CN106357411A - Identity verification method and device - Google Patents

Identity verification method and device Download PDF

Info

Publication number
CN106357411A
CN106357411A CN201610898257.2A CN201610898257A CN106357411A CN 106357411 A CN106357411 A CN 106357411A CN 201610898257 A CN201610898257 A CN 201610898257A CN 106357411 A CN106357411 A CN 106357411A
Authority
CN
China
Prior art keywords
information
user
result
voice signal
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610898257.2A
Other languages
Chinese (zh)
Inventor
彭明东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tinno Wireless Technology Co Ltd
Original Assignee
Shenzhen Tinno Wireless Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tinno Wireless Technology Co Ltd filed Critical Shenzhen Tinno Wireless Technology Co Ltd
Priority to CN201610898257.2A priority Critical patent/CN106357411A/en
Publication of CN106357411A publication Critical patent/CN106357411A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Abstract

The embodiment of the invention provides an identity verification method and device. On the one hand, the method comprises the following steps: outputting first information, then receiving a voice signal input by a user according to the first information, and then performing voiceprint recognition according to the voice signal to obtain a recognition result; verifying the content of the voice signal to obtain a verification result; and then obtaining an identity verification result of the user according to the recognition result and the verification result. Therefore, the technical scheme provided by the embodiment of the invention can solve the problem of relatively high safety risk of the conventional identity verification method in the prior art.

Description

A kind of auth method and device
[technical field]
The present invention relates to communication technical field, more particularly, to a kind of auth method and device.
[background technology]
With terminal becoming increasingly popular in people's life, user carries out logging in, the operation such as pays, unlocks in using terminal Before, it is required for the identity of user is verified, in prior art, typically tested by modes such as fingerprint identification technology, passwords The identity of card user.
In realizing process of the present invention, inventor finds that in prior art, at least there are the following problems:
Verified by modes such as fingerprint identification technology, passwords user identity when, the fingerprint of user or password more hold It is vulnerable to attack, depend on this authentication mode to lead to terminal may there is larger safety when executing assigned operation Property risk.
[content of the invention]
In view of this, a kind of auth method and device are embodiments provided, in order to solve in prior art There are larger security risks in auth method.
On the one hand, embodiments provide a kind of auth method, comprising:
The output first information;
The voice signal that receive user inputs according to the described first information;
Application on Voiceprint Recognition is carried out according to described voice signal, to obtain recognition result;And, the content to described voice signal Verified, to obtain the result;
According to described recognition result and described the result, obtain the authentication result of described user.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, output first letter Before breath, methods described also includes:
Dynamically generate the described first information.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, according to described knowledge Other result and described the result, obtain the authentication result of described user, comprising:
If described recognition result is to specify user for described user, and described the result is the content of described voice signal By checking, the authentication result obtaining described user is by checking.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, methods described is also Including:
When the authentication result of described user is by checking, execute assigned operation.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, dynamically generate institute Before stating the first information, methods described also includes:
Receive the second information of described user input;
Judge whether described second information and default specify information match;
If described second information and default specify information match, the step that execution dynamically generates the described first information.
One of technique scheme technical scheme has the advantages that
Auth method provided in an embodiment of the present invention, by exporting the first information, then, receive user is according to described The voice signal of first information input, thus, Application on Voiceprint Recognition is carried out according to described voice signal, to obtain recognition result;And, The content of described voice signal is verified, to obtain the result;And then, according to described recognition result and described checking knot Really, obtain the authentication result of described user.Phonatory organ due to everyone are not quite similar, the vocal print of any two people Collection of illustrative plates is all discrepant, and therefore, carrying out Application on Voiceprint Recognition using the voice signal of user input can have higher accuracy rate, be Avoid the impact to Application on Voiceprint Recognition result for the situation that the acoustic information of user is replicated, in the embodiment of the present invention also to The voice signal of family input carries out content verification, so, considers the recognition result of Application on Voiceprint Recognition and content verification result obtains To user authentication as a result, it is possible to be effectively prevented from replicating user speech just can be by the problem verified, with prior art In user ID authentication method compare, improve the accuracy rate of the result, so also reduce terminal carrying out specify behaviour Security risks during work, therefore, the embodiment of the present invention solve auth method in prior art exist larger The problem of security risks.
On the other hand, a kind of authentication means are embodiments provided, comprising:
Output unit, for exporting the first information;
Receiving unit, the voice signal being inputted according to the described first information for receive user;
Authentication unit, for carrying out Application on Voiceprint Recognition according to described voice signal, to obtain recognition result;And, to described The content of voice signal is verified, to obtain the result;
Acquiring unit, for according to described recognition result and described the result, obtaining the authentication knot of described user Really.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, described device is also Including:
Signal generating unit, before exporting the first information, dynamically generates the described first information.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, described acquisition list Unit, specifically for:
If described recognition result is described user is probably to specify user, and described the result is described voice signal Content passes through checking, and the authentication result obtaining described user is by checking.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation, described device is also Including:
Processing unit, for executing assigned operation.
Aspect as above and arbitrary possible implementation, it is further provided a kind of implementation,
Described receiving unit, is additionally operable to receive the second information of described user input;
Described authentication unit, is additionally operable to carry out identification according to described second information, to obtain the second recognition result;
Described signal generating unit, if being additionally operable to described second recognition result is that described user possibly specifies user, dynamically gives birth to Become the described first information.
One of technique scheme technical scheme has the advantages that
Authentication means provided in an embodiment of the present invention, by output unit output first letter in authentication means Breath, then, the voice signal that the receiving unit receive user in authentication means inputs according to the described first information, thus, Authentication unit in authentication means carries out Application on Voiceprint Recognition according to described voice signal, to obtain recognition result;And, to institute The content stating voice signal is verified, to obtain the result;And then, the acquiring unit in authentication means is according to described Recognition result and described the result, obtain the authentication result of described user.Due to everyone phonatory organ not to the utmost Identical, the voiceprint map of any two people is all discrepant, and therefore, the voice signal using user input carries out Application on Voiceprint Recognition Can there is higher accuracy rate, in order to avoid situation that the acoustic information of user the is replicated shadow to Application on Voiceprint Recognition result Ring, also content verification is carried out to the voice signal of user input in the embodiment of the present invention, so, consider the knowledge of Application on Voiceprint Recognition Other result and content verification result obtain the authentication of user and just can pass through as a result, it is possible to be effectively prevented from replicating user speech The problem of checking, compared with user ID authentication method of the prior art, improves the accuracy rate of the result, and then also subtracts Little security risks during carrying out assigned operation for the terminal, therefore, the embodiment of the present invention solves body in prior art There are larger security risks in part verification method.
[brief description]
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below will be attached to use required in embodiment Figure be briefly described it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this area For those of ordinary skill, without having to pay creative labor, can also be other attached according to the acquisition of these accompanying drawings Figure.
Fig. 1 is the first pass schematic diagram of the auth method that the embodiment of the present invention is provided;
Fig. 2 is the second procedure schematic diagram of the auth method that the embodiment of the present invention is provided;
Fig. 3 is the schematic flow sheet that the auth method that the embodiment of the present invention is provided is applied to pay during scene;
Fig. 4 is the functional block diagram of the authentication means that the embodiment of the present invention is provided.
[specific embodiment]
In order to be better understood from technical scheme, below in conjunction with the accompanying drawings the embodiment of the present invention is retouched in detail State.
It will be appreciated that described embodiment is only a part of embodiment of the present invention, rather than whole embodiment.Base Embodiment in the present invention, those of ordinary skill in the art obtained under the premise of not making creative work all its Its embodiment, broadly falls into the scope of protection of the invention.
The term using in embodiments of the present invention is the purpose only merely for description specific embodiment, and is not intended to be limiting The present invention." a kind of ", " described " and " being somebody's turn to do " of singulative used in the embodiment of the present invention and appended claims It is also intended to including most forms, unless context clearly shows that other implications.
It should be appreciated that term "and/or" used herein is only a kind of incidence relation of description affiliated partner, represent There may be three kinds of relations, for example, a and/or b, can represent: individualism a, there is a and b simultaneously, individualism b these three Situation.In addition, character "/" herein, typically represent forward-backward correlation to as if a kind of relation of "or".
It will be appreciated that though description information may be carried out using term first, second, third, etc. in embodiments of the present invention Deng, but these information etc. should not necessarily be limited by these terms.These terms are only used for information etc. is distinguished from each other out.For example, do not taking off In the case of range of embodiment of the invention, the first information can also be referred to as the second information, and similarly, the second information can also It is referred to as the first information.
Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determining " or " in response to detection ".Similarly, depending on linguistic context, phrase " if it is determined that " or " if detection (condition of statement or event) " can be construed to " when determining " or " in response to determining " or " when the detection (condition of statement Or event) when " or " in response to detecting (condition of statement or event) ".
Embodiment one
In order to solve the above-mentioned problems in the prior art, the embodiment of the present invention provides a kind of auth method, please Reference Fig. 1, the first pass schematic diagram of its auth method being provided by the embodiment of the present invention, as shown in figure 1, the method Comprise the following steps:
S101, exports the first information.
It should be noted that in the embodiment of the present invention, some characters can be included in the first information, can be only to count Word, or can also only have word, or, data and word can also be included.
One optional realize during, before the output first information, the method can also include: dynamically generates the One information.
In the embodiment of the present invention, the dynamic first information that generates can have multiple specific implementations, for example, it is possible at itself In the text of storage, randomly select passage as the first information;Or, and for example, it is also possible to counted with certain rule According to extracting some characteristic informations in storehouse using as the first information.The embodiment of the present invention is for the dynamic concrete reality generating the first information Existing mode is not particularly limited.
S102, the voice signal that receive user inputs according to the first information.
The first information of output in the embodiment of the present invention, is that user reads the first information for convenience, in this manner it is possible to adopt Collect the voice signal that user inputs according to the first information.
In the embodiment of the present invention gather user input voice signal concrete mode can have multiple.For example, it is possible to utilize The mike collection voice signal of terminal, or, can also be using the wheat on the wearable devices such as the earphone being connected with terminal Gram elegance collection voice signal.In the embodiment of the present invention, this is not particularly limited.
S103, carries out Application on Voiceprint Recognition according to voice signal, to obtain recognition result;And, the content of voice signal is entered Row checking, to obtain the result.
Specifically, sound groove recognition technology in e is one kind of biological identification technology, also referred to as Speaker Identification.Sound groove recognition technology in e May include that speaker's identification and speaker verification.Can be using different Application on Voiceprint Recognition skills for different tasks and application Art.
Vocal print is it is simply that the sound wave spectrum carrying linguistic information that shows of electricity consumption acoustic instrument.The vocal print figure of any two people Spectrum is all discrepant.Everyone phonatory organ are not quite similar, and therefore can be carried out according to the voice signal of user input Application on Voiceprint Recognition, to identify whether active user is to specify user.
It should be noted that the embodiment of the present invention is not particularly limited to the number of specified user, in actual applications, Can select according to actual needs to specify the number of user and specified user.When actual selection specifies user in addition it is also necessary to obtain Fetching determines the voiceprint of user.
During a concrete implementation, according to the voice signal of user input, it is right to extract from this voice signal The vocal print feature answered, then, the similarity that calculates this vocal print feature with the vocal print feature of the specified user prestoring.If should Similarity is more than or equal to default first similarity threshold, then the recognition result that can get is: this user is specified User.Or, if this similarity is less than default first similarity threshold, the recognition result that can get is: this user It is not to specify user.
Specifically, the first information in the embodiment of the present invention is dynamically generated, due to each first information exporting all It is different, therefore, the embodiment of the present invention is also verified according to the content of first information outfan voice signal to user.
During a concrete implementation, the voice signal of user input can be converted to text message, Ran Houji Calculate the character similarity of text information and the first information.Specifically, this similarity is similar more than or equal to default second Degree threshold value, illustrates that the content of voice signal and the first information match, then the result that can get is: voice signal Content passes through checking.Or, if this similarity is less than default second similarity threshold, the content and first of voice signal is described Information mismatches, then the result that can get is: the content of voice signal is not verified.
Specifically, the first similarity threshold and the second similarity threshold can be preset according to actual needs, the first phase Like degree threshold value and the second similarity threshold can identical it is also possible to different, the embodiment of the present invention is not particularly limited to this.
It should be noted that the embodiment of the present invention is not entered for the sequencing of Application on Voiceprint Recognition process and content verification process Row is particularly limited to, and this two processes can be carried out simultaneously, or it is also possible to holds according to default sequencing according to actual needs OK.
Specifically, it is contemplated that the voice of user also may can have the possibility being replicated, in order to keep away in the embodiment of the present invention The impact exempting from this situation for the accuracy rate of the result is in addition it is also necessary to verify to the voice signal of user input.If adopting The voice signal collecting is replicated and obtains, and the content being replicated the voice signal obtaining is different from the content of the first information just Content verification cannot be passed through;So, that is, enable and pass through Application on Voiceprint Recognition, but, still can not be by content verification it is ensured that final The authentication result of user accuracy rate, reduce auth method in prior art and there are larger security risks Problem.
S104, according to recognition result and the result, obtains the authentication result of user.
Specifically, in the embodiment of the present invention, if recognition result is: this user is to specify user, and the result is: voice The content of signal passes through checking, and the authentication result obtaining user is: by checking.
If it should be noted that recognition result is: this user is not to specify user, and the result is: voice signal Content passes through checking, and the authentication result obtaining user is: not verified;Or, recognition result is: this user is specified User, and the result is: the content of voice signal is not verified, and the authentication result obtaining user is: does not pass through to test Card;Or, recognition result is: this user is not to specify user, and the result is: the content of voice signal is not verified, The authentication result obtaining user is: not verified.
Specifically, in the embodiment of the present invention, after the authentication result of the user getting is during by checking, can To execute assigned operation.
It is intended that operation can include but is not limited in the embodiment of the present invention: complete to pay, complete to log in or unlock etc..
Specifically, refer to Fig. 2, the second procedure of its auth method being provided by the embodiment of the present invention is illustrated Figure, as shown in Fig. 2 in the embodiment of the present invention, when needing the identity of user is verified, first export the first information to use Family, and the voice signal of receiving user's input, then, this voice signal are carried out respectively Application on Voiceprint Recognition and content verification;Specifically , if the recognition result of Application on Voiceprint Recognition is: this user is to specify user, and the result of content verification is: voice signal Content passes through checking, now, by the authentication of user, afterwards, can carry out assigned operation;Or, if Application on Voiceprint Recognition Recognition result is: this user is not to specify user, then not by the authentication of user;Or, if the checking knot of content verification Fruit is: the content of voice signal is not verified, then not by the authentication of user.
During a concrete implementation, if not by the authentication of user, can carry for output authentication failed Show information.Or, and for example, during another concrete implementation, if not by the authentication of user, can also repeat Carry out such scheme, re-start authentication in order to user.It is understood that both the above implementation is only in order to lift Example explanation, not in order to limit the application, the embodiment of the present invention does not carry out spy to the operation after the authentication failure of user Do not limit.
Specifically, in the embodiment of the present invention, can also dynamic generate the first information before, carry out other checkings, when testing After card passes through, more further authentication is carried out to user identity.
Specifically, can dynamic generate the first information before, the second information of receiving user's input, then, judge the Whether two information are matched with default specify information, if the second information is matched with default specify information, execution is dynamically given birth to The step becoming the first information.
It should be noted that the second information can include but is not limited at least one in physiological attribute information and checking information Kind.Specifically, physiological attribute information includes but is not limited to: finger print information, palmprint information, iris image and facial image;Checking Information can include but is not limited to: character string information, Word message and pattern-information etc..
Illustrate, if the second information of the user input receiving is finger print information, by the fingerprint letter of user input Breath is compared with default finger print information, if the finger print information of user input is matched with default finger print information, executes The dynamic step generating the first information.
Or, and for example, if the second information of the user input receiving is character string information, by the word of user input Symbol string information is compared with default character string information, if the character string information of user input and default character string information phase Coupling, then execute the dynamic step generating the first information.
It should be noted that involved terminal in the embodiment of the present invention can include but is not limited to personal computer (personal computer, pc), personal digital assistant (personal digital assistant, pda), wireless handheld Equipment, panel computer (tablet computer), mobile phone etc..
It should be noted that the executive agent of s101~s104 can be authentication means, this device may be located at this The application of ground terminal, or can also be plug-in unit or the SDK (software in the application be located locally terminal Development kit, sdk) etc. functional unit, the embodiment of the present invention is not particularly limited to this.
It is understood that application can be mounted in the application program (nativeapp) in terminal, or can also be One web page program (webapp) of the browser in terminal, the embodiment of the present invention is not defined to this.
The technical scheme of the embodiment of the present invention has the advantages that
Auth method provided in an embodiment of the present invention, by exporting the first information, then, receive user is according to first The voice signal of information input, thus, Application on Voiceprint Recognition is carried out according to voice signal, to obtain recognition result;And, voice is believed Number content verified, to obtain the result;And then, according to recognition result and the result, the identity obtaining user is tested Card result.Phonatory organ due to everyone are not quite similar, and the voiceprint map of any two people is all discrepant, therefore, Carrying out Application on Voiceprint Recognition using the voice signal of user input can have higher accuracy rate, in order to avoid the acoustic information to user The impact to Application on Voiceprint Recognition result for the situation about being replicated, also carries out interior to the voice signal of user input in the embodiment of the present invention Hold checking, so, consider the recognition result of Application on Voiceprint Recognition and content verification result obtains the authentication result of user, energy Enough it is effectively prevented from replicating the problem that user speech just can pass through checking, with user ID authentication method phase of the prior art Than, improve the accuracy rate of the result, and then also reduce security risks during carrying out assigned operation for the terminal, because This, the embodiment of the present invention solves the problems, such as that in prior art, auth method has larger security risks.
Embodiment two
The auth method in a kind of concrete implementation mode, the embodiment of the present invention being provided below is illustrated, should Citing is not used in the application scenarios limiting the auth method that the embodiment of the present invention is provided, and those skilled in the art can manage Solution, needs to carry out verifying that under scene, the method for this programme can be carried out authentication to user at other.
Present embodiments provide a kind of auth method being applied under payment scene.Refer to Fig. 3, it is the present invention The auth method that embodiment is provided is applied to pay schematic flow sheet during scene, as shown in figure 3, the method specifically may be used To include:
S301, the finger print information of receiving user's input.
S302, this finger print information is compared with default finger print information.
S303, judges whether this finger print information is mated with default finger print information;If so, execute s304;If it is not, execution s311.
S304, dynamically generates the first information.
S305, exports the first information.
S306, the voice signal that collection user inputs according to the first information.
S307, carries out Application on Voiceprint Recognition according to this voice signal, obtains Application on Voiceprint Recognition result.
S308, judges whether Application on Voiceprint Recognition result is passed through;If so, execute s309;If it is not, execution s311.
S309, judges whether the content of this voice signal is consistent with the content of the first information;If so, execute s310;If it is not, Execution s311.
S310, execution completes the operation paying.
S311, terminates, and shows the information of authentication failed.
The technical scheme of the embodiment of the present invention has the advantages that
Phonatory organ due to everyone are not quite similar, and the voiceprint map of any two people is all discrepant, therefore, Carrying out Application on Voiceprint Recognition using the voice signal of user input can have higher accuracy rate, in order to avoid the acoustic information to user The impact to Application on Voiceprint Recognition result for the situation about being replicated, also carries out interior to the voice signal of user input in the embodiment of the present invention Hold checking, so, consider the recognition result of Application on Voiceprint Recognition and content verification result obtains the authentication result of user, energy Enough it is effectively prevented from replicating the problem that user speech just can pass through checking, with user ID authentication method phase of the prior art Than, improve the accuracy rate of the result, and then also reduce security risks during carrying out assigned operation for the terminal, because This, the embodiment of the present invention solves the problems, such as that in prior art, auth method has larger security risks.
Embodiment three
The auth method being provided based on above-described embodiment one, the embodiment of the present invention is given further realizes above-mentioned side The device embodiment of each step and method in method embodiment.
Refer to Fig. 4, it is the functional block diagram of the provided authentication means of the embodiment of the present invention.As shown in figure 4, should Device includes:
Output unit 41, for exporting the first information;
Receiving unit 42, the voice signal being inputted according to the first information for receive user;
Authentication unit 43, for carrying out Application on Voiceprint Recognition according to voice signal, to obtain recognition result;And, voice is believed Number content verified, to obtain the result;
Acquiring unit 44, for according to recognition result and the result, obtaining the authentication result of user.
Specifically, in the embodiment of the present invention, this device also includes:
Signal generating unit 45, before exporting the first information, dynamically generates the first information.
During a concrete implementation, acquiring unit 34, specifically for:
If recognition result is probably to specify user for user, and the result passes through checking for the content of voice signal, obtains The authentication result obtaining user is by checking.
Specifically, in the embodiment of the present invention, this device also includes:
Processing unit 46, for when the authentication result of user is by checking, executing assigned operation.
During another concrete implementation, receiving unit 42, it is additionally operable to the second information of receiving user's input;
Authentication unit 43, is additionally operable to judge whether the second information is matched with default specify information;
Signal generating unit 45, if second information that is additionally operable to is matched with default specify information, execution is dynamic to generate the first information Step.
Because each unit in the present embodiment is able to carry out the method shown in Fig. 1, the part that the present embodiment does not describe in detail, Refer to the related description to Fig. 1.
The technical scheme of the embodiment of the present invention has the advantages that
Authentication means provided in an embodiment of the present invention, by output unit output first letter in authentication means Breath, then, the voice signal that the receiving unit receive user in authentication means inputs according to the first information, thus, identity Authentication unit in checking device carries out Application on Voiceprint Recognition according to voice signal, to obtain recognition result;And, to voice signal Content is verified, to obtain the result;And then, the acquiring unit in authentication means is according to recognition result and checking knot Really, obtain the authentication result of user.Phonatory organ due to everyone are not quite similar, the voiceprint map of any two people It is all discrepant, therefore, carrying out Application on Voiceprint Recognition using the voice signal of user input can have higher accuracy rate, in order to keep away Exempt from the impact to Application on Voiceprint Recognition result of situation that the acoustic information of user is replicated, also defeated to user in the embodiment of the present invention The voice signal entering carries out content verification, so, considers the recognition result of Application on Voiceprint Recognition and content verification result is used The authentication at family as a result, it is possible to be effectively prevented from replicates user speech just can be and of the prior art by the problem verified User ID authentication method is compared, and improves the accuracy rate of the result, and then also reduces terminal and carrying out assigned operation mistake Security risks in journey, therefore, the embodiment of the present invention solves auth method in prior art and there is larger safety The problem of property risk.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description, Device and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
It should be understood that disclosed system in several embodiments provided by the present invention, apparatus and method are permissible Realize by another way.For example, device embodiment described above is only schematically, for example, described unit Divide, only a kind of division of logic function, actual can have other dividing mode when realizing, for example, multiple units or group Part can in conjunction with or be desirably integrated into another system, or some features can be ignored, or does not execute.Another, shown Or the coupling each other that discusses or direct-coupling or communication connection can be by some interfaces, device or unit indirect Coupling or communication connection, can be electrical, mechanical or other forms.
The described unit illustrating as separating component can be or may not be physically separate, show as unit The part showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.The mesh to realize this embodiment scheme for some or all of unit therein can be selected according to the actual needs 's.
In addition, can be integrated in a processing unit in each functional unit in each embodiment of the present invention it is also possible to It is that unit is individually physically present it is also possible to two or more units are integrated in a unit.Above-mentioned integrated list Unit both can be to be realized in the form of hardware, it would however also be possible to employ the form that hardware adds SFU software functional unit is realized.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in an embodied on computer readable and deposit In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions with so that a computer Device (can be personal computer, server, or network equipment etc.) or processor (processor) execution the present invention each The part steps of embodiment methods described.And aforesaid storage medium includes: u disk, portable hard drive, read only memory (read- Only memory, rom), random access memory (random access memory, ram), magnetic disc or CD etc. various Can be with the medium of store program codes.
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention Within god and principle, any modification, equivalent substitution and improvement done etc., should be included within the scope of protection of the invention.

Claims (10)

1. a kind of auth method is it is characterised in that methods described includes:
The output first information;
The voice signal that receive user inputs according to the described first information;
Application on Voiceprint Recognition is carried out according to described voice signal, to obtain recognition result;And, the content of described voice signal is carried out Checking, to obtain the result;
According to described recognition result and described the result, obtain the authentication result of described user.
2. method according to claim 1 is it is characterised in that before the output first information, methods described also includes:
Dynamically generate the described first information.
3. method according to claim 1 is it is characterised in that according to described recognition result and described the result, obtain The authentication result of described user, comprising:
If described recognition result is to specify user for described user, and described the result is that the content of described voice signal is passed through Checking, the authentication result obtaining described user is by checking.
4. the method according to claim 1 or 3 is it is characterised in that methods described also includes:
When the authentication result of described user is by checking, execute assigned operation.
5., before method according to claim 2 is it is characterised in that dynamically generate the described first information, methods described is also Including:
Receive the second information of described user input;
Judge whether described second information and default specify information match;
If described second information and default specify information match, the step that execution dynamically generates the described first information.
6. a kind of authentication means are it is characterised in that described device includes:
Output unit, for exporting the first information;
Receiving unit, the voice signal being inputted according to the described first information for receive user;
Authentication unit, for carrying out Application on Voiceprint Recognition according to described voice signal, to obtain recognition result;And, to described voice The content of signal is verified, to obtain the result;
Acquiring unit, for according to described recognition result and described the result, obtaining the authentication result of described user.
7. device according to claim 6 is it is characterised in that described device also includes:
Signal generating unit, before exporting the first information, dynamically generates the described first information.
8. device according to claim 6 is it is characterised in that described acquiring unit, specifically for:
If described recognition result is to specify user for described user, and described the result is that the content of described voice signal is passed through Checking, the authentication result obtaining described user is by checking.
9. the device according to claim 6 or 8 is it is characterised in that described device also includes:
Processing unit, for when the authentication result of described user is by checking, executing assigned operation.
10. device according to claim 7 it is characterised in that
Described receiving unit, is additionally operable to receive the second information of described user input;
Described authentication unit, is additionally operable to judge whether described second information and default specify information match;
Described signal generating unit, if be additionally operable to described second information matching with default specify information, execution is dynamic to generate described the The step of one information.
CN201610898257.2A 2016-10-14 2016-10-14 Identity verification method and device Pending CN106357411A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610898257.2A CN106357411A (en) 2016-10-14 2016-10-14 Identity verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610898257.2A CN106357411A (en) 2016-10-14 2016-10-14 Identity verification method and device

Publications (1)

Publication Number Publication Date
CN106357411A true CN106357411A (en) 2017-01-25

Family

ID=57866596

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610898257.2A Pending CN106357411A (en) 2016-10-14 2016-10-14 Identity verification method and device

Country Status (1)

Country Link
CN (1) CN106357411A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107454057A (en) * 2017-06-28 2017-12-08 深圳市佰仟金融服务有限公司 Information processing method and device
CN107993662A (en) * 2017-12-20 2018-05-04 广州势必可赢网络科技有限公司 A kind of method for identifying ID and device applied to phone customer service
CN108932415A (en) * 2018-04-19 2018-12-04 深圳桑菲消费通信有限公司 A kind of the authority acquiring method, apparatus and earphone of terminal device
CN110111796A (en) * 2019-06-24 2019-08-09 秒针信息技术有限公司 Identify the method and device of identity
WO2020024415A1 (en) * 2018-08-03 2020-02-06 平安科技(深圳)有限公司 Voiceprint recognition processing method and apparatus, electronic device and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222703A (en) * 2007-01-12 2008-07-16 杭州波导软件有限公司 Identity verification method for mobile terminal based on voice identification
CN102543084A (en) * 2010-12-29 2012-07-04 盛乐信息技术(上海)有限公司 Online voiceprint recognition system and implementation method thereof
CN102916815A (en) * 2012-11-07 2013-02-06 华为终端有限公司 Method and device for checking identity of user
CN103220286A (en) * 2013-04-10 2013-07-24 郑方 Identity verification system and identity verification method based on dynamic password voice
CN103325037A (en) * 2013-06-06 2013-09-25 上海讯联数据服务有限公司 Mobile payment safety verification method based on voice recognition
CN104331652A (en) * 2014-10-08 2015-02-04 无锡指网生物识别科技有限公司 Dynamic cipher generation method for electronic equipment for fingerprint and voice recognition
CN104392353A (en) * 2014-10-08 2015-03-04 无锡指网生物识别科技有限公司 Payment method and system of voice recognition terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101222703A (en) * 2007-01-12 2008-07-16 杭州波导软件有限公司 Identity verification method for mobile terminal based on voice identification
CN102543084A (en) * 2010-12-29 2012-07-04 盛乐信息技术(上海)有限公司 Online voiceprint recognition system and implementation method thereof
CN102916815A (en) * 2012-11-07 2013-02-06 华为终端有限公司 Method and device for checking identity of user
CN103220286A (en) * 2013-04-10 2013-07-24 郑方 Identity verification system and identity verification method based on dynamic password voice
CN103325037A (en) * 2013-06-06 2013-09-25 上海讯联数据服务有限公司 Mobile payment safety verification method based on voice recognition
CN104331652A (en) * 2014-10-08 2015-02-04 无锡指网生物识别科技有限公司 Dynamic cipher generation method for electronic equipment for fingerprint and voice recognition
CN104392353A (en) * 2014-10-08 2015-03-04 无锡指网生物识别科技有限公司 Payment method and system of voice recognition terminal

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107454057A (en) * 2017-06-28 2017-12-08 深圳市佰仟金融服务有限公司 Information processing method and device
CN107993662A (en) * 2017-12-20 2018-05-04 广州势必可赢网络科技有限公司 A kind of method for identifying ID and device applied to phone customer service
CN108932415A (en) * 2018-04-19 2018-12-04 深圳桑菲消费通信有限公司 A kind of the authority acquiring method, apparatus and earphone of terminal device
WO2020024415A1 (en) * 2018-08-03 2020-02-06 平安科技(深圳)有限公司 Voiceprint recognition processing method and apparatus, electronic device and storage medium
CN110111796A (en) * 2019-06-24 2019-08-09 秒针信息技术有限公司 Identify the method and device of identity

Similar Documents

Publication Publication Date Title
CN106357411A (en) Identity verification method and device
US9484037B2 (en) Device, system, and method of liveness detection utilizing voice biometrics
CN104598796B (en) Personal identification method and system
US9430627B2 (en) Method and system for enforced biometric authentication
CN105404809B (en) A kind of identity identifying method and user terminal
TW201907330A (en) Method, device, device and data processing method for identity authentication
CN108429619A (en) Identity identifying method and system
CN102413100A (en) Voice-print authentication system having voice-print password picture prompting function and realization method thereof
US20160148012A1 (en) System, method and apparatus for voice biometric and interactive authentication
CN101441869A (en) Method and terminal for speech recognition of terminal user identification
JP2006164237A (en) User authentication by combination of speaker reference and reverse turing test
US7310432B2 (en) Ported system for personal identity verification
CN103366745A (en) Method for protecting terminal equipment based on speech recognition and terminal equipment
CN107563283A (en) Method, apparatus, equipment and the storage medium of generation attack sample
CN103678977A (en) Method and electronic device for protecting information security
CN102413101A (en) Voice-print authentication system having voice-print password voice prompting function and realization method thereof
CN109887187A (en) A kind of pickup processing method, device, equipment and storage medium
CN107800672A (en) A kind of Information Authentication method, electronic equipment, server and information authentication system
WO2019210796A1 (en) Speech recognition method and apparatus, storage medium, and electronic device
CN106330915A (en) Voice verification processing method and device
EP3642776A1 (en) Facial biometrics card emulation for in-store payment authorization
CN107886320A (en) It is a kind of to handle the method, equipment and computer-readable storage medium for tying up card
WO2021244471A1 (en) Real-name authentication method and device
CN1655501A (en) Identification apparatus and method employing biological statistic data
CN105897429A (en) Authentication method, authentication device and terminal

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170125

RJ01 Rejection of invention patent application after publication