server respectively
Record ambient sound 4 seconds simultaneously;
(3e) adds the respective time on the voice signal that the microphone of mobile phone terminal and the microphone of computer end are respectively recorded
Stamp, and encrypted with the public key of server, obtain encrypted two sections of voice signals;
Encrypted two sections of voice signals are sent to server through mobile cellular network or WiFi by (3f) mobile phone terminal;
(4) server decryption and analysis voice signal:
The private key of encrypted two sections of voice signals server is decrypted in (4a) server, two after being decrypted section sound
Sound signal;
(4b) safety according to required by user and convenience, arbitrarily choose one between 1% to 100% similarity value
Value, the threshold value S as similaritym;
(4c) server is to two sections of voice signals after decryption, according to its respective timestamp, use environment sound similarity meter
Calculation method carries out sound similarity analysis;
(5) whether the sound similarity value of two sections of voice signals after judging decryption is higher than threshold value Sm, if so, thening follow the steps
(6);Otherwise, step (7) are executed;
(6) server authorizes computer end subscriber logon rights;
(7) server refusal authorizes computer end subscriber logon rights.
2. the dual factors rapid authentication method according to claim 1 based on ambient sound, which is characterized in that step (3a)
Described in the first authentication factor refer to, the account in authentication registration logging on authentication on the server.
3. the dual factors rapid authentication method according to claim 1 based on ambient sound, which is characterized in that step (3c)
Described in ambient sound similarity calculating method specific step is as follows:
The first step collects any two sections of voice signals of mobile phone terminal microphone and computer end microphone records;
The gross energy of mobile phone terminal microphone and any two sections of voice signals of computer end microphone records is standardized as by second step
1;
Third step, according to the following formula, calculate any two sections of voice signals of mobile phone terminal microphone and computer end microphone records when
Domain cross correlation value:
Sc(Xi,Xj)=Cross-Corr (Xi,Xj)
Dc(Xi,Xj)=1-Sc(Xi,Xj)
Wherein, Sc(Xi,Xj) indicate mobile phone terminal microphone and computer end microphone records any two sections of voice signal XiAnd Xj's
Time domain cross correlation value;Cross-Corr () indicates cross-correlation function;XiAnd XjRespectively indicate mobile phone terminal microphone and computer end
Any two sections of voice signals of microphone records;Dc(Xi,Xj) indicate any of mobile phone terminal microphone and computer end microphone records
Two sections of voice signal XiAnd XjTime domain otherness value;
4th step using Fourier transform formula, calculates times of mobile phone terminal microphone and computer end microphone records according to the following formula
It anticipates the frequency coefficients of two sections of voice signals:
Wherein Fi(ω) and Fj(ω) respectively indicates any two sections of voice signals of mobile phone terminal microphone and computer end microphone records
XiAnd XjFrequency coefficient;Indicate integration operation;Xi(t) and Xj(t) mobile phone terminal microphone and computer end wheat are respectively indicated
Any two sections of voice signal X that gram wind is recordediAnd XjFunction in the time domain;
5th step calculates any two sections of voice signal X of mobile phone terminal microphone and computer end microphone records according to the following formulaiAnd Xj
Frequency coefficient Euclidean Norm distance value:
Dd(Xi,Xj)=| | Xi-Xj||
Wherein, Dd(Xi,Xj) indicate mobile phone terminal microphone and computer end microphone records any two sections of voice signal XiAnd Xj's
The Euclidean Norm distance value of frequency coefficient, | | | | indicate Euclidean Norm function;
6th step calculates any two sections of sound of mobile phone terminal microphone and computer end microphone records on two-dimensional space according to the following formula
Sound signal XiAnd XjWhen-frequency similarity value:
S(Xi,Xj)=1-D (Xi,Xj)
Wherein, D (Xi,Xj) indicate mobile phone terminal microphone and computer end microphone records any two sections of voice signal XiAnd XjSound
Sound difference value;Radical sign operation is opened in expression;Dc(Xi,Xj) indicate any the two of mobile phone terminal microphone and computer end microphone records
Section voice signal XiAnd XjTime domain difference value;Dd(Xi,Xj) indicate any of mobile phone terminal microphone and computer end microphone records
Two sections of voice signal XiAnd XjFrequency coefficient Euclidean Norm distance value;S(Xi,Xj) indicate mobile phone terminal Mike on two-dimensional space
Any two sections of voice signal X of wind and computer end microphone recordsiAnd XjWhen-frequency similarity value.
4. the dual factors rapid authentication method according to claim 1 based on ambient sound, which is characterized in that step (3c)
Described in the second factor authentication refer to, certification of the user when computer end logs between distance of the mobile phone terminal to computer end.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610708096.6A CN106330902B (en) | 2016-08-23 | 2016-08-23 | Dual factors rapid authentication method based on ambient sound |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610708096.6A CN106330902B (en) | 2016-08-23 | 2016-08-23 | Dual factors rapid authentication method based on ambient sound |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106330902A CN106330902A (en) | 2017-01-11 |
CN106330902B true CN106330902B (en) | 2019-07-02 |
Family
ID=57742336
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610708096.6A Active CN106330902B (en) | 2016-08-23 | 2016-08-23 | Dual factors rapid authentication method based on ambient sound |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106330902B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106847300B (en) * | 2017-03-03 | 2018-06-22 | 北京捷思锐科技股份有限公司 | A kind of voice data processing method and device |
CN109818755A (en) * | 2019-03-08 | 2019-05-28 | 湖南第一师范学院 | A kind of transparent two-factor authentication system and method |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103813323B (en) * | 2012-11-06 | 2015-12-09 | 心动网络股份有限公司 | Carried out the method for user's certification mutually by collision mode between a kind of mobile terminal |
CN103813322A (en) * | 2012-11-06 | 2014-05-21 | 上海心动企业发展有限公司 | Method for mutually authenticating users between mobile terminals by using collision manner |
CN203399141U (en) * | 2013-09-06 | 2014-01-15 | 中国工商银行股份有限公司 | Information channel security certificate device |
CN104869568B (en) * | 2014-02-26 | 2018-03-02 | 中国科学院软件研究所 | A kind of monitoring system collocation method and system based on audio |
-
2016
- 2016-08-23 CN CN201610708096.6A patent/CN106330902B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN106330902A (en) | 2017-01-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109657450B (en) | Method, device, medium, and electronic device for evaluation based on block chain | |
CN105610938B (en) | Logging state synchronous method and system | |
WO2018166187A1 (en) | Server, identity verification method and system, and a computer-readable storage medium | |
US8862888B2 (en) | Systems and methods for three-factor authentication | |
CN108989278A (en) | Identification service system and method | |
Kim et al. | A method of risk assessment for multi-factor authentication | |
CN103763356B (en) | A kind of SSL establishment of connection method, apparatus and system | |
Truong et al. | Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication | |
CN107070667A (en) | Identity identifying method, user equipment and server | |
CN108959933A (en) | Risk analysis device and method for the certification based on risk | |
WO2017032263A1 (en) | Identity authentication method and apparatus | |
US10360555B2 (en) | Near field authentication through communication of enclosed content sound waves | |
US20190362064A1 (en) | Method and Apparatus for Secure and Usable Mobile Two-Factor Authentication | |
Li et al. | Velody: Nonlinear vibration challenge-response for resilient user authentication | |
US20120159603A1 (en) | Mobile out-of-band authentication service | |
CN105141615A (en) | Method and system for opening account remotely, authentication method and system | |
CN109413096B (en) | A kind of login method and device more applied | |
CN106790260A (en) | A kind of multiple-factor identity identifying method | |
CN106488452A (en) | A kind of mobile terminal safety access authentication method of combination fingerprint | |
KR20220019834A (en) | Method and system for authenticating transmission of secure credentials to a device | |
CN107707356B (en) | A kind of mobile device secure binding method and application system based on two dimensional code identification | |
US20160294822A1 (en) | Proximity based authentication using bluetooth | |
CN104168117B (en) | A kind of speech digit endorsement method | |
US11171958B1 (en) | Secure session sharing between computing devices | |
CN106330902B (en) | Dual factors rapid authentication method based on ambient sound |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |