CN107862192B - Login interface unlocking method and device, computer equipment and storage medium - Google Patents

Login interface unlocking method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN107862192B
CN107862192B CN201711063092.8A CN201711063092A CN107862192B CN 107862192 B CN107862192 B CN 107862192B CN 201711063092 A CN201711063092 A CN 201711063092A CN 107862192 B CN107862192 B CN 107862192B
Authority
CN
China
Prior art keywords
user name
information
user
login interface
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711063092.8A
Other languages
Chinese (zh)
Other versions
CN107862192A (en
Inventor
胡玮
范安心
肖正强
骆水明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201711063092.8A priority Critical patent/CN107862192B/en
Priority to PCT/CN2017/113232 priority patent/WO2019085105A1/en
Publication of CN107862192A publication Critical patent/CN107862192A/en
Application granted granted Critical
Publication of CN107862192B publication Critical patent/CN107862192B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Abstract

The embodiment of the application discloses a login interface unlocking method and device, computer equipment and a storage medium. Wherein the method comprises the following steps: displaying a login interface, wherein the login interface comprises a recording control and a user name bar; acquiring a user name input by a user in the user name bar; if the operation of triggering the recording control is monitored, recording sound information; sending the user name and the voice information to a voiceprint authentication system, wherein the voiceprint authentication system is used for searching corresponding pre-stored voice information according to the user name and carrying out voiceprint authentication on the voice information according to the pre-stored voice information; and if the authentication success information sent by the voiceprint authentication system is received, unlocking the login interface according to the authentication success information to display the terminal desktop corresponding to the user name. The method can improve the safety of the information in the terminal.

Description

Login interface unlocking method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of information security technologies, and in particular, to a login interface unlocking method and apparatus, a computer device, and a storage medium.
Background
At present, a login interface appears after a computer is started or a user locks a screen. The login interface typically displays some authentication information, such as a user name and password, graphical image authentication information, etc., based on the user's settings. If the user wants to display the desktop on the computer, the user needs to input a correct user name and a correct password or select a preset image on the graphic image, and the computer can jump from the display login interface state to the display desktop state. However, in these existing methods, the authentication process is easily stolen by others and makes others easily pass the authentication, or is easily hacked, which poses a threat to the information security of the user.
Disclosure of Invention
The application provides a login interface unlocking method and device, computer equipment and a storage medium, which can improve the safety of information in a terminal.
In a first aspect, the present application provides a login interface unlocking method, which includes:
displaying a login interface, wherein the login interface comprises a recording control and a user name bar;
acquiring a user name input by a user in the user name bar;
if the operation of triggering the recording control is monitored, recording sound information;
sending the user name and the voice information to a voiceprint authentication system, wherein the voiceprint authentication system is used for searching corresponding pre-stored voice information according to the user name and carrying out voiceprint authentication on the voice information according to the pre-stored voice information; and
and if the authentication success information sent by the voiceprint authentication system is received, unlocking the login interface according to the authentication success information to display the terminal desktop corresponding to the user name.
In a second aspect, the present application provides a login interface unlocking device, which includes:
the interface display unit is used for displaying a login interface, wherein the login interface comprises a recording control and a user name bar;
the user name acquisition unit is used for acquiring a user name input by a user in the user name bar;
the sound recording unit is used for recording sound information if the operation of triggering the recording control is monitored;
the information sending unit is used for sending the user name and the voice information to a voiceprint authentication system, wherein the voiceprint authentication system is used for searching corresponding pre-stored voice information according to the user name and carrying out voiceprint authentication on the voice information according to the pre-stored voice information;
and the unlocking unit is used for unlocking the login interface according to the authentication success information to display the terminal desktop corresponding to the user name if the authentication success information sent by the voiceprint authentication system is received.
In a third aspect, the present application further provides a computer device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the login interface unlocking method according to any one of the methods provided in the present application when executing the program.
In a fourth aspect, the present application further provides a storage medium, wherein the storage medium stores a computer program, the computer program includes program instructions, and the program instructions, when executed by a processor, cause the processor to execute any one of the login interface unlocking methods provided in the present application.
The application provides a login interface unlocking method and device, computer equipment and a storage medium. The login interface unlocking method comprises the steps of obtaining a user name selected by a user through a user name column in a login interface, recording sound information of the user when the operation of triggering a recording control in the login interface is monitored, and sending the user name and the sound information to a voiceprint authentication system for voiceprint authentication; if the successful authentication information sent by the voiceprint authentication system is received, the current user is a legal user, the terminal unlocks the login interface to display the terminal desktop corresponding to the user name, and the method can improve the safety of the information in the terminal.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a login interface unlocking method according to an embodiment of the present application;
fig. 2 is a schematic interaction diagram of a terminal and a voiceprint authentication server in an embodiment of the present application;
fig. 3 is another schematic flowchart of a login interface unlocking method according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a page structure of a voiceprint acquisition module in an embodiment of the present application;
fig. 5 is another schematic flowchart of a login interface unlocking method according to an embodiment of the present application;
fig. 6 is a schematic block diagram of a login interface unlocking device according to an embodiment of the present application;
fig. 7 is another schematic block diagram of a login interface unlocking device according to an embodiment of the present application;
fig. 8 is a schematic block diagram of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1, fig. 1 is a schematic flowchart of a login interface unlocking method according to an embodiment of the present application. The method is applied to terminals such as desktop computers, portable computers and tablet computers. The terminal has an operating system installed therein, such as a Windows operating system. When the login interface unlocking method provided by the application is applied to the terminal, the terminal needs to rewrite and call a bottom interface of an operating system so as to provide possibility for realizing the login interface unlocking method. For example, in a terminal in which a Windows operating system is installed, it is necessary to call and rewrite a Class factory.h component, a credit.h component, a credit provider filter.h component, a dll.h component, a tileulogon.h component, and the like.
As shown in fig. 1, the method includes steps S101 to S105.
S101, displaying a login interface, wherein the login interface comprises a recording control and a user name bar.
After the terminal is powered on, the terminal can display a login interface. Or, the user locks the screen during the terminal using process, so that the terminal is switched to the login interface from the terminal desktop. And a user name bar and a recording control are arranged in the login interface. Of course, the login interface may also include other content. For example, a password input field for inputting password information and the like may be further included.
And S102, acquiring the user name input by the user in the user name column.
After the terminal displays the login interface, the user can input the user name in the user name column. Generally, a terminal stores at least one user name.
In an embodiment, a pull-up button or a pull-down button may be disposed on one side of the user name bar, and when receiving an operation of clicking the pull-up button or the pull-down button by a user, the terminal displays at least one user name in a list form for the user to select. The user clicks on which username in the list, and the terminal will use that username as the username entered by the user in the username field.
In another embodiment, at least one username may be listed in a preset order in the username field for selection by the user. Which user name the user clicks, the terminal takes this user name as the user name entered by the user in the user name column.
It is understood that the manner of obtaining the user name through the user name column is not limited to the above-mentioned pull-up button or pull-down button, preset sequence listing, etc., but may also be other manners, for example, the user may manually input the user name in the user name column, etc., and is not limited in particular.
And S103, if the operation of triggering the recording control is monitored, recording sound information.
After the terminal acquires the user name, the terminal monitors whether the operation of triggering the recording control occurs. In one embodiment, the monitoring whether the operation of triggering the recording control occurs comprises the following steps: and monitoring whether the operation of clicking the recording control occurs. That is to say, the user can click the recording control in the login interface to trigger the voiceprint acquisition module in the terminal to be in a working state.
Of course, the manner of monitoring whether the operation of triggering the recording control occurs is not limited to the above manner, and other manners may also be used, for example, the manner of triggering the recording control is to click a space button. At this time, if the terminal monitors that the user clicks a space key, the terminal can also acquire the operation of triggering the recording control, and execute corresponding steps, wherein the specific mode of triggering the recording control is not limited.
After the terminal monitors the operation of triggering the recording control, the terminal can call the voiceprint acquisition module in the terminal, so that the voiceprint acquisition module is in a recording working state. The terminal acquires the voice information of the user through the voiceprint acquisition module.
Specifically, in an embodiment, entering the user' S voice information may include steps S1031 to S1032.
S1031, displaying text information;
after the voiceprint acquisition module is called, the terminal needs to display text information for the user to read. In one embodiment, the text message may be a numeric message, such as an 8-digit number. The text message may also be a text message, such as 48 Chinese characters. The text information may also be in a form of a combination of digital information and text information, and the like, and the specific content of the text information is not limited herein.
In addition, the specific content of the text message may be random content, such as random 8-digit numbers. The specific content of the text message may also be designated content, for example, the text message is designated "56284691", that is, each time the terminal displays the text message, the 8-bit designated content of "56284691" is displayed. Of course, the specific content of the text message is the designated content, and the content of the text message may also be the same as the content of the text message when the pre-stored voice message is pre-recorded.
It should be noted that, in other embodiments, step S1031 may not be displayed after the operation of triggering the sound recording control is monitored. For example, when the login interface is displayed, a recording control, a user name bar, and text information are displayed in the login interface. For another example, the terminal displays text information while monitoring whether an operation of triggering the recording control occurs, and the like. The step of displaying the text information may be adjusted according to actual requirements, and is not limited herein.
S1032, inputting the sound information when the user reads the text information.
When the user reads the content in the text information, the terminal can acquire the voice information of the user through the voiceprint acquisition module.
In an embodiment, when the voice information of the user is input, the recording state can be displayed so as to inform the user whether the voice information is input at the current terminal, and the user can conveniently adjust the size of the emitted voice. The recording status may be presented in the form of a progress bar. For example, the text message is an 8-digit number, the voice message of the user can be monitored through the voiceprint collection module, and the reading progress is displayed according to the monitored voice message of the user, for example, if the voiceprint collection module monitors that the user has read the 2 nd digit, the progress bar goes to twenty-five percent. Of course, the recording status may also be presented in other forms, and is not limited herein.
The sequence of step S102 and step S103 is not limited to the one shown in fig. 1, and step S102 may be performed after step S103. That is, after the login interface is displayed in step S101, if the operation of triggering the recording control is monitored, the voice information of the user is entered, and then the user name selected by the user in the user name bar is acquired. In the actual use process, the obtaining sequence of the voice information and the user name may be set, or the obtaining sequence of the voice information and the user name may not be set.
And S104, sending the user name and the voice information to a voiceprint authentication system, wherein the voiceprint authentication system is used for searching corresponding pre-stored voice information according to the user name and carrying out voiceprint authentication on the voice information according to the pre-stored voice information.
In this embodiment, the voiceprint authentication system may be installed in a voiceprint authentication server. After the terminal is powered on or the terminal is locked, namely the terminal displays a login interface, the terminal can communicate with the voiceprint authentication server, and then the terminal can perform data interaction with the voiceprint authentication system.
In one embodiment, the terminal may communicate wirelessly with the voiceprint authentication system over a wireless network.
As shown in fig. 2, fig. 2 is a schematic diagram of interaction between a terminal and a voiceprint authentication server in an embodiment of the present application. After the terminal acquires the user name and the sound information, the user name and the sound information are sent to the voiceprint authentication server so that the voiceprint authentication system can receive the user name and the sound information.
In an embodiment, in order to ensure the security of data, the terminal sends the user name and the sound information to the voiceprint authentication system, which specifically includes: encrypting the user name and the sound information to generate encrypted sound data; and sending the encrypted voice data to the voiceprint authentication system.
The voiceprint authentication system is pre-stored with pre-stored voice information of a user, and the pre-stored voice information and a user name of the user have an association relationship. The voiceprint authentication system can search whether pre-stored sound information corresponding to the user name exists or not according to the received user name; if the pre-stored sound information corresponding to the user name exists in the voiceprint authentication system, the voiceprint authentication system acquires the pre-stored sound information corresponding to the user name.
And the voiceprint authentication system carries out voiceprint authentication on the received voice information according to the pre-stored voice information. Specifically, in an embodiment, the voiceprint authentication system performs voiceprint authentication on the received voice message according to the pre-stored voice message, including: the voiceprint authentication system acquires the sound characteristics corresponding to the sound information and the sound characteristics of the pre-stored sound information; judging whether the sound characteristics of the sound information are matched with the sound characteristics of the pre-stored sound information or not; if the sound characteristics of the sound information are matched with the sound characteristics of the pre-stored sound information, which indicates that the current user is a legal user, the voiceprint authentication system determines that the received sound information is authenticated, and simultaneously sends authentication success information to the terminal, as shown in fig. 2.
In the embodiment, the pre-stored sound information is stored in the voiceprint authentication system, the voiceprint authentication system performs voiceprint authentication on the sound information, and only the user name is stored in the terminal, so that even if an illegal user acquires the user name, the illegal user cannot acquire the pre-stored sound information from the terminal, and cannot successfully log in the terminal, thereby effectively preventing the terminal from being easily invaded, and improving the security of data information in the terminal.
It should be noted that the way of the voiceprint authentication system performing voiceprint authentication on the received voice information according to the pre-stored voice information is not limited to the above-mentioned way, and may also be other ways capable of authenticating the voice information, and is not limited specifically herein.
And S105, if the authentication success information sent by the voiceprint authentication system is received, unlocking the login interface according to the authentication success information to display the terminal desktop corresponding to the user name.
When the terminal receives the successful authentication information sent by the voiceprint authentication system, the current user is a legal user, the terminal unlocks the login interface, terminal desktop data corresponding to the user name is called from the memory, the corresponding terminal desktop is displayed according to the terminal desktop data, and the user can normally use the terminal.
According to the method and the device, the user name selected by the user is obtained through the user name column in the login interface, then when the operation of triggering the recording control in the login interface is monitored, the sound information of the user is input, and the user name and the sound information are sent to the voiceprint authentication system for voiceprint authentication; if the successful authentication information sent by the voiceprint authentication system is received, the current user is a legal user, the terminal unlocks the login interface to display the terminal desktop corresponding to the user name, and the method can improve the safety of the information in the terminal.
Referring to fig. 3, fig. 3 is another schematic flowchart of a login interface unlocking method according to an embodiment of the present application. The method is applied to terminals such as desktop computers, portable computers and tablet computers. As shown in fig. 3, the method includes steps S201 to S212.
S201, acquiring a user name of a current system of the terminal.
The user name of the current system may be a user name set by the user, or a user name configured by the terminal for the user, which is not limited specifically herein.
In this embodiment, the terminal is installed with a voiceprint acquisition module, which can acquire the voice information of the user.
In an embodiment, as shown in fig. 4, fig. 4 is a schematic page structure diagram of a voiceprint acquisition module in an embodiment of the present application. The voiceprint acquisition module can develop a winform program by adopting C # language. When the user starts the voiceprint authentication function of the terminal, the terminal reads the user name of the current system, and then displays the voiceprint acquisition page shown in fig. 4, so that the user can perform corresponding actions according to the content of the voiceprint acquisition page.
S202, inputting the pre-stored sound information of the user into the current system.
In an embodiment, after the terminal displays the voiceprint collection page shown in fig. 4, the user may click the "collection" button, so that the voiceprint collection module starts to collect the sound information of the user reading the text information "5678904", and the sound information is used as the pre-stored sound information corresponding to the user name of the current system.
In an embodiment, as shown in fig. 5, fig. 5 is another schematic flow chart of a login interface unlocking method in an embodiment of the present application. When the terminal inputs the pre-stored sound information of the user in the current system, the time information corresponding to the input pre-stored sound information needs to be acquired, and then the time information is used as a time stamp and is added to the user name of the current system. At this time, the user name of the current system carries time information, so that the user name of the current system has uniqueness.
For example, the system names of the user a and the user B are both "administrator", but the time information corresponding to the pre-stored voice information is recorded by the user a and is 20170101121201, wherein the 20170101121201 represents 12 o' clock and 1 second at 1 month and 1 day in 2017; and the time information corresponding to the pre-stored voice information which is recorded by the user B is 20170101121130, and the 20170101121130 represents 11 minutes and 30 seconds at 12 o' clock 1/2017. Therefore, after the terminal adds the time information as the time stamp to the user name of the current system, the user name of the current system of the terminal of the user A is 'administrator 20170101121201', and the user name of the current system of the terminal of the user B is 'administrator 20170101121130', so that the problem that the user names are not unique due to the fact that the user A and the user B are named the same for the systems is avoided.
In an embodiment, in order to facilitate the user to memorize the user name and improve the security of the terminal, in the subsequent use process of the terminal, if the user name needs to be displayed, the terminal can still display the user name named by the user or the user name configured by the terminal for the user, and at this time, the user name named by the user or the user name configured by the terminal for the user can be equivalent to the label of the user name. For example, when the terminal displays the login interface, the user name tag "administrator" may be displayed in the user name column in the login interface, and the terminal finds the corresponding user name "administrator 20170101121201" according to the user name tag "administrator".
In addition, it should be noted that the time information may be a start time when the user starts to enter the pre-stored sound information, may also be an end time when the pre-stored sound information is entered, or may be time information at a certain time in the process of entering the pre-stored sound information, and is not limited specifically herein. The specific content of the time information can also be designed according to actual requirements, for example, the time information can be one or a combination of a plurality of time units such as year, month, day, hour, minute, second, and the like.
Meanwhile, the manner of adding the time information as the timestamp to the user name of the current system is not limited to the manner in the above example, and may be other manners. For example, time information is added in front of the user name, such as "20170101121201 administrator", or the time information is cross-arranged with the user name, such as "2017 manage 0101 manage 1212 member 01", etc., without being limited in any way.
And S203, associating the user name of the current system with pre-stored sound information and then sending the user name to the voiceprint authentication system.
After the terminal acquires the pre-stored sound information of the user through the voiceprint acquisition module, the user name of the current system is associated with the pre-stored sound information.
Specifically, in an embodiment, associating the user name of the current system with the pre-stored sound information may specifically be: and writing the pre-stored sound information into a sound file, and setting the file name of the sound file as the user name of the current system so as to establish the association relationship between the user name of the current system and the pre-stored sound information.
It is to be understood that the way of associating the user name of the current system with the pre-stored sound information is not limited to the above-mentioned way, and may be other ways, and is not limited in particular.
And after the terminal establishes the association relationship between the user name of the current system and the pre-stored sound information, the user name of the current system and the pre-stored sound information are sent to the voiceprint authentication system. Specifically, the sound file is sent to the voiceprint authentication system so that the voiceprint authentication system saves the sound file.
In an embodiment, when the step S202 adds time information corresponding to the input pre-stored sound information as a timestamp to the user name of the current system, the user name of the current system mentioned in the step S203 is the user name to which the time information has been added.
After the terminal sends the user name of the current system and the pre-stored sound information to the voiceprint authentication system, the terminal can encrypt the user name of the current system and store the user name in the terminal so as to prevent an illegal user from maliciously tampering the user name.
And S204, displaying a login interface, wherein the login interface comprises a recording control and a user name bar.
After the terminal is powered on, the terminal can display a login interface. Or, the user locks the screen during the terminal using process, so that the terminal is switched to the login interface from the terminal desktop.
In this embodiment, a user name bar and a recording control are provided in the login interface. Of course, in other embodiments, the login interface may also include other content, which is not specifically limited herein.
And S205, acquiring the user name input by the user in the user name column.
After the terminal displays the login interface, the user can input the user name in the user name column. Generally, a terminal stores at least one user name.
In an embodiment, a pull-up button or a pull-down button may be disposed on one side of the user name column, and when the terminal receives an operation of clicking the pull-up button or the pull-down button by a user, at least one user name is displayed in a list form for the user to select.
In another embodiment, at least one username may be listed in a preset order in the username field for selection by the user.
It is to be understood that the manner of obtaining the user name through the user name column is not limited to the above manner, for example, obtaining the user name manually input by the user in the user name column, and is not limited in particular.
In addition, in an embodiment, when a user name tag is displayed in a user name column of a terminal, acquiring a user name input by a user in the user name column specifically includes: acquiring a user name label input by a user in the user name bar; and searching a corresponding user name according to the user name label. For example, the username tag is "administrator". The terminal finds out the corresponding user name as "administrator 20170101121201" according to the user name label "administrator", and takes the "administrator 20170101121201" as the user name input by the user in the user name column.
And S206, if the operation of triggering the recording control is monitored, recording sound information.
After the terminal acquires the user name, the terminal monitors whether the operation of triggering the recording control occurs. If the terminal monitors the operation of triggering the recording control, the terminal calls the voiceprint acquisition module so that the voiceprint acquisition module is in a working state. The terminal acquires the voice information of the user through the voiceprint acquisition module.
S207, judging whether the sound information is recorded or not; if the voice information is recorded, executing step S208; if the recording of the sound information is not completed, the process returns to the step S207.
In one embodiment, when the voice information of the user is input, whether the input of the voice information is finished or not is judged through a voice recognition technology. For example, when a user is required to enter 8 digits, the terminal recognizes the digits in the currently acquired sound information through a voice recognition technology, and then judges whether the number of the recognized digits reaches 8. If the terminal determines that the number of the digits in the currently acquired sound information is less than 8, which indicates that the user has not finished recording, the terminal returns to step S207, i.e., continues to determine whether recording of the sound information is finished. If the terminal determines that the number of digits in the currently acquired sound information has reached 8, which indicates that the user has finished recording, the terminal will execute step S208.
Of course, in other embodiments, the terminal may also adopt other methods to determine whether to complete recording the voice information. For example, the terminal monitors whether new voice information is input within a second preset time. The second preset time is a time period formed by prolonging a preset time length by taking the newly acquired sound information as a starting point. For example, the user needs to read out 8 random numbers one by one, the second preset time is 2 seconds, and then after the terminal monitors that the user reads out a certain number, the time of the obtained number is taken as the starting point to be prolonged by 2 seconds, and whether new sound information is recorded in the 2 seconds is judged.
If new voice information is recorded within the second preset time, which indicates that the current user has not read the numbers and the like, that is, the recording of the voice information is not completed, the terminal returns to execute step S207, that is, whether the recording of the voice information is completed is continuously determined. If no new sound information is recorded within the second preset time, it indicates that the current user has read the number, i.e. it is determined that the recording of the sound information is completed, at this time, the terminal will execute step S208.
And S208, sending the user name and the voice information to a voiceprint authentication system, wherein the voiceprint authentication system is used for searching corresponding pre-stored voice information according to the user name and carrying out voiceprint authentication on the voice information according to the pre-stored voice information.
In this embodiment, after the terminal acquires the user name and the sound information, the user name and the sound information are sent to the voiceprint authentication system. Wherein the voiceprint authentication system can be installed in a voiceprint authentication server. After the terminal displays the login interface, the terminal can perform data interaction with the voiceprint authentication system.
The voiceprint authentication system searches whether pre-stored sound information corresponding to the user name exists or not according to the received user name; if the pre-stored sound information corresponding to the user name exists in the voiceprint authentication system, the voiceprint authentication system acquires the pre-stored sound information corresponding to the user name.
Specifically, for example, the voiceprint authentication system searches whether a corresponding voice file exists according to the received user name. And if the corresponding sound file exists, reading the pre-stored sound information in the sound file.
And the voiceprint authentication system carries out voiceprint authentication on the received voice information according to the pre-stored voice information. Specifically, in an embodiment, the voiceprint authentication system performs voiceprint authentication on the received voice message according to the pre-stored voice message, including: the voiceprint authentication system acquires the sound characteristics corresponding to the sound information and the sound characteristics of the pre-stored sound information; and judging whether the sound characteristics of the sound information are matched with the sound characteristics of the pre-stored sound information.
If the sound characteristics of the sound information are matched with the sound characteristics of the pre-stored sound information, the current user is a legal user, the voiceprint authentication system judges that the received sound information is authenticated, and meanwhile, the voiceprint authentication system sends authentication success information to the terminal.
If the sound characteristics of the sound information are not matched with the sound characteristics of the pre-stored sound information, the current user is possibly an illegal user, the voiceprint authentication system judges that the received sound information is failed to be authenticated, and meanwhile authentication failure information is sent to the terminal.
In the embodiment, the pre-stored sound information is stored in the voiceprint authentication system, the voiceprint authentication system performs voiceprint authentication on the sound information, and only the user name is stored in the terminal, so that even if an illegal user acquires the user name, the illegal user cannot acquire the pre-stored sound information from the terminal, and cannot successfully log in the computer, the terminal is effectively prevented from being easily invaded, and the safety of data information in the terminal is improved.
It should be noted that the way of the voiceprint authentication system performing voiceprint authentication on the received voice information according to the pre-stored voice information is not limited to the above-mentioned way, and may also be other ways capable of authenticating the voice information, and is not limited specifically herein.
S209, if the authentication success information sent by the voiceprint authentication system is received, unlocking the login interface according to the authentication success information to display the terminal desktop corresponding to the user name.
When the terminal receives the successful authentication information sent by the voiceprint authentication system, the current user is a legal user, the terminal unlocks the login interface, terminal desktop data corresponding to the user name is called from the memory, the corresponding terminal desktop is displayed according to the terminal desktop data, and the user can normally use the terminal.
S210, if authentication failure information sent by the voiceprint authentication system is received, judging whether the number of times of the received authentication failure information in a first preset time period exceeds a preset number of times; if the number of times of the authentication failure information received within the first preset time period does not exceed the preset number of times, executing step S211; if the number of times of the authentication failure information received within the first preset time period exceeds the preset number of times, step S212 is executed.
When the terminal receives authentication failure information sent by the voiceprint authentication system, the terminal indicates that the current user is possibly an illegal user, and at the moment, the terminal judges whether the times of the authentication failure information received in the first preset time period exceed the preset times.
In an embodiment, the first preset time period may be a time period formed by delaying a certain time from a time corresponding to the first time of sending the user name and the voice information to the voiceprint authentication system. For example, the first preset time period is a time period formed by delaying for 1 hour from the time when the user name and the voice information are first transmitted to the voiceprint authentication system.
If the number of times of the authentication failure information received in the first preset time period does not exceed the preset number of times, it indicates that the user has an opportunity to perform re-authentication, and step S211 may be executed. If the number of times of the authentication failure information received in the first preset time period exceeds the preset number of times, it indicates that the current user may be an illegal user, and tries to log in the terminal maliciously through multiple tests, at this time, the terminal will execute step S212.
S211, prompting the user to re-input the sound information, and returning to execute the step S205;
in an embodiment, the terminal may pop up a prompt dialog box to prompt the user that the authentication fails, and may perform an operation of re-entering the voice information. Then, the terminal needs to return to execute step S205, that is, obtain the user name input by the user in the user name column.
Of course, in other embodiments, after prompting the user to re-enter the voice information, the terminal may also return to perform step S206. That is, at this time, the user does not need to input the user name again, and only needs to re-input the voice information. It will be appreciated that the user may also reselect the user name at this time in order to improve the user experience.
S212, locking the user name.
When the terminal judges that the number of times of receiving the authentication failure information in the first preset time period exceeds the preset number of times, the terminal locks the user name in order to ensure the safety of the information in the terminal, namely, the user can not select the locked user name to carry out identity verification at the moment.
According to the login interface unlocking method in the embodiment of the application, the user name and the pre-stored sound information are associated and then sent to the voiceprint authentication system, and the user name and the pre-stored sound information are stored by the voiceprint authentication system. When a user needs to log in a terminal and a terminal interface is displayed, the terminal needs to acquire a user name selected by the user and input sound information, and the user name and the sound information are sent to a voiceprint authentication system for voiceprint authentication. If the authentication success information sent by the voiceprint authentication system is received, the current user is a legal user, and the terminal unlocks a login interface to display a terminal desktop; if authentication failure information sent by a voiceprint authentication system is received, locking a user name is executed under the condition that the terminal judges that the times of receiving the authentication failure information in a first preset time period exceed the preset times, so that an illegal user is prevented from maliciously logging in the terminal through multiple tests, and the safety of data information in the terminal is further ensured. Meanwhile, the method adopts a voiceprint authentication mode to carry out identity authentication, compared with the existing identity authentication modes such as passwords and the like, the voiceprint characteristics of the user are more difficult to steal or imitate, and the safety of information in the terminal is further improved.
The embodiment of the application also provides a login interface unlocking device, and the login interface unlocking device is used for executing any one login interface unlocking method. Specifically, please refer to fig. 6, where fig. 6 is a schematic block diagram of a login interface unlocking device according to an embodiment of the present application. The login interface unlocking device 300 may be installed in a desktop computer, a tablet computer, a laptop computer, or other terminals.
As shown in fig. 6, the login interface unlocking apparatus 300 includes an interface display unit 301, a user name acquisition unit 302, a sound entry unit 303, an information transmission unit 304, and an unlocking unit 305.
(1) An interface display unit 301;
the interface display unit 301 is configured to display a login interface, where the login interface includes a recording control and a user name bar.
After the terminal is powered on, the interface display unit 301 displays a login interface. Alternatively, when the user locks the screen during the use of the terminal, the interface display unit 301 switches from the terminal desktop to the login interface to display the login interface.
In one embodiment, a user name bar and a recording control are arranged in the login interface. Of course, the login interface may also include other content. For example, a password input field for inputting password information and the like may be further included in the login interface.
(2) A user name acquisition unit 302;
a user name obtaining unit 302, configured to obtain a user name input by the user in the user name bar.
After the interface display unit 301 displays the login interface, the user name obtaining unit 302 may obtain the user name input by the user through the user name bar.
In an embodiment, when a pull-up button or a pull-down button is disposed on one side of the user name bar, after the user clicks the pull-up button or the pull-down button, the user name obtaining unit 302 displays at least one user name in a form of a list, and obtains the user name clicked by the user in the list as the user name input by the user in the user name bar.
In another embodiment, when the user name column lists at least one user name in a preset order, the user name obtaining unit 302 may obtain the user name clicked by the user in the user name column.
It is understood that the manner in which the user name obtaining unit 302 obtains the user name through the user name column is not limited to the above-mentioned manner, and may also be other manners, such as obtaining the user name manually input by the user in the user name column by the user name obtaining unit 302, and the like, and is not limited in particular.
(3) A sound recording unit 303;
and the sound recording unit 303 is configured to record sound information if the operation of triggering the recording control is monitored.
After the user name obtaining unit 302 obtains the user name, the sound recording unit 303 monitors whether an operation of triggering a recording control occurs.
In an embodiment, the sound recording unit 303 is specifically configured to monitor whether an operation of clicking the recording control occurs. Of course, the method for the sound recording unit 303 to monitor whether the operation of triggering the recording control occurs is not limited to the above method, and other methods may also be used, for example, when the method of triggering the recording control is preset to click a space button. At this time, the sound entry unit 303 monitors whether the space key is clicked.
After the sound recording unit 303 monitors the operation of triggering the recording control, the sound recording unit 303 may call the voiceprint acquisition module to acquire the sound information of the user through the voiceprint acquisition module.
Specifically, in an embodiment, the sound entry unit 303 is specifically configured to display text information and enter sound information when the user reads the text information.
After the voiceprint collection module is called, the sound entry unit 303 needs to display text information for the user to read. The text information may be digital information, text information, a combination of digital information and text information, and the like, and the specific content of the text information is not limited herein.
The specific content of the text information may be random content or may be specified content. When the text information is the designated content, for example, the text information is the designated "56284691", that is, the 8-bit designated content of "56284691" is displayed each time the sound entry unit 303 displays the text information. Of course, when the text information is the designated content, the content of the text information may be the same as the content of the text information when the pre-stored sound information is previously entered.
It should be noted that, in other embodiments, the sound entry unit 303 may also display the text information while monitoring whether the operation of triggering the recording control occurs. Or the sound entry unit 303 may not display the text information, and the interface display unit 301 may display the text information when displaying the login interface, which is not limited in this respect.
After displaying the text information, the sound input unit 303 may input the sound information when the user reads the text information by using the voiceprint acquisition module.
In an embodiment, when the sound input unit 303 inputs the sound information of the user, the recording status may be displayed to inform the user whether the sound information is currently input by the terminal, so that the user can adjust the size of the emitted sound conveniently. The recording status may be presented in the form of a progress bar, and is not limited herein.
(4) An information transmitting unit 304;
an information sending unit 304, configured to send the user name and the voice information to a voiceprint authentication system, where the voiceprint authentication system is configured to search for corresponding pre-stored voice information according to the user name and perform voiceprint authentication on the voice information according to the pre-stored voice information.
After the sound recording unit 303 acquires the sound information, the information transmission unit 304 transmits the user name and the sound information to the voiceprint authentication system.
In an embodiment, the information sending unit 304 is specifically configured to perform encryption processing on the user name and the voice information to generate encrypted voice data; and sending the encrypted voice data to the voiceprint authentication system. This ensures the security of the data.
In this embodiment, the voiceprint authentication system may be installed in a voiceprint authentication server. After the interface display unit 301 displays the login interface, the terminal may communicate with the voiceprint authentication server, so that the login interface unlocking device 300 may perform data interaction with the voiceprint authentication system.
The voiceprint authentication system is pre-stored with pre-stored voice information of a user, and the pre-stored voice information and a user name of the user have an association relationship. The voiceprint authentication system can search whether pre-stored sound information corresponding to the user name exists or not according to the received user name; if the pre-stored sound information corresponding to the user name exists in the voiceprint authentication system, the voiceprint authentication system acquires the pre-stored sound information corresponding to the user name.
And the voiceprint authentication system carries out voiceprint authentication on the received voice information according to the pre-stored voice information. In an embodiment, the voiceprint authentication system is specifically configured to obtain a voice feature corresponding to the voice information and a voice feature of pre-stored voice information; judging whether the sound characteristics of the sound information are matched with the sound characteristics of the pre-stored sound information or not; if the sound characteristics of the sound information are matched with the sound characteristics of the pre-stored sound information, which indicates that the current user is a legal user, the voiceprint authentication system determines that the received sound information is authenticated, and simultaneously sends authentication success information to the login interface unlocking device 300.
In the embodiment, the pre-stored sound information is stored in the voiceprint authentication system, the voiceprint authentication system performs voiceprint authentication on the sound information, and only the user name is stored in the terminal, so that even if an illegal user acquires the user name, the illegal user cannot acquire the pre-stored sound information from the terminal, and cannot successfully log in the terminal, thereby effectively preventing the terminal from being easily invaded, and improving the security of data information in the terminal.
(5) An unlocking unit 305.
An unlocking unit 305, configured to unlock the login interface according to the authentication success information to display a terminal desktop corresponding to the user name if the authentication success information sent by the voiceprint authentication system is received.
When the unlocking unit 305 receives the successful authentication information sent by the voiceprint authentication system, which indicates that the current user is a valid user, the unlocking unit 305 unlocks the login interface, retrieves the terminal desktop data corresponding to the user name from the memory, displays the corresponding terminal desktop according to the terminal desktop data, and the user can normally use the terminal at this time.
In the embodiment of the application, the interface display unit 301 displays a login interface, the user name acquisition unit 302 acquires a user name selected by a user through a user name bar in the login interface, then when the operation of triggering a recording control in the login interface is monitored, the sound input unit 303 inputs sound information of the user, and the information sending unit 304 sends the user name and the sound information to a voiceprint authentication system for voiceprint authentication; if the unlocking unit 305 receives the successful authentication information sent by the voiceprint authentication system, which indicates that the current user is a valid user, the terminal unlocks the login interface to display the terminal desktop corresponding to the user name, and the login interface unlocking device 300 can improve the security of the information in the terminal.
The embodiment of the application also provides a login interface unlocking device, and the login interface unlocking device is used for executing any one login interface unlocking method. Specifically, please refer to fig. 7, and fig. 7 is another schematic block diagram of a login interface unlocking device according to an embodiment of the present application. The login interface unlocking device 400 may be installed in a desktop computer, a tablet computer, a laptop computer, or other terminals.
As shown in fig. 7, the login interface unlocking apparatus 400 includes an acquisition unit 401, an entry unit 402, a transmission unit 403, an interface display unit 404, a user name acquisition unit 405, a sound entry unit 406, a first determination unit 407, an information transmission unit 408, an unlocking unit 409, a second determination unit 410, a presentation unit 411, and a locking unit 412.
(1) An acquisition unit 401;
an obtaining unit 401, configured to obtain a user name of a current system of the terminal.
The user name of the current system may be a user name set by the user, or a user name configured by the terminal for the user, which is not limited specifically herein. When the user starts the voiceprint authentication function of the terminal, the obtaining unit 401 reads the user name of the current system.
(2) An entry unit 402;
an entry unit 402, configured to enter pre-stored sound information of a user in the current system.
In this embodiment, the terminal is installed with a voiceprint acquisition module, which can acquire the voice information of the user. The voiceprint acquisition module can develop a winform program by adopting C # language.
When the user starts the voiceprint authentication function of the terminal, the entry unit 402 calls the voiceprint acquisition module and displays the voiceprint acquisition page shown in fig. 4. After the user clicks the "collect" button, the entry unit 402 may collect, through the voiceprint collection module, the sound information of the user reading the text information "5678904", and use the sound information as the pre-stored sound information corresponding to the user name of the current system.
In an embodiment, when the pre-stored voice information of the user is entered into the current system, the entry unit 402 further needs to obtain time information corresponding to the entered pre-stored voice information, and then adds the time information as a timestamp to the user name of the current system. At this time, the user name of the current system carries time information, so that the user name of the current system has uniqueness.
In addition, it should be noted that the time information may be a start time when the user starts to enter the pre-stored sound information, may also be an end time when the pre-stored sound information is entered, or may be time information at a certain time in the process of entering the pre-stored sound information, and is not limited specifically herein. The specific content of the time information can also be designed according to actual requirements, for example, the time information can be one or a combination of a plurality of time units such as year, month, day, hour, minute, second, and the like.
Meanwhile, the way in which the entry unit 402 adds the time information as the timestamp to the user name of the current system is not limited to the above example, and may be other ways. For example, the entry unit 402 adds time information in front of the user name, such as "20170101121201 administrator", or cross-arranges the time information with the user name, such as "2017 administrator 0101 administrator 1212 administrator 01", and so on, without being limited in detail herein.
(3) A transmitting unit 403;
a sending unit 403, configured to send the voiceprint authentication system after associating the user name of the current system with pre-stored sound information.
After the entry unit 402 obtains the pre-stored voice information of the user through the voiceprint acquisition module, the sending unit 403 associates the user name of the current system with the pre-stored voice information.
Specifically, in an embodiment, the sending unit 403 is specifically configured to write the pre-stored sound information into a sound file, and set a file name of the sound file as the user name of the current system to establish an association relationship between the user name of the current system and the pre-stored sound information.
It is understood that the way that the sending unit 403 associates the user name of the current system with the pre-stored sound information is not limited to the above way, and may also be other ways, and is not limited specifically herein.
After the sending unit 403 establishes the association relationship between the user name of the current system and the pre-stored voice information, the user name of the current system and the pre-stored voice information are sent to the voiceprint authentication system. Specifically, the transmission unit 403 transmits the sound file to the voiceprint authentication system so that the voiceprint authentication system saves the sound file.
After the sending unit 403 sends the user name of the current system and the pre-stored sound information to the voiceprint authentication system, the sending unit 403 may encrypt the user name of the current system and store the encrypted user name in the terminal, so as to prevent an illegal user from maliciously tampering the user name.
(4) An interface display unit 404;
an interface display unit 404, configured to display a login interface, where the login interface includes a recording control and a user name bar.
After the terminal is powered on, the interface display unit 404 displays a login interface. Alternatively, when the user locks the screen during the use of the terminal, the interface display unit 404 switches from the terminal desktop to the login interface to display the login interface.
In this embodiment, a user name bar and a recording control are provided in the login interface. Of course, in other embodiments, the specific content included in the login interface is not limited to the above content, and is not limited specifically herein.
(5) A user name acquisition unit 405;
a user name obtaining unit 405, configured to obtain a user name input by the user in the user name column.
After the interface display unit 404 displays the login interface, the user name acquisition unit 405 may acquire the user name input by the user through the user name field.
In an embodiment, when a pull-up button or a pull-down button is disposed on one side of the user name bar, after the user clicks the pull-up button or the pull-down button, the user name obtaining unit 405 displays at least one user name in a form of a list, and obtains the user name clicked by the user in the list as the user name input by the user in the user name bar.
In another embodiment, when the user name column lists at least one user name in a preset order, the user name obtaining unit 405 may obtain the user name clicked by the user in the user name column.
It is understood that the manner in which the user name obtaining unit 405 obtains the user name through the user name column is not limited to the above-mentioned manner, and may also be other manners, such as, for example, the user name obtaining unit 405 obtains the user name manually input by the user in the user name column, and the like, and is not limited in particular herein.
In addition, in an embodiment, when a user name tag is displayed in a user name column of the terminal, the user name obtaining unit 405 is specifically configured to obtain the user name tag input by the user in the user name column; and searching a corresponding user name according to the user name label.
(6) A sound entry unit 406;
and the sound recording unit 406 is used for recording sound information if the operation of triggering the recording control is monitored.
After the user name obtaining unit 405 obtains the user name, the sound recording unit 406 monitors whether an operation of triggering a recording control occurs. If the operation of triggering the recording control is monitored, the voice recording unit 406 calls the voiceprint acquisition module so that the voiceprint acquisition module is in a working state. The voice recording unit 406 acquires voice information of the user through the voiceprint acquisition module.
(7) A first judgment unit 407;
a first judging unit 407, configured to judge whether the recording of the sound information is completed.
In an embodiment, the first determining unit 407 specifically determines whether the recording of the voice information is completed by using a voice recognition technology. For example, when a user is required to enter 8 digits, the first determination unit 407 identifies digits in the currently acquired sound information by using a voice recognition technique, and then determines whether the number of the identified digits reaches 8. If the first judging unit 407 judges that the number of digits in the currently acquired sound information is less than 8, which indicates that the user has not finished recording, at this time, the first judging unit 407 judges that the recording of the sound information has not been finished; if the first determining unit 407 determines that the number of digits in the currently acquired sound information reaches 8, which indicates that the user has finished recording, the first determining unit 407 determines that recording of the sound information is finished.
Of course, in other embodiments, the first judging unit 407 may also judge whether the recording of the sound information is completed in other manners. For example, the first determining unit 407 monitors whether a new voice message is recorded within a second predetermined time. The second preset time is a time period formed by prolonging a preset time length by taking the newly acquired sound information as a starting point. If new voice information is recorded within a second preset time, which indicates that the current user has not read the numbers and the like, the first judgment unit 407 judges that the recording of the voice information is not finished; if no new sound information is recorded within the second preset time, which indicates that the current user has read the number, the first determining unit 407 determines that the recording of the sound information is completed.
When the first judging unit 407 judges that the recording of the sound information is completed, the first judging unit 407 transmits a first signal to the information transmitting unit 408 so that the information transmitting unit 408 performs a corresponding operation according to the first signal. When the first judging unit 407 judges that the recording of the sound information is not completed, the first judging unit 407 judges again whether the recording of the sound information is completed.
(8) An information transmitting unit 408;
an information sending unit 408, configured to send the user name and the voice information to a voiceprint authentication system, where the voiceprint authentication system is configured to search for corresponding pre-stored voice information according to the user name and perform voiceprint authentication on the voice information according to the pre-stored voice information.
After the information transmission unit 408 receives the first signal, the information transmission unit 408 transmits the user name and the sound information to the voiceprint authentication system. Wherein the voiceprint authentication system can be installed in a voiceprint authentication server. After the interface display unit 404 displays the login interface, the login interface unlocking apparatus 400 may perform data interaction with the voiceprint authentication system.
The voiceprint authentication system is used for searching whether pre-stored sound information corresponding to the user name exists or not according to the received user name; if the pre-stored sound information corresponding to the user name exists in the voiceprint authentication system, the voiceprint authentication system acquires the pre-stored sound information corresponding to the user name.
Specifically, for example, the voiceprint authentication system is used for searching whether a corresponding sound file exists according to the received user name. And if the corresponding sound file exists, reading the pre-stored sound information in the sound file. And the voiceprint authentication system carries out voiceprint authentication on the received voice information according to the pre-stored voice information. Specifically, in an embodiment, the voiceprint authentication system obtains a voice feature corresponding to the voice information and a voice feature of pre-stored voice information; and judging whether the sound characteristics of the sound information are matched with the sound characteristics of the pre-stored sound information.
If the sound characteristics of the sound information are matched with the sound characteristics of the pre-stored sound information, the current user is a legal user, the voiceprint authentication system judges that the received sound information is authenticated, and meanwhile, the voiceprint authentication system sends authentication success information to the login interface unlocking device 400.
If the sound characteristics of the sound information are not matched with the sound characteristics of the pre-stored sound information, which indicates that the current user is possibly an illegal user, the voiceprint authentication system judges that the received sound information is failed to be authenticated, and simultaneously sends authentication failure information to the login interface unlocking device 400.
In the embodiment, the pre-stored sound information is stored in the voiceprint authentication system, the voiceprint authentication system performs voiceprint authentication on the sound information, and only the user name is stored in the terminal, so that even if an illegal user acquires the user name, the illegal user cannot acquire the pre-stored sound information from the terminal, and cannot successfully log in the computer, the terminal is effectively prevented from being easily invaded, and the safety of data information in the terminal is improved.
(9) An unlocking unit 409;
and the unlocking unit 409 is used for unlocking the login interface according to the authentication success information to display the terminal desktop corresponding to the user name if the authentication success information sent by the voiceprint authentication system is received.
When the unlocking unit 409 receives the successful authentication information sent by the voiceprint authentication system, it indicates that the current user is a valid user, at this time, the unlocking unit 409 unlocks the login interface, retrieves the terminal desktop data corresponding to the user name from the memory, displays the corresponding terminal desktop according to the terminal desktop data, and at this time, the user can normally use the terminal.
(10) A second judgment unit 410;
a second determining unit 410, configured to determine whether the number of times of the authentication failure information received in the first preset time period exceeds a preset number of times if the authentication failure information sent by the voiceprint authentication system is received.
When the second determining unit 410 receives the authentication failure information sent by the voiceprint authentication system, which indicates that the current user may be an unauthorized user, the second determining unit 410 determines whether the number of times of receiving the authentication failure information in the first preset time period exceeds a preset number of times.
In an embodiment, the first preset time period may be a time period formed by delaying a certain time from a time corresponding to the first time of sending the user name and the voice information to the voiceprint authentication system.
If the number of times of receiving the authentication failure information in the first preset time period does not exceed the preset number of times, the second determining unit 410 sends a second signal to the prompting unit 411, so that the prompting unit 411 executes a corresponding operation according to the second signal. If the number of times of the authentication failure information received in the first preset time period exceeds the preset number of times, it indicates that the current user may be an illegal user, and tries to log in the terminal maliciously through multiple tests, at this time, the second determining unit 410 sends a third signal to the locking unit 412, so that the locking unit 412 executes a corresponding operation according to the third signal.
(11) A presentation unit 411;
the prompting unit 411 is configured to prompt the user to re-enter the sound information, and send a control signal to the user name obtaining unit 405, so that the user name obtaining unit 405 obtains the user name input by the user in the user name bar again.
In an embodiment, after receiving the second signal, the prompting unit 411 displays a prompt dialog box according to the second signal to prompt the user that the authentication fails and the operation of re-entering the voice message can be performed. Meanwhile, the prompting unit 411 sends a control signal to the user name obtaining unit 405, so that the user name obtaining unit 405 obtains the user name selected by the user in the user name field again according to the control signal.
Of course, in other embodiments, the prompting unit 411 may also send a control signal to the sound entry unit 406, so that the sound entry unit 406 re-enters the sound information of the user according to the control signal. That is, at this time, the user does not need to reselect the user name, and only needs to re-enter the voice information.
(12) And a locking unit 412.
A locking unit 412, configured to lock the user name.
After the locking unit 412 receives the third signal sent by the second determining unit 410, the user name is locked according to the third signal, that is, the user cannot select the locked user name for authentication at this time, so as to ensure the security of the information in the terminal.
In this embodiment, the sending unit 403 sends the user name and the pre-stored voice information to the voiceprint authentication system after associating the user name and the pre-stored voice information, and the voiceprint authentication system stores the user name and the pre-stored voice information. When a user needs to log in a terminal and display a terminal interface, the user name obtaining unit 405 needs to obtain a user name selected by the user, the voice recording unit 406 records voice information, and the information sending unit 408 sends the user name and the voice information to a voiceprint authentication system for voiceprint authentication. The unlocking unit 409 unlocks the login interface to display the terminal desktop when receiving the authentication success information sent by the voiceprint authentication system; if the second determining unit 410 receives authentication failure information sent by the voiceprint authentication system, and if it is determined that the number of times of receiving the authentication failure information in the first preset time period exceeds the preset number of times, the locking unit 412 performs user name locking to prevent an illegal user from maliciously logging in the terminal through multiple tests, thereby ensuring the security of data information in the terminal. Meanwhile, the login interface unlocking device 400 performs identity verification in a voiceprint authentication mode, and compared with the existing identity verification modes such as passwords and the like, voiceprint features of a user are more difficult to steal or imitate, and the safety of information in the terminal is further improved.
The above-mentioned login interface unlocking means may be implemented in the form of a computer program, which may be run on a computer device as shown in fig. 8.
Referring to fig. 8, fig. 8 is a schematic block diagram of a computer device according to an embodiment of the present application. The computer device 500 may be a tablet computer, a notebook computer, a desktop computer, or other terminal devices.
Referring to fig. 8, the computer device 500 includes a processor 502, memory, and a network interface 505 connected by a system bus 501, where the memory may include a non-volatile storage medium 503 and an internal memory 504.
The non-volatile storage medium 503 may store an operating system 5031 and a computer program 5032. The computer programs 5032 include program instructions that, when executed, cause the processor 502 to perform a login interface unlocking method.
The processor 502 is used to provide computing and control capabilities that support the operation of the overall computer device 500.
The internal memory 504 provides an environment for the execution of the computer program 5032 in the non-volatile storage medium 503, and when the computer program 5032 is executed by the processor 502, the processor 502 can execute a login interface unlocking method.
The network interface 505 is used for network communication such as sending assigned tasks and the like. Those skilled in the art will appreciate that the configuration shown in fig. 8 is a block diagram of only a portion of the configuration relevant to the present teachings and does not constitute a limitation on the computer device 500 to which the present teachings may be applied, and that a particular computer device 500 may include more or less components than those shown, or combine certain components, or have a different arrangement of components.
Wherein the processor 502 is configured to run program code stored in the memory to implement the following functions: displaying a login interface, wherein the login interface comprises a recording control and a user name bar; acquiring a user name input by a user in the user name bar; if the operation of triggering the recording control is monitored, recording sound information; sending the user name and the voice information to a voiceprint authentication system, wherein the voiceprint authentication system is used for searching corresponding pre-stored voice information according to the user name and carrying out voiceprint authentication on the voice information according to the pre-stored voice information; and if the authentication success information sent by the voiceprint authentication system is received, unlocking the login interface according to the authentication success information to display the terminal desktop corresponding to the user name.
In one embodiment, the processor 502 further executes the following procedures before executing the display login interface: acquiring a user name of a current system of a terminal; inputting pre-stored sound information of a user in the current system; and associating the user name of the current system with pre-stored sound information and then sending the user name to the voiceprint authentication system.
In one embodiment, the processor 502, when executing the pre-stored voice information entered into the current system by the user, further executes the following program: acquiring time information corresponding to the pre-stored sound information; and adding the time information as a timestamp to the username of the current system.
In one embodiment, after the processor 502 executes the sending of the user name and the voice information to the voiceprint authentication system, the following procedure is further executed: if authentication failure information sent by the voiceprint authentication system is received, judging whether the times of the received authentication failure information in a first preset time period exceed preset times or not; if the times of the authentication failure information received in the first preset time period do not exceed the preset times, prompting the user to re-enter voice information, and returning to execute the step of acquiring the user name input by the user in the user name column; and if the times of the authentication failure information received in the first preset time period exceed the preset times, locking the user name.
In one embodiment, the processor 502, after executing the recording sound information, further executes the following program: judging whether the recording of the sound information is finished or not; and if the voice information is recorded, executing the step of sending the user name and the voice information to a voiceprint authentication system.
It should be understood that, in the embodiment of the present Application, the Processor 502 may be a Central Processing Unit (CPU), and the Processor 502 may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field-Programmable gate arrays (FPGAs) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Those skilled in the art will appreciate that the configuration of computer device 500 shown in FIG. 8 is not intended to be limiting of computer device 500 and may include more or less components than those shown, or some components may be combined, or a different arrangement of components.
In another embodiment of the present application, a storage medium is provided that stores a computer program, wherein the computer program comprises program instructions. The program instructions, when executed by the processor, implement: displaying a login interface, wherein the login interface comprises a recording control and a user name bar; acquiring a user name input by a user in the user name bar; if the operation of triggering the recording control is monitored, recording sound information; sending the user name and the voice information to a voiceprint authentication system, wherein the voiceprint authentication system is used for searching corresponding pre-stored voice information according to the user name and carrying out voiceprint authentication on the voice information according to the pre-stored voice information; and if the authentication success information sent by the voiceprint authentication system is received, unlocking the login interface according to the authentication success information to display the terminal desktop corresponding to the user name.
In one embodiment, before the program instructions are executed by the processor to display the login interface, the method further comprises: acquiring a user name of a current system of a terminal; inputting pre-stored sound information of a user in the current system; and associating the user name of the current system with pre-stored sound information and then sending the user name to the voiceprint authentication system.
In one embodiment, the program instructions, when executed by the processor, further enable entry of a user's pre-stored voice message in the current system by: acquiring time information corresponding to the pre-stored sound information; and adding the time information as a timestamp to the username of the current system.
In one embodiment, after the program instructions are executed by the processor to send the user name and the voice message to the voiceprint authentication system, the method further comprises: if authentication failure information sent by the voiceprint authentication system is received, judging whether the times of the received authentication failure information in a first preset time period exceed preset times or not; if the times of the authentication failure information received in the first preset time period do not exceed the preset times, prompting the user to re-enter voice information, and returning to execute the step of acquiring the user name input by the user in the user name column; and if the times of the authentication failure information received in the first preset time period exceed the preset times, locking the user name.
In one embodiment, after the program instructions are executed by the processor to enter the voice information, the method further comprises: judging whether the recording of the sound information is finished or not; and if the voice information is recorded, executing the step of sending the user name and the voice information to a voiceprint authentication system.
The storage medium may be various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk, or an optical disk.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the login interface unlocking apparatus and the login interface unlocking unit described above may refer to corresponding processes in the foregoing login interface unlocking method embodiment, and are not described herein again.
In several embodiments provided in the present application, it should be understood that the disclosed login interface unlocking apparatus and login interface unlocking method may be implemented in other manners. For example, the login interface unlocking device embodiments described above are merely illustrative. For example, the division of each unit is only one logic function division, and there may be another division manner in actual implementation. The steps in the method of the embodiment of the application can be sequentially adjusted, combined and deleted according to actual needs.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially or partially implemented in the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a terminal, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application.
While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (7)

1. A login interface unlocking method is characterized by comprising the following steps:
displaying a login interface, wherein the login interface comprises a recording control and a user name bar;
acquiring a user name input by a user in the user name bar;
if the operation of triggering the recording control is monitored, recording sound information;
encrypting the user name and the voice information and sending the encrypted user name and the voice information to a voiceprint authentication system, wherein the voiceprint authentication system is used for searching corresponding pre-stored voice information according to the user name and carrying out voiceprint authentication on the voice information according to the pre-stored voice information; and
if authentication success information sent by the voiceprint authentication system is received, unlocking the login interface according to the authentication success information to display a terminal desktop corresponding to the user name;
before the displaying the login interface, the method further comprises:
acquiring a user name of a current system of a terminal;
inputting pre-stored sound information of a user in the current system; and
associating the user name of the current system with pre-stored sound information, sending the associated user name to the voiceprint authentication system, and encrypting and storing the user name of the current system;
after the recording of the sound information, further comprising:
judging whether the sound information is recorded or not according to a voice recognition technology, or judging whether the sound information is recorded or not according to whether new sound information is recorded or not within second preset time;
and if the voice information is recorded, executing the step of encrypting the user name and the voice information and sending the encrypted user name and the encrypted voice information to a voiceprint authentication system.
2. The login interface unlocking method according to claim 1, wherein the entering of the pre-stored voice information of the user in the current system further comprises:
acquiring time information corresponding to the pre-stored sound information; and
and adding the time information as a time stamp to the user name of the current system.
3. The login interface unlocking method according to claim 1, wherein after the sending the user name and the voice information to a voiceprint authentication system, the method further comprises:
if authentication failure information sent by the voiceprint authentication system is received, judging whether the times of the received authentication failure information in a first preset time period exceed preset times or not;
if the times of the authentication failure information received in the first preset time period do not exceed the preset times, prompting the user to re-enter voice information, and returning to execute the step of acquiring the user name input by the user in the user name column; and
and if the times of the authentication failure information received in the first preset time period exceed the preset times, locking the user name.
4. A login interface unlocking device, comprising:
the interface display unit is used for displaying a login interface, wherein the login interface comprises a recording control and a user name bar;
the user name acquisition unit is used for acquiring a user name input by a user in the user name bar;
the sound recording unit is used for recording sound information if the operation of triggering the recording control is monitored;
the information sending unit is used for encrypting the user name and the voice information and sending the encrypted user name and the voice information to a voiceprint authentication system, wherein the voiceprint authentication system is used for searching corresponding pre-stored voice information according to the user name and carrying out voiceprint authentication on the voice information according to the pre-stored voice information;
the unlocking unit is used for unlocking the login interface according to the authentication success information to display the terminal desktop corresponding to the user name if the authentication success information sent by the voiceprint authentication system is received;
the acquisition unit is used for acquiring a user name of a current system of the terminal;
the recording unit is used for recording the pre-stored sound information of the user in the current system; and
the sending unit is used for associating the user name of the current system with pre-stored sound information and then sending the associated user name to the voiceprint authentication system, and encrypting and storing the user name of the current system;
further comprising:
the first judging unit is used for judging whether the voice information is recorded or not according to a voice recognition technology, or judging whether the voice information is recorded or not according to whether new voice information is recorded or not within second preset time, and if the voice information is recorded, executing the information sending unit.
5. The login interface unlocking device of claim 4, wherein the entry unit is further configured to: acquiring time information corresponding to the pre-stored sound information; and adding the time information as a timestamp to the user name of the current system.
6. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the login interface unlocking method according to any one of claims 1 to 3 when executing the computer program.
7. A storage medium, characterized in that the storage medium stores a computer program comprising program instructions that, when executed by a processor, cause the processor to perform the login interface unlocking method according to any one of claims 1 to 3.
CN201711063092.8A 2017-11-02 2017-11-02 Login interface unlocking method and device, computer equipment and storage medium Active CN107862192B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201711063092.8A CN107862192B (en) 2017-11-02 2017-11-02 Login interface unlocking method and device, computer equipment and storage medium
PCT/CN2017/113232 WO2019085105A1 (en) 2017-11-02 2017-11-28 Login interface unlocking method and apparatus, computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711063092.8A CN107862192B (en) 2017-11-02 2017-11-02 Login interface unlocking method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN107862192A CN107862192A (en) 2018-03-30
CN107862192B true CN107862192B (en) 2020-10-27

Family

ID=61699840

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711063092.8A Active CN107862192B (en) 2017-11-02 2017-11-02 Login interface unlocking method and device, computer equipment and storage medium

Country Status (2)

Country Link
CN (1) CN107862192B (en)
WO (1) WO2019085105A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108639012A (en) * 2018-05-14 2018-10-12 冼汉生 Power supply system based on Internet of Things starts method, apparatus and computer storage media
CN109976604B (en) * 2018-11-23 2022-07-29 创新先进技术有限公司 Method, system, device and equipment for starting biological characteristic application function
CN110797028A (en) * 2019-09-20 2020-02-14 北京电信易通信息技术股份有限公司 Security authentication method based on voiceprint characteristics and used for police mobile terminal access

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103037368A (en) * 2011-09-29 2013-04-10 中国移动通信集团四川有限公司 Method, device and system for identity authentication
CN104917769A (en) * 2015-06-11 2015-09-16 北京嘉和美康信息技术有限公司 Electronic medical record signature method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103903623B (en) * 2014-03-31 2017-09-29 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN106060019A (en) * 2016-05-20 2016-10-26 张宇川 Bank account management system and method based on intelligent client
CN106549971A (en) * 2016-11-24 2017-03-29 飞驰镁物(北京)信息服务有限公司 The method and device that a kind of account joint is logged in

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103037368A (en) * 2011-09-29 2013-04-10 中国移动通信集团四川有限公司 Method, device and system for identity authentication
CN104917769A (en) * 2015-06-11 2015-09-16 北京嘉和美康信息技术有限公司 Electronic medical record signature method and device

Also Published As

Publication number Publication date
CN107862192A (en) 2018-03-30
WO2019085105A1 (en) 2019-05-09

Similar Documents

Publication Publication Date Title
US10164969B2 (en) Computer security system and method
US8561174B2 (en) Authorization method with hints to the authorization code
JP5727008B2 (en) Operating system unlocking method and mobile phone
EP3147768B1 (en) Screen interface unlocking method and screen interface unlocking device
US9769154B2 (en) Passcode operating system, passcode apparatus, and super-passcode generating method
US9722981B2 (en) Password management system
US20100318807A1 (en) System and method for generating a disguised password based on a real password
US20070300077A1 (en) Method and apparatus for biometric verification of secondary authentications
US10963556B2 (en) Automated password authentication
CN107862192B (en) Login interface unlocking method and device, computer equipment and storage medium
CN108256302B (en) Data security access method and device
US20130305324A1 (en) Incremental Password Barriers to Prevent Malevolent Intrusions
TWI739778B (en) The login mechanism of the operating system
KR20140077838A (en) Information processing apparatus, lock execution method, and lock execution system
US9210134B2 (en) Cryptographic processing method and system using a sensitive data item
KR101460916B1 (en) User authentication method using one time password and user authentication device for using one time password
KR101272349B1 (en) User authentication method using plural one time password
US20180300464A1 (en) Authenticating using a password entry pattern
JP2007179212A (en) Log-in authentication system
JP2012203651A (en) Authentication device
CN110008760B (en) Password data storage method and device, electronic equipment and computer readable medium
US11449597B2 (en) Transposed passwords
CN117176357A (en) Multi-factor authentication encryption storage method and system based on intelligent password key
WO2021229584A1 (en) System and method to support message authentication
CN115643031A (en) Security password authentication method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant