CN106504745A - A kind of speech verification code system and its implementation method - Google Patents
A kind of speech verification code system and its implementation method Download PDFInfo
- Publication number
- CN106504745A CN106504745A CN201610994294.3A CN201610994294A CN106504745A CN 106504745 A CN106504745 A CN 106504745A CN 201610994294 A CN201610994294 A CN 201610994294A CN 106504745 A CN106504745 A CN 106504745A
- Authority
- CN
- China
- Prior art keywords
- identifying code
- speech
- code
- user
- server end
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 50
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000004891 communication Methods 0.000 claims description 12
- 230000008569 process Effects 0.000 claims description 10
- 238000013459 approach Methods 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims description 5
- 230000008901 benefit Effects 0.000 abstract description 3
- 230000000694 effects Effects 0.000 abstract description 3
- 239000013589 supplement Substances 0.000 abstract description 2
- 230000015572 biosynthetic process Effects 0.000 description 11
- 238000005516 engineering process Methods 0.000 description 11
- 238000003786 synthesis reaction Methods 0.000 description 11
- 238000013518 transcription Methods 0.000 description 6
- 230000035897 transcription Effects 0.000 description 6
- 238000012360 testing method Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 238000006243 chemical reaction Methods 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 210000004704 glottis Anatomy 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 210000000214 mouth Anatomy 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 239000002023 wood Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L13/00—Speech synthesis; Text to speech systems
- G10L13/08—Text analysis or generation of parameters for speech synthesis out of text, e.g. grapheme to phoneme translation, prosody generation or stress or intonation determination
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/22—Interactive procedures; Man-machine interfaces
- G10L17/24—Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computational Linguistics (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention provides a kind of speech verification code system and its implementation method, in the form of speech identifying code carries out authentication verification.The apparent concrete business tine that reminds operated by user of speech identifying code energy, good supplement has been carried out to the verification mode of short message verification code, in addition the authentication mode of short message verification code+speech identifying code makes authentication procedures safer, light, efficient, so as to reach the optimized effect of Consumer's Experience.Speech identifying code mainly has the advantage that:(1)Safety:It is avoided that note is intercepted and captured and caused safety problem by Malware using speech identifying code;(2)High efficiency:It is sent to rate height and is difficult to be intercepted by mobile phone;(3)Alternative:When short message verification code can not be sent in time, user can pass through the faster finishing service of speech identifying code.
Description
Technical field
The present invention relates to communication technical field, more particularly, to a kind of speech verification code system and its implementation method.
Background technology
Overwhelming majority catenet platform, bank and Third-party payment platform, have all extensively applied short-message verification at present
Code verification mode, and be applied to user's registration, password give for change, log in protection, authentication, random cipher, without card prop up
Pay, the application scenarios such as trade confirmation.Short message verification code facilitates easy-to-use, broad covered area because of which, has become instantly topmost testing
Card means.Short message verification code as a most important safety verification link during network payment, substituted bank's Herba Carlinae biebersteinii into
For last safety verification means.
But note is used as a kind of build-in attribute of communication mode, determines that its class of safety protection is not high, be vulnerable to wood
Horse interception, phishing, telecommunication fraud, channel eavesdropping etc. are attacked.The short message verification code of current main flow is extensively received because of its safety problem
Denounce, under the overall situation that the new hoaxes such as current mobile phone wooden horse row, phishing, telephone fraud emerge in an endless stream, note is tested
Card code shows in plain text because of which, it is easy to be stolen, it is impossible to meet the scene higher to security requirement.
Content of the invention
The present invention is for overcoming at least one defect described in above-mentioned prior art, there is provided a kind of speech verification code system and its
Implementation method, generates random speech identifying code by speech synthesis technique, and by voice call by its incoming call subscriber phone is
User provides a kind of safer, more efficient verification mode.
For solving above-mentioned technical problem, technical scheme is as follows:
A kind of speech verification code system, the system include that server end and client, the server end are used for identifying code
Generate, send, and can receive and verified after the identifying code of client, server end includes:
(1)Identifying code generation module:Identifying code generation module can respond the request from client, generate identifying code;
(2)Identifying code encrypting module:Identifying code encrypting module be used for identifying code that identifying code generation module is generated carry out plus
Close process;Identifying code is mainly used in safety verification, is to ensure that identifying code is not stolen in transmitting procedure, and system design is special
Identifying code encrypting module.
(3)Identifying code sending module:Identifying code sending module is used for according to the difference of client request approach by difference
Mode respond user, identifying code is sent to subscription client, and is shown by subscription client;
(4)Cloud database:Cloud database includes system settings data storehouse, User Information Database, user's voice print database;
System database is stored in high in the clouds, it is ensured that the safety of data, it is to avoid the risk that data are replaced and distort.
(5)Intelligent sound cloud:Intelligent sound cloud is the intellectual analysis system for intelligent sound field provided by third party
System, its provide interface capability and call for other systems;
The client includes:
(a)Identifying code request module:Identifying code request module can initiate speech identifying code request to server end;
(b)Identifying code receiver module:Identifying code receiver module is used for the speech identifying code sent by the reception server end;In client
Hold to server end and initiate after identifying code request, server end can generate speech identifying code audio files simultaneously according to current setting
Send back client;
(c)Identifying code deciphering module:Identifying code deciphering module is used for being decrypted the speech identifying code for receiving.Based on safety
Consideration, the speech identifying code generated by the system are through encryption, test for making which regenerate the discernible voice of user
Card code sound-content, needs to be decrypted, and identifying code deciphering module can complete this task.
In a kind of preferred scheme, the intelligent sound cloud includes that speech transcription cloud, phonetic synthesis cloud, speech transcription are used
In by speech transcription be word, phonetic synthesis cloud be used for voice is synthesized.Functions independently or with collaboration can be carried out
Language data process, forms analysis result.
In a kind of preferred scheme, the approach for initiating identifying code request in client is included but is not limited to
In the following manner:The Internet, communication network.
A kind of implementation method of speech verification code system, the method comprising the steps of:
S1:User initiates checking request
User can initiate the request of speech verification by client to server end, and user can initiate checking by various ways please
Ask, including by webpage, voice call etc., server end is received to give after the checking that user sends enters to ask and responded;
S2:Server end generates speech identifying code
After checking request is received, server end will carry out the generation of speech identifying code;
S3:Speech identifying code sends
The speech identifying code of generation is sent to user side by communication network, user is listened to by way of voice call, with
When, also support the transmission that speech identifying code is carried out by immediate communication tool, mail;
S4:Fill in identifying code
After user has listened to speech identifying code, heard speech verification digital content is submitted to server end, user is in front end page
The speech verification digital content that hears is input in face, and server end is committed to by client verified;
S5:Server end is verified
The checking digital content that user is submitted to by server end generates information with identifying code and compares, and sends and verify into if identical
Work(is pointed out, and if failure sends checking request again, repeats whole flow process.
In a kind of preferred scheme, in step S2, the concrete generating mode of speech identifying code is as follows:
Consider that consumers' acceptable degree, system support 4 or 6 identifying codes, when each user sends access request, system is random
English alphabet sum combinatorics on words is chosen, system supports two ways in the generation of identifying code, is voice joint and language respectively
Sound synthesizes.
Compared with prior art, the beneficial effect of technical solution of the present invention is:Of the invention then be directed to existing short message verification code
Various problems, there is provided a kind of speech verification code system, carry out authentication verification in the form of speech identifying code.Speech verification
The apparent concrete business tine that reminds operated by user of code energy, has carried out good benefit to the verification mode of short message verification code
Fill, the authentication mode of short message verification code+speech identifying code makes authentication procedures safer, light, efficient in addition, so as to reach
Arrive the optimized effect of Consumer's Experience.Speech identifying code mainly has the advantage that:(1)Safety:Can be kept away using speech identifying code
Exempt from note to be intercepted and captured and caused safety problem by Malware;(2)High efficiency:It is sent to rate height and is difficult to be intercepted by mobile phone;(3)Can
Selectivity:When short message verification code can not be sent in time, user can pass through the faster finishing service of speech identifying code.
Description of the drawings
Fig. 1 is the schematic diagram of speech verification code system of the present invention.
Implementation method flow charts of the Fig. 2 for sound verification code system.
Specific embodiment
With reference to the accompanying drawings and examples technical scheme is described further.
Embodiment 1
As shown in figure 1, a kind of speech verification code system, the system includes that server end and client, the server end are used
Generation, transmission in identifying code, and can receive and verified after the identifying code of client, server end includes:
(1)Identifying code generation module:Identifying code generation module can respond the request from client, generate identifying code;
(2)Identifying code encrypting module:Identifying code encrypting module be used for identifying code that identifying code generation module is generated carry out plus
Close process;Identifying code is mainly used in safety verification, is to ensure that identifying code is not stolen in transmitting procedure, and system design is special
Identifying code encrypting module.
(3)Identifying code sending module:Identifying code sending module is used for according to the difference of client request approach by difference
Mode respond user, identifying code is sent to subscription client, and is shown by subscription client;
(4)Cloud database:Cloud database includes system settings data storehouse, User Information Database, user's voice print database;
System database is stored in high in the clouds, it is ensured that the safety of data, it is to avoid the risk that data are replaced and distort.
(5)Intelligent sound cloud:Intelligent sound cloud is the intellectual analysis system for intelligent sound field provided by third party
System, its provide interface capability and call for other systems;
The client includes:
(a)Identifying code request module:Identifying code request module can initiate speech identifying code request to server end;
(b)Identifying code receiver module:Identifying code receiver module is used for the speech identifying code sent by the reception server end;In client
Hold to server end and initiate after identifying code request, server end can generate speech identifying code audio files simultaneously according to current setting
Send back client;
(c)Identifying code deciphering module:Identifying code deciphering module is used for being decrypted the speech identifying code for receiving.Based on safety
Consideration, the speech identifying code generated by the system are through encryption, test for making which regenerate the discernible voice of user
Card code sound-content, needs to be decrypted, and identifying code deciphering module can complete this task.
In specific implementation process, the intelligent sound cloud includes that speech transcription cloud, phonetic synthesis cloud, speech transcription are used for
By speech transcription be word, phonetic synthesis cloud be used for voice is synthesized.Functions independently or with collaboration can carry out language
Sound data processing, forms analysis result.
In specific implementation process, client initiate the approach of identifying code request including but not limited to
Under type:The Internet, communication network.
As shown in Fig. 2 a kind of implementation method of speech verification code system, the method comprising the steps of:
S1:User initiates checking request
User can initiate the request of speech verification by client to server end, and user can initiate checking by various ways please
Ask, including by webpage, voice call etc., server end is received to give after the checking that user sends enters to ask and responded;
S2:Server end generates speech identifying code
After checking request is received, server end will carry out the generation of speech identifying code, and concrete generating mode is as follows:
Consider that consumers' acceptable degree, system support 4 or 6 identifying codes, when each user sends access request, system is random
English alphabet sum combinatorics on words is chosen, system supports two ways in the generation of identifying code, is voice joint and language respectively
Sound synthesizes.
(1)Platform includes the recorded message for recording the English alphabet and numeral for completing of multiple versions, using general
Audio files joining method audio files can be combined, by each independent letter, digital sound files random combine
Into audio files to be verified;
(2)Speech synthesis technique is a kind of by the technology that text conversion is voice output, and English alphabet and numeral are converted to language
Sound can adopt kinds of words to realize to speech synthesis technique.Such as:Word based on pure software implementation is to phonetic synthesis
Technology, the word based on speech chip are to speech synthesis technique.By independent letter, digital audio random combine into audio files
Technology also ripe.The sound element can be recorded based on true man, it is also possible to the skill that text conversion is voice output
Art is produced.
S3:Speech identifying code sends
The speech identifying code of generation is sent to user side by communication network, user is listened to by way of voice call, with
When, also support the transmission that speech identifying code is carried out by immediate communication tool, mail;
S4:Fill in identifying code
After user has listened to speech identifying code, heard speech verification digital content is submitted to server end, user is in front end page
The speech verification digital content that hears is input in face, and server end is committed to by client verified;
S5:Server end is verified
The checking digital content that user is submitted to by server end generates information with identifying code and compares, and sends and verify into if identical
Work(is pointed out, and if failure sends checking request again, repeats whole flow process.
Technology used in the present invention includes:
(1)Speech synthesis technique
Also known as literary periodicals(Text to Speech)Technology, it are related to acoustics, linguisticss, Digital Signal Processing, computer section
Etc. multiple subject technologies.The subject matter that speech synthesis technique is solved is that Word message is converted into acoustic information, that is, allow machine
Device is lifted up one's voice as people.
(2)Speech recognition technology
Problem to be solved is the voice for allowing computer " can understand " mankind, and the Word message included in voice " is extracted "
Out.The technology plays key player in the intelligent computer systems of " can be a visitor at a meeting ", equivalent to pacifying to computer system
Load onto " ear " so as to possess the function of " can listen ", and then realize the information age utilizing " voice " that this is most natural, most easily
Means carry out man-machine communication and interaction.
(3)Sound groove recognition technology in e
It is a kind of correlated characteristic for being extracted by voice signal and representing speaker's identity(Such as reflect that the fundamental frequency of glottis folding frequency is special
Levy, reflect spectrum signature of oral cavity size shape and sound channel length etc.), and then identify the technology of the aspects such as speaker's identity.
It can be widely applied to the fields such as information security, telephone bank, intelligent entrance guard and amusement increment.
Speech identifying code is that identifying code is directly exhaled user mobile phone by voice call, so as to realize that call voice is reported
A kind of new verification mode of identifying code.The apparent concrete business tine that reminds operated by user of speech identifying code energy is right
The verification mode of short message verification code has carried out good supplement, and the authentication mode of short message certification code+voice authentication code tests user
Card process is safer, light, efficient, so as to reach the optimized effect of Consumer's Experience.
Claims (4)
1. a kind of speech verification code system, it is characterised in that the system includes server end and client, the server end
For the generation of identifying code, transmission, and can receive and verified after the identifying code of client, server end includes:
(1)Identifying code generation module:Identifying code generation module can respond the request from client, generate identifying code;
(2)Identifying code encrypting module:Identifying code encrypting module be used for identifying code that identifying code generation module is generated carry out plus
Close process;
(3)Identifying code sending module:Identifying code sending module is used for passing through different sides according to the difference of client request approach
Formula responds user, identifying code is sent to subscription client, and is shown by subscription client;
(4)Cloud database:Cloud database includes system settings data storehouse, User Information Database, user's voice print database;
(5)Intelligent sound cloud:Intelligent sound cloud is the intelligent analysis system for intelligent sound field provided by third party, its
There is provided interface capability to call for other systems;
The client includes:
(a)Identifying code request module:Identifying code request module can initiate speech identifying code request to server end;
(b)Identifying code receiver module:Identifying code receiver module is used for the speech identifying code sent by the reception server end;
(c)Identifying code deciphering module:Identifying code deciphering module is used for being decrypted the speech identifying code for receiving.
2. speech verification code system according to claim 1, it is characterised in that initiate checking in client
The approach of code request includes but is not limited in the following manner:The Internet, communication network.
3. the implementation method of speech verification code system described in a kind of claim 1, it is characterised in that methods described includes following step
Suddenly:
S1:User initiates checking request
User can initiate the request of speech verification by client to server end, and server end receives the checking that user sends and enters
Give after asking and respond;
S2:Server end generates speech identifying code
After checking request is received, server end will carry out the generation of speech identifying code;
S3:Speech identifying code sends
The speech identifying code of generation is sent to user side by communication network, user is listened to by way of voice call, with
When, also support the transmission that speech identifying code is carried out by immediate communication tool, mail;
S4:Fill in identifying code
After user has listened to speech identifying code, heard speech verification digital content is submitted to server end, user is in front end page
The speech verification digital content that hears is input in face, and server end is committed to by client verified;
S5:Server end is verified
The checking digital content that user is submitted to by server end generates information with identifying code and compares, and sends and verify into if identical
Work(is pointed out, and if failure sends checking request again, repeats whole flow process.
4. the implementation method of speech verification code system according to claim 3, it is characterised in that characterized in that, step
In S2, the concrete generating mode of speech identifying code is as follows:
Consider that consumers' acceptable degree, system support 4 or 6 identifying codes, when each user sends access request, system is random
English alphabet sum combinatorics on words is chosen, system supports two ways in the generation of identifying code, is voice joint and language respectively
Sound synthesizes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610994294.3A CN106504745A (en) | 2016-11-11 | 2016-11-11 | A kind of speech verification code system and its implementation method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610994294.3A CN106504745A (en) | 2016-11-11 | 2016-11-11 | A kind of speech verification code system and its implementation method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106504745A true CN106504745A (en) | 2017-03-15 |
Family
ID=58324298
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610994294.3A Pending CN106504745A (en) | 2016-11-11 | 2016-11-11 | A kind of speech verification code system and its implementation method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106504745A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107302545A (en) * | 2017-08-16 | 2017-10-27 | 广东海翔教育科技有限公司 | A kind of voice communication management method |
CN107342087A (en) * | 2017-06-19 | 2017-11-10 | 广州市讯飞樽鸿信息技术有限公司 | A kind of speech verification method and system |
CN108053206A (en) * | 2017-12-29 | 2018-05-18 | 泰康保险集团股份有限公司 | A kind of switching method and device for testing card mode |
CN108806700A (en) * | 2018-06-08 | 2018-11-13 | 英业达科技有限公司 | The system and method for status is judged by vocal print and speech cipher |
CN111010675A (en) * | 2019-10-16 | 2020-04-14 | 平安科技(深圳)有限公司 | Information verification method and device, computer equipment and storage medium |
CN111131125A (en) * | 2018-10-31 | 2020-05-08 | 薛康泰华 | Dynamic verification method and software based on voice |
CN112788372A (en) * | 2021-01-28 | 2021-05-11 | 青岛海信传媒网络技术有限公司 | Media asset platform registration method, display device and server |
CN112954693A (en) * | 2021-02-10 | 2021-06-11 | 中国工商银行股份有限公司 | Identity authentication method, identity authentication server and terminal |
CN113422781A (en) * | 2021-07-03 | 2021-09-21 | 深圳市泰壹格物信息技术有限公司 | Voice verification code sending system based on 5G message service |
CN114915439A (en) * | 2021-10-27 | 2022-08-16 | 杭州拼便宜网络科技有限公司 | E-commerce platform identity verification method and device, electronic equipment and storage medium |
CN118016049A (en) * | 2022-11-10 | 2024-05-10 | 唯思电子商务(深圳)有限公司 | Closed loop OTP verification system based on voice verification code |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060277043A1 (en) * | 2005-06-06 | 2006-12-07 | Edward Tomes | Voice authentication system and methods therefor |
CN1905445A (en) * | 2005-07-27 | 2007-01-31 | 国际商业机器公司 | System and method of speech identification using mobile speech identification card |
CN102255913A (en) * | 2011-07-14 | 2011-11-23 | 北京百度网讯科技有限公司 | Verification-security-level-based audio verification code provision method and equipment |
CN105095727A (en) * | 2015-05-25 | 2015-11-25 | 深圳新创客电子科技有限公司 | Device administrator permission application method, server and system |
CN105471920A (en) * | 2016-01-15 | 2016-04-06 | 天脉聚源(北京)科技有限公司 | Identifying code processing method and device |
CN105577648A (en) * | 2015-12-11 | 2016-05-11 | 北京奇虎科技有限公司 | Method for obtaining and sending short message identifying code, calculating device and mobile terminal |
CN105578439A (en) * | 2016-01-23 | 2016-05-11 | 广州市讯飞樽鸿信息技术有限公司 | Incoming call transfer intelligent answering method and system for call transfer platform |
-
2016
- 2016-11-11 CN CN201610994294.3A patent/CN106504745A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060277043A1 (en) * | 2005-06-06 | 2006-12-07 | Edward Tomes | Voice authentication system and methods therefor |
CN1905445A (en) * | 2005-07-27 | 2007-01-31 | 国际商业机器公司 | System and method of speech identification using mobile speech identification card |
CN102255913A (en) * | 2011-07-14 | 2011-11-23 | 北京百度网讯科技有限公司 | Verification-security-level-based audio verification code provision method and equipment |
CN105095727A (en) * | 2015-05-25 | 2015-11-25 | 深圳新创客电子科技有限公司 | Device administrator permission application method, server and system |
CN105577648A (en) * | 2015-12-11 | 2016-05-11 | 北京奇虎科技有限公司 | Method for obtaining and sending short message identifying code, calculating device and mobile terminal |
CN105471920A (en) * | 2016-01-15 | 2016-04-06 | 天脉聚源(北京)科技有限公司 | Identifying code processing method and device |
CN105578439A (en) * | 2016-01-23 | 2016-05-11 | 广州市讯飞樽鸿信息技术有限公司 | Incoming call transfer intelligent answering method and system for call transfer platform |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107342087A (en) * | 2017-06-19 | 2017-11-10 | 广州市讯飞樽鸿信息技术有限公司 | A kind of speech verification method and system |
CN107302545A (en) * | 2017-08-16 | 2017-10-27 | 广东海翔教育科技有限公司 | A kind of voice communication management method |
CN108053206A (en) * | 2017-12-29 | 2018-05-18 | 泰康保险集团股份有限公司 | A kind of switching method and device for testing card mode |
CN108806700A (en) * | 2018-06-08 | 2018-11-13 | 英业达科技有限公司 | The system and method for status is judged by vocal print and speech cipher |
CN111131125A (en) * | 2018-10-31 | 2020-05-08 | 薛康泰华 | Dynamic verification method and software based on voice |
CN111010675A (en) * | 2019-10-16 | 2020-04-14 | 平安科技(深圳)有限公司 | Information verification method and device, computer equipment and storage medium |
CN112788372A (en) * | 2021-01-28 | 2021-05-11 | 青岛海信传媒网络技术有限公司 | Media asset platform registration method, display device and server |
CN112954693A (en) * | 2021-02-10 | 2021-06-11 | 中国工商银行股份有限公司 | Identity authentication method, identity authentication server and terminal |
CN112954693B (en) * | 2021-02-10 | 2023-02-24 | 中国工商银行股份有限公司 | Identity authentication method, identity authentication server and terminal |
CN113422781A (en) * | 2021-07-03 | 2021-09-21 | 深圳市泰壹格物信息技术有限公司 | Voice verification code sending system based on 5G message service |
CN114915439A (en) * | 2021-10-27 | 2022-08-16 | 杭州拼便宜网络科技有限公司 | E-commerce platform identity verification method and device, electronic equipment and storage medium |
CN118016049A (en) * | 2022-11-10 | 2024-05-10 | 唯思电子商务(深圳)有限公司 | Closed loop OTP verification system based on voice verification code |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106504745A (en) | A kind of speech verification code system and its implementation method | |
US10764043B2 (en) | Identity and content authentication for phone calls | |
ES2749436T3 (en) | Procedure and system for transaction security | |
US9767807B2 (en) | Digital voice signature of transactions | |
US11063933B2 (en) | User authentication | |
US20130262873A1 (en) | Method and system for authenticating remote users | |
AU2015201690C1 (en) | User authentication | |
CN106789855A (en) | The method and device of user login validation | |
US11683303B2 (en) | Establishing a trusted session with a smart speaker | |
CN110380856A (en) | Terminal device and its voice information processing method, device and storage medium | |
CN104901808A (en) | Voiceprint authentication system and method based on time type dynamic password | |
CN102752117A (en) | Dynamic password generating device and method and transaction system with dynamic password generating device | |
WO2015033061A1 (en) | Method for authenticating a transaction | |
CN105553983A (en) | Webpage data protection method | |
JP2002269047A (en) | Sound user authentication system | |
WO2016144806A2 (en) | Digital voice signature of transactions | |
Hou et al. | TAES: Two-factor authentication with end-to-end security against VoIP phishing | |
CN104301105A (en) | Digital certificate signing method based on mobile device with communication function, and equipment for realizing the same | |
US11562746B2 (en) | System and methods for speaker identification, message compression and/or message replay in a communications environment | |
CN103428162A (en) | Voice dynamic password | |
CN112954693B (en) | Identity authentication method, identity authentication server and terminal | |
CN204465555U (en) | Based on the voiceprint authentication apparatus of time type dynamic password | |
CN105827617A (en) | Identity authentication-based fragment asynchronous conference text message sending and receiving method | |
CN102611813A (en) | Telephone online bank device, telephone online bank system and telephone online trading method | |
Shang et al. | Audio recordings dataset of genuine and replayed speech at both ends of a telecommunication channel |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170315 |
|
RJ01 | Rejection of invention patent application after publication |