CN107979468B - A kind of identity identifying method and equipment based on SIM card - Google Patents
A kind of identity identifying method and equipment based on SIM card Download PDFInfo
- Publication number
- CN107979468B CN107979468B CN201610922170.4A CN201610922170A CN107979468B CN 107979468 B CN107979468 B CN 107979468B CN 201610922170 A CN201610922170 A CN 201610922170A CN 107979468 B CN107979468 B CN 107979468B
- Authority
- CN
- China
- Prior art keywords
- terminal device
- authentication
- authentication device
- call
- call number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0853—Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the present invention provides a kind of identity identifying method and equipment based on SIM card, is related to field of communication technology, to solve the problems, such as that existing identification authentication security is poor.ID authentication device provided by the invention based on SIM card includes wireless communication module and processor, built-in SIM card in the wireless communication module, the SIM card provides call number for ID authentication device, wireless communication module is used for the call request that receiving terminal apparatus is initiated, processor is for determining whether the call number of the received terminal device of wireless communication module has the call authority of ID authentication device, wireless communication module is also used to when the call number of processor judgement terminal device has the call authority of ID authentication device, speech channel, which is sent, to terminal device establishes instruction, processor is also used to the voice to be identified sent by the speech channel reception terminal device between terminal device and ID authentication device, and authentication is carried out to voice to be identified.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of identity identifying methods and equipment based on SIM card.
Background technique
With the arrival of mobile internet era, the technology and means of steal personal information constantly change, so that identity is recognized
Card becomes a kind of important means of protection personal information.In order to improve the safety of authentication, traditional according to login account
On the basis of family, password carry out authentication, increase the process of voice print verification.Specifically, in advance in the equipment of user's access
User's vocal print is stored, after user passes through authentication using logon account, password, by data network by user's language to be identified
The equipment that sound is sent to user access, further progress voice print verification.
But since no matter user passes through logon account, password carries out authentication, or body is carried out by voice print verification
Part verifying is to be set by data network by what logon account, password and user's voice to be identified were sent to that user wants access to
It is standby, and data network itself does not have safeguard procedures, safety is lower, so that the safety of authentication process itself is poor, causes
It is easily intercepted and captured by hacker by logon account, password and the user voice to be identified of data network transmission, so that logon account,
Password and user's voice leakage to be identified, and when hacker thinks user using the logon account of intercepting and capturing, password and voice to be identified
When the equipment to be accessed accesses, which can not identify that the user identity of current accessed is hacker or user, make
Userspersonal information can further be obtained from the equipment by obtaining hacker, cause the leakage of userspersonal information.
Therefore, the safety for how further increasing authentication procedures becomes current urgent problem to be solved.
Summary of the invention
The embodiment of the present invention provides a kind of identity identifying method and equipment based on SIM card, to solve authentication
The problem of journey safety difference.
In order to achieve the above objectives, the embodiment of the present invention adopts the following technical scheme that
In a first aspect, providing a kind of ID authentication device based on SIM card, the ID authentication device includes: channel radio
Believe module and processor, built-in SIM card in the wireless communication module, the SIM card is provided for the ID authentication device and exhaled
It calls out the numbers code, in which:
The wireless communication module, for the call request that receiving terminal apparatus is initiated, the call request includes terminal
The call number of equipment;
The processor, for determining whether the call number of the received terminal device of the wireless communication module has
The call authority of the standby ID authentication device;
The wireless communication module, be also used to the processor determine the terminal device call number have it is described
When the call authority of ID authentication device, Xiang Suoshu terminal device sends speech channel and establishes instruction, and the speech channel is established
Instruction is used to indicate the speech channel that the terminal device is established between the terminal device and the ID authentication device;
The processor is also used to through the speech channel reception institute between the terminal device and the ID authentication device
The voice to be identified of terminal device transmission is stated, and authentication is carried out to the voice to be identified.
Optionally, the ID authentication device, further includes: memory, in which:
The memory, for storing the ringing number for the terminal device for having call authority to the ID authentication device
Code;
Whether the processor has the calling of the ID authentication device in the call number for determining the terminal device
It is specifically used for when permission: will be stored in the call number of the terminal device and the memory to the ID authentication device
The call number for having the terminal device of call authority is matched, and determines whether the call number of the terminal device has institute
State the call authority of ID authentication device.
Optionally, if the call number of the terminal device has the super-ordinate right of the ID authentication device, and it is described
When terminal device has passed through authentication, the processor is also used to:
The first authority distribution request that the terminal device is sent is received, the first authority distribution request is for being target
The call number of terminal device requests the call authority of the ID authentication device, the equipment letter including the target terminal equipment
Breath, the call number of the target terminal equipment have the common permission of the ID authentication device;
It is described by the call authority list of ID authentication device described in the call number typing of the target terminal equipment
Call authority list includes the facility information for the terminal device for having call authority to the ID authentication device.
Optionally, the ID authentication device is in communication with each other at least one electronic equipment, if the terminal device is exhaled
When code of calling out the numbers has the super-ordinate right of the ID authentication device and passed through authentication, the processor is also used to:
The second authority distribution request that the terminal device is sent is received, the second authority distribution request is for being target
Terminal device distributes the corresponding operating right of objective function of target electronic device, the target function including the target electronic device
The functional parameter of energy, the call number of the target terminal equipment have the common permission of the ID authentication device;
The target electronic device is distributed according to the target terminal equipment that is designated as of second authority distribution request
The corresponding operating right of objective function.
Optionally, when the ID authentication device and at least one electronic equipment are in communication with each other, the processor is also used
In:
As the high risk behaviour for any electronic equipment for detecting any terminal equipment triggering at least one electronic equipment
When making, then the terminal device for having the super-ordinate right of the ID authentication device to call number sends examination & approval instruction, described to examine
Whether criticize instruction for having the inquiry of the terminal device of the super-ordinate right of the ID authentication device to the call number is institute
State the operating right that any terminal equipment authorizes the high risk operation;
Receive the response letter that the terminal device for the super-ordinate right that the call number has the ID authentication device is sent
Breath, and determine whether to examine the operating right that any terminal equipment operates the high risk according to the response message.
Second aspect provides a kind of identity identifying method based on SIM card, is applied to ID authentication device, the identity
Authenticating device includes the wireless communication module of built-in SIM card, and the SIM card provides call number for the ID authentication device,
The described method includes:
The call request initiated by the wireless communication module receiving terminal apparatus, the call request includes that terminal is set
Standby call number;
It is set when the call number for determining the received terminal device of wireless communication module has the authentication
When standby call authority, then speech channel is sent to the terminal device by the wireless communication module and establish instruction, it is described
Speech channel foundation instruction is used to indicate the terminal device and establishes between the terminal device and the ID authentication device
Sound channel;
It is sent by terminal device described in the speech channel reception between the terminal device and the ID authentication device
Voice to be identified, and authentication is carried out to the voice to be identified.
Optionally, the call authority for having the ID authentication device when the call number for determining the terminal device
When, then before sending speech channel foundation instruction to the terminal device by the wireless communication module, the method is also wrapped
It includes:
Having to the ID authentication device of storing in the call number of the terminal device and the memory is exhaled
It makes the call number of the terminal device of permission be matched, determines whether the call number of the terminal device has the identity
The call authority of authenticating device.
Optionally, if the call number of the terminal device has the super-ordinate right of the ID authentication device, and it is described
When terminal device has passed through authentication, the method also includes:
The first authority distribution request that the terminal device is sent is received, the first authority distribution request is for being target
The call number of terminal device requests the call authority of the ID authentication device, the equipment letter including the target terminal equipment
Breath, the call number of the target terminal equipment have the common permission of the ID authentication device;
It is described by the call authority list of ID authentication device described in the call number typing of the target terminal equipment
Call authority list includes the facility information for the terminal device for having call authority to the ID authentication device.
Optionally, when the ID authentication device and at least one electronic equipment are in communication with each other, and the terminal device
When call number has the super-ordinate right of the ID authentication device and has passed through authentication, the method also includes:
The second authority distribution request that the terminal device is sent is received, the second authority distribution request is for being target
Terminal device distributes the corresponding operating right of objective function of target electronic device, the target function including the target electronic device
The functional parameter of energy, the call number of the target terminal equipment have the common permission of the ID authentication device;
The target electronic device is distributed according to the target terminal equipment that is designated as of second authority distribution request
The corresponding operating right of objective function.
Optionally, when the ID authentication device and at least one electronic equipment are in communication with each other, the method also includes:
As the high risk behaviour for any electronic equipment for detecting any terminal equipment triggering at least one electronic equipment
When making, then the terminal device for having the super-ordinate right of the ID authentication device to the call number sends examination & approval instruction, institute
Examination & approval instruction is stated for whether having the inquiry of the terminal device of the super-ordinate right of the ID authentication device to the call number
The operating right of the high risk operation is authorized for any terminal equipment;
Receive the response letter that the terminal device for the super-ordinate right that the call number has the ID authentication device is sent
Breath, and determine whether to examine the operating right that any terminal equipment operates the high risk according to the response message.
Identity identifying method and equipment provided in an embodiment of the present invention based on SIM card, which includes nothing
Line communication module and processor, built-in SIM card in the wireless communication module, the SIM card provide calling for the ID authentication device
Number, the wireless communication module are used for the call request that receiving terminal apparatus is initiated, and processor is for determining wireless communication module
Whether the call number of received terminal device has the call authority of ID authentication device, and wireless communication module is also used to locating
When reason device determines that the call number of terminal device has the call authority of ID authentication device, speech channel is sent to terminal device
Instruction is established, what processor was also used to send by the speech channel reception terminal device between terminal device and ID authentication device
Voice to be identified, and authentication is carried out to voice to be identified.In this way, the SIM card provides ringing number for the ID authentication device
Code, enables the ID authentication device to establish speech channel based on the wireless communication module of built-in SIM card, so that user
Information is not easy to be stolen by hacker, improves the safety of authentication procedures, further such that user information is protected.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be in embodiment or description of the prior art
Required attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is only some realities of the invention
Example is applied, it for those of ordinary skill in the art, without creative efforts, can also be according to these attached drawings
Obtain other attached drawings.
Fig. 1 is a kind of structural schematic diagram of the ID authentication device based on SIM card provided in an embodiment of the present invention;
Fig. 2 is the structural schematic diagram of another ID authentication device based on SIM card provided in an embodiment of the present invention;
Fig. 3 is a kind of flow diagram of the identity identifying method based on SIM card provided in an embodiment of the present invention;
Fig. 4 is a kind of flow diagram of authentication process provided in an embodiment of the present invention;
Fig. 5 is a kind of flow diagram of the authority distribution of low-level terminals equipment provided in an embodiment of the present invention;
Fig. 6 is the approval process signal that a kind of low-level terminals equipment provided in an embodiment of the present invention accesses high risk operation
Figure.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
The executing subject of identity identifying method provided in an embodiment of the present invention based on SIM card is the identity based on SIM card
Authenticating device (referred to as: ID authentication device), or realize the electronic equipment of the identity identifying method based on SIM card.
Wherein, it is built-in with SIM card in the wireless communication module in the ID authentication device in the embodiment of the present invention, is by the SIM card
The ID authentication device provides call number, so that the ID authentication device can be by being built-in with the channel radio of SIM card
Believe that module carries out voice communication, i.e. the ID authentication device has mobile communication ability.Illustratively, in the embodiment of the present invention
ID authentication device can be the electronic equipments such as intelligent gateway device, terminal device (tablet computer, laptop etc.).Its
In, above-mentioned ID authentication device can be with the control unit or module in above-mentioned electronic equipment.
The terms "and/or", only a kind of incidence relation for describing affiliated partner, indicates that there may be three kinds of passes
System, for example, A and/or B, can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.In addition, herein
Middle character "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or".
For the ease of clearly describing the technical solution of the embodiment of the present invention, in an embodiment of the present invention, use " the
One ", the printed words such as " second " distinguish function or the essentially identical identical entry of effect or similar item, and those skilled in the art can
To understand that the printed words such as " first ", " second " are not defined quantity and execution order.
The embodiment of the present invention provides a kind of ID authentication device based on SIM card, as shown in Figure 1, the authentication is set
Standby 1 specifically includes: wireless communication module 11 and processor 12, and built-in SIM card in the wireless communication module 11, which is should
ID authentication device 1 provides call number, in which:
Wireless communication module 11, the call request initiated for receiving terminal apparatus.
Above-mentioned call request includes the call number of terminal device.
Processor 12 is recognized for determining whether the call number of the received terminal device of wireless communication module 11 has identity
Demonstrate,prove the call authority of equipment.
Wireless communication module 11 is also used to determine that the call number of terminal device has ID authentication device in processor 12
Call authority when, to terminal device send speech channel establish instruction.
Wherein, the instruction of above-mentioned speech Path Setup is used to indicate terminal device and establishes terminal device and ID authentication device
Speech channel between 1.Illustratively, which has ID authentication device 1 in the call number for determining the terminal device
Call authority when, then show that the ID authentication device 1 has been that the terminal device has opened call authority, which can be with
Voice authentication is directly carried out by the speech channel between the terminal device and ID authentication device 1.
Processor 12 is also used to send out by the speech channel reception terminal device between terminal device and ID authentication device 1
The voice to be identified sent, and authentication is carried out to voice to be identified.
Illustratively, processor 12 passes through speech between terminal device and ID authentication device 1 receiving terminal device
It, can be according to the user speech sample that the ID authentication device 1 prestores to the language to be identified after the voice to be identified that channel is sent
Sound is analyzed, and determines whether the voice to be identified matches with the user speech sample, to complete authentication.If the processing
Device 12 determines that the voice to be identified matches with the user speech sample, then it represents that authentication success, i.e., the terminal device can
To access the ID authentication device 1;If the processor 12 determines that the voice to be identified and the user speech sample matches fail,
Indicate authentication failure, i.e., the terminal device cannot access the ID authentication device 1.
Illustratively, processor 12 needs before carrying out authentication to voice to be identified in the ID authentication device 1
In advance by the corresponding user speech sample configuration of terminal device in processor 12, and the processor 12 is receiving preset use
After the speech samples of family, vocal print feature is extracted from the user speech sample, and the user speech sample is constructed to the vocal print feature
This sound-groove model, so that subsequent processor 12 carries out voiceprint using the sound-groove model.
Further, in order to improve the safety of user's voiceprint, ID authentication device 1 is by by terminal device and identity
Mode that the user's communication vocal print that speech channel between authenticating device 1 is conveyed is combined with conversational speech content verifies user
Legitimacy.
Specifically, above-mentioned processor 12 is whole by the speech channel reception between terminal device and ID authentication device 1
The voice to be identified that end equipment is sent, and authentication is carried out to voice to be identified and is specifically used for: by terminal device and identity
Speech channel between authenticating device feeds back the voice packet comprising speech verification information to terminal device.
Illustratively, above-mentioned voice packet is used for so that terminal device, which will collect user, carries out language to speech verification information
Voice feedback to be identified after sound verifying is to ID authentication device 1.And above-mentioned speech verification information can be authentication and set
Standby 1 request user carries out the speech prompt information of speech verification.Above-mentioned voice to be identified can be user in the voice packet
The speech verification information of carrying carries out speech verification and the voice that generates.Exemplary, above-mentioned speech verification information is to need to use
Verifying voice that family is read aloud needs user to answer the verifying voice of stochastic problem.
Illustratively, processor 12 is after sending the voice packet comprising speech verification information to terminal device, so that user
The voice prompting that can be received according to terminal device, reads aloud or answers stochastic problem, and terminal device will by speech channel
The voice to be identified of the answer of voice messaging or answer stochastic problem that user reads aloud is sent to the processing of ID authentication device 1
Device 12.And the processor 12 of the ID authentication device 1 is after receiving the voice to be identified, can wait for identifying in voice from this and mentions
Take out the voice content text in user's vocal print A and the voice to be identified, the user's vocal print A that then will acquire be stored in advance
The corresponding user's vocal print B of user speech sample match, and the voice content text of the voice to be identified is verified.
If the voice content text authentication success of user's vocal print A and user's vocal print B successful match and the voice to be identified, determines identity
It authenticates successfully, if it fails to match or the voice content text authentication of the voice to be identified fails by user's vocal print A and user's vocal print B,
Then determine that authentication fails.
Optionally, as shown in Figure 1, the ID authentication device 1 further include: memory 13, in which:
Memory 13, for storing the call number for the terminal device for having call authority to ID authentication device 1.
Whether processor 12 has the call authority of ID authentication device 1 in the call number for determining terminal device, specifically
For: the terminal for having call authority to ID authentication device 1 that will be stored in the call number of terminal device and memory 13
The call number of equipment is matched, and determines whether the call number of terminal device has the call authority of ID authentication device.
Specifically, when being stored in the call number and memory 13 that processor 12 determines the terminal device to authentication
The call number that equipment 1 has the terminal device of call authority is mutually matched, then shows that the call number of terminal device has body
The call authority of part authenticating device 1;If processor 12 determine terminal device call number and memory 13 in store to body
The call number that part authenticating device 1 has the terminal device of call authority mismatches, then shows the call number of terminal device not
The call authority for having ID authentication device 1.
Optionally, in order to enhance the safety for accessing ID authentication device 1, the embodiment of the present invention can be according to terminal device
The permission of ID authentication device 1 that has of call number, terminal device is divided into premium terminals equipment and low-level terminals
The terminal device that call number can be had the super-ordinate right of ID authentication device 1 by equipment, the i.e. embodiment of the present invention is known as height
Grade terminal device, is known as low-level terminals equipment for the terminal device that call number has the common permission of the ID authentication device 1.
Wherein, the equipment power that above-mentioned premium terminals equipment can be used for controlling low-level terminals equipment interconnect with ID authentication device 1
Limit, equipment operation instruction etc. are associated management with low-level terminals equipment, meanwhile, above-mentioned premium terminals equipment can be also used for
Establish sensitive operation scene, the rudimentary permission user of creation, sensitive operation examination & approval, user authority management etc..
Specifically, if the call number of the terminal device has super-ordinate right (i.e. terminal device of ID authentication device 1
For premium terminals equipment), and when the terminal device has passed through authentication, which is also used to:
The first authority distribution request that receiving terminal apparatus is sent, first authority distribution are requested for setting for target terminal
The call authority of standby call number request ID authentication device, first authority distribution request includes setting for target terminal equipment
Standby information, the call number of above-mentioned target terminal equipment have the common permission of ID authentication device, i.e., above-mentioned target is whole
End equipment is low-level terminals equipment;
By in the call authority list of the call number typing ID authentication device of target terminal equipment, which is arranged
Table includes the facility information for having the terminal device of call authority to ID authentication device.
Illustratively, premium terminals equipment is to be configured with advanced end when carrying out initial configuration to ID authentication device 1
The facility information of the facility information of end equipment, the premium terminals equipment includes but is not limited to: the account of premium terminals equipment, close
Code, call number etc..And premium terminals equipment is after through authentication, can be the authentication of low-level terminals device request
The access authority of equipment so that low-level terminals equipment has the call authority for calling the ID authentication device, and then carries out
Authentication.Premium terminals equipment can limit the terminal device for accessing the ID authentication device 1 in this way, to improve
The safety of the ID authentication device.
Optionally, as shown in Fig. 2, the ID authentication device 1 is in communication with each other at least one electronic equipment, illustratively,
If the ID authentication device 1 can be intelligent domestic gateway or other and the intelligent family in family by taking home Intranet as an example
The electronic equipment of electricity interconnection, above-mentioned electronic equipment can be the intelligent family such as intelligent air condition, intelligent refrigerator, dust catcher, water heater
The electronics such as the intelligent security guards such as electric equipment and monitoring camera, intelligent door lock equipment and smart phone, tablet computer, sound equipment are set
It is standby, and the ID authentication device 1 can be above-mentioned any electronic equipment.
When ID authentication device and at least one electronic equipment are in communication with each other, if the call number of terminal device have it is described
The super-ordinate right of ID authentication device and when having passed through authentication,
Processor 12, is specifically also used to: receiving the second authority distribution request that above-mentioned terminal device is sent, the second permission point
It requests to include target for distributing the access authority of target electronic device, second authority distribution for target terminal equipment with request
The functional parameter of electronic equipment;The call number of the target terminal equipment has the common permission of ID authentication device, i.e., above-mentioned
Target terminal equipment be low-level terminals equipment;
According to the permission for being designated as target terminal equipment distribution target electronic device of the second authority distribution request.
Illustratively, the device parameter of above-mentioned target electronic device can be the device identification of target electronic device, product
Model etc..The functional parameter of the objective function of target electronic device can be the corresponding operational order of the objective function, for example, with
For home Intranet, the device parameter of target electronic device can be the model of television set, brand of television set etc., target
The functional parameter of the objective function of electronic equipment can be on or off the corresponding operational order of electronic equipment, be also possible to adjust
The corresponding operational order of high television sound volume.
Illustratively, if by taking home Intranet as an example, the ID authentication device 1 can for intelligent domestic gateway or other
With the electronic equipment of the intelligent appliance interconnection in family, the terminal device of owner's control (can be set as premium terminals equipment, have most
Advanced access authority) it can be distributed inside the home network for the terminal device (low-level terminals equipment can be set as) of guest's control
In have identity authentication function electronic equipment access authority.
For example, if the terminal device of owner's control is to smart home when the ID authentication device 1 is intelligent domestic gateway
When gateway carries out initial configuration, the call number of its own can be added in the call authority list of the intelligent domestic gateway,
It, can be by dialing the intelligent domestic gateway in this way when the terminal device of owner control needs to log in the intelligent domestic gateway
Built-in SIM card carries out voice identification authentication, and after authenticating successfully, the terminal device of owner control can access the smart home
Gateway, and the household appliance in home network is distributed (i.e. and intelligence by the terminal device that the ID authentication device is guest's control
Can the connected household appliance of home gateway or terminal device) access authority and control authority.
Optionally, as shown in Fig. 2, when the ID authentication device 1 and at least one electronic equipment are in communication with each other, the processor
It is also used to:
When detecting that any terminal equipment triggers the high risk operation of any electronic equipment of at least one electronic equipment,
Then have to call number the super-ordinate right of ID authentication device terminal device send examination & approval instruction, the examination & approval instruction for
Whether the terminal device inquiry that call number has the super-ordinate right of ID authentication device 1 is that any terminal equipment authorizes high risk
The operating right of operation;Receive the response that the terminal device for the super-ordinate right that the call number has ID authentication device 1 is sent
Information, and information determines whether to examine the operating right that any terminal equipment operates high risk according to response.
Illustratively, above-mentioned high risk operation can be to be related to the operation of privacy information, for example, low-level terminals equipment is thought
The operation for being equipped with the room of security protection door is opened, or closes the operation of intelligent video camera head.Exemplary, ID authentication device 1 exists
It can be sent by short message mode when sending examination & approval instruction to premium terminals equipment.
It should be noted that the premium terminals equipment for having examination & approval ability in the embodiment of the present invention can configure one or
It is multiple, and ID authentication device 1 can also be sent out when sending examination & approval instruction to premium terminals equipment to partial lower terminal device
It submits to a higher level for approval or revision and criticizes instruction, here and without limitation.The embodiment of the present invention can be by the method for more people's containing to sensitive operation in this way
Use controlled, to reduce operational risk.
ID authentication device provided in an embodiment of the present invention based on SIM card, the equipment include wireless communication module and place
Manage device, wherein built-in SIM card in the wireless communication module, wherein the SIM card provides call number for the ID authentication device,
The wireless communication module is used for the call request that receiving terminal apparatus is initiated, and processor is for determining that wireless communication module is received
Whether the call number of terminal device has the call authority of ID authentication device, and wireless communication module is also used to sentence in processor
When the call number for determining terminal device has the call authority of ID authentication device, speech channel foundation is sent to terminal device and is referred to
It enables, processor is also used to send by the speech channel reception terminal device between terminal device and ID authentication device to be identified
Voice, and authentication is carried out to voice to be identified.In this way, the SIM card provides call number for the ID authentication device, so that
The ID authentication device can establish speech channel based on the wireless communication module of built-in SIM card, so that user information is not
It is easily stolen by hacker, improves the safety of authentication procedures, further such that user information is protected.
It will be described below based on the function of each functional module in the ID authentication device shown in fig. 1 or fig. 2 based on SIM card
And other associated descriptions, the identity identifying method provided in an embodiment of the present invention based on SIM card is introduced.Implement below
The explanation of technical term relevant to above-described embodiment, concept etc. is referred to the above embodiments in example, and which is not described herein again.
The embodiment of the present invention provides a kind of identity identifying method based on SIM card, which includes built-in
The wireless communication module of SIM card, which provides call number for the ID authentication device, as shown in figure 3, this method includes
Following steps:
201, the call request that module receiving terminal apparatus is initiated by wireless communication.
Wherein, above-mentioned call request includes the call number of terminal device.
202, when the call number for determining terminal device has the call authority of ID authentication device, then pass through channel radio
Believe that module sends speech channel to terminal device and establishes instruction.
Wherein, the instruction of above-mentioned speech Path Setup is used to indicate terminal device and establishes terminal device and ID authentication device
Between speech channel.
Illustratively, before step 202, ID authentication device needs to determine whether the call number of the terminal device has
The call authority of standby ID authentication device, specifically, ID authentication device determines whether the call number of the terminal device has
The determination method of the call authority of ID authentication device can be realized by following content:
202a, has call authority to ID authentication device for what is stored in the call number of terminal device and memory
The call number of terminal device is matched, and determines whether the call number of terminal device has the calling privilege of ID authentication device
Limit.
203, the language to be identified sent by the speech channel reception terminal device between terminal device and ID authentication device
Sound, and authentication is carried out to voice to be identified.
Optionally, in order to improve the safety of user's voiceprint, ID authentication device is by by terminal device and identity
Mode that the user's communication vocal print that speech channel between authenticating device is conveyed is combined with conversational speech content verifies user
Legitimacy, specifically, step 203 specifically comprises the following steps:
The verification information that A1, receiving terminal apparatus are sent to ID authentication device.
Wherein, above-mentioned speech verification information be used for so that terminal device will collect user to the speech verification information into
Generated voice feedback to be identified is to ID authentication device after row speech verification.Illustratively, above-mentioned verification information can be with
Speech verification information, which, which can carry, passes through the terminal device and the ID authentication device in the terminal device
Between voice channel send voice packet in;Above-mentioned verification information can be identifying code, which can be the terminal and set
What the standby data channel by between the terminal device and the intelligent domestic gateway was sent.
Illustratively, referring to authentication process schematic diagram shown in Fig. 4 it is found that if the identity in the embodiment of the present invention is recognized
Card equipment is equipped with the home network by taking intelligent domestic gateway as an example, and in the terminal device and corresponds to intelligent home control system
Application program (English: Application, referred to as: APP) when, which carries out the identifying procedure of authentication such as
Shown in lower:
1) terminal device inputs speech samples, intelligent domestic gateway benefit to intelligent domestic gateway by the way of making a phone call
With the vocal print feature sequence construct sound-groove model extracted from user speech sample, recognize to carry out identity in the next steps
Card.
2) user is logged in by the APP that the intelligent domestic gateway installed on terminal device corresponds to intelligent home control system and is somebody's turn to do
When the administration interface of intelligent home control system, user can directly be dialed in intelligent domestic gateway built-in by terminal device
The call number of SIM card, after establishing speech channel between terminal device and intelligent domestic gateway, which can show dynamic
Identifying code is fed back at this point, user is read aloud speech samples caused by the dynamic verification code by terminal device by speech channel
Intelligent domestic gateway.
3) intelligent domestic gateway will carry out Application on Voiceprint Recognition to the speech samples, simultaneously after receiving the speech samples
Whether the voice content that the speech samples can be verified automatically matches with the identifying code, steals authentication information to prevent hacker and steps on by force
Record.If the double authentication faileds of above-mentioned vocal print+voice content, terminal device can be again built in calling intelligent home gateway
The call number of SIM card carries out authentication.In addition, system can also be according to the situation of user speech authentication, suitably
The sound-groove model for updating or adjusting user, to improve the reliability of authentication.
Optionally, in order to enhance the safety for accessing ID authentication device 1, the embodiment of the present invention can be according to terminal device
The permission of ID authentication device that has of call number, terminal device is divided into premium terminals equipment and low-level terminals are set
Standby, i.e. the terminal device of the super-ordinate right that call number can be had to ID authentication device of the embodiment of the present invention is known as advanced end
The terminal device that call number has the common permission of the ID authentication device is known as low-level terminals equipment by end equipment.Wherein,
Equipment permission, the equipment with ID authentication device interconnection that above-mentioned premium terminals equipment can be used for controlling low-level terminals equipment
Operational order etc. is associated management with low-level terminals equipment, meanwhile, above-mentioned premium terminals equipment can be also used for establishing quick
Feel operation scenario, the rudimentary permission user of creation, sensitive operation examination & approval, user authority management etc..
Illustratively, if the call number of the terminal device has the super-ordinate right of the ID authentication device, and institute
When stating terminal device and having passed through authentication, this method further includes following steps:
The first authority distribution request that B1, receiving terminal apparatus are sent.
Wherein, the first above-mentioned authority distribution request for the call number of target terminal equipment for requesting the identity to be recognized
The call authority of equipment is demonstrate,proved, first authority distribution request includes the facility information of target terminal equipment, the target terminal equipment
Call number have the common permission of ID authentication device;
B2, will be in the call authority list of the call number typing ID authentication device of target terminal equipment.
Wherein, above-mentioned call authority list includes having the equipment of the terminal device of call authority to ID authentication device
Information.
Illustratively, when ID authentication device and at least one electronic equipment are in communication with each other, and the ringing number of terminal device
When code has the super-ordinate right of ID authentication device and has passed through authentication, this method further include:
C1, the second authority distribution request for receiving terminal device transmission.
Wherein, the second above-mentioned authority distribution request is for distributing the target function of target electronic device for target terminal equipment
The corresponding operating right of energy, second authority distribution request includes the functional parameter of the objective function of target electronic device, above-mentioned
The call number of target terminal equipment have the common permission of ID authentication device;
C2, the objective function for being designated as target terminal equipment distribution target electronic device according to the request of the second authority distribution
Corresponding operating right.
Illustratively, if the ID authentication device in the embodiment of the present invention is by taking intelligent domestic gateway as an example, and the terminal is set
When the intelligent domestic gateway being installed in standby corresponding to the APP of intelligent home control system, low-level terminals equipment referring to Figure 5
Authority distribution flow diagram, the authority distribution process of the low-level terminals equipment is as follows:
1) intelligent domestic gateway carries out initial configuration, and configuration has user's (i.e. premium terminals equipment) letter of super-ordinate right
The permission that breath (including account name, login password, cell-phone number, user's vocal print sample) and super-ordinate right user have, example
Such as, have establish sensitive operation scene, creation equity stock limits the use of family, sensitive operation examination & approval, user authority management and long-range household
Control authority.
2) super-ordinate right user is visited by the APP that the intelligent domestic gateway that mobile phone is installed corresponds to intelligent home control system
It asks the intelligent domestic gateway corresponding intelligent home control system, SIM built-in in the intelligent domestic gateway is dialed by mobile phone
Card number, the intelligent home control system show intelligent domestic gateway dynamic verification code generated, and user inputs account, close
Code, and verification code information is read by mobile phone.
3) intelligent domestic gateway carries out the double verifyings of vocal print+voice content to the voice of user, and whether identification user is legal
User is accessed, is verified, is successfully logged in the administration interface of the corresponding intelligent home control system of the intelligent domestic gateway, test
Card failure then reports an error.
4) super-ordinate right user executes the operation for creating equity stock limit user account (low-level terminals equipment), and typing is general
Logical permission user information, including account name, login password, cell-phone number, user's vocal print sample etc..
5) after creating user, the corresponding permission of the user is assigned, for example, specific intelligence house control system manages portal dish
The operating right of the specific operation of single operating right or the smart home device that can be managed.
6) operational order control is carried out to the smart home device of authorization, limiting the ordinary user can be to smart home device
The instruction of operation.
Illustratively, by the risk of the various control functions to the electronic equipment being connect with ID authentication device into
The high risk operation of electronic equipment is selected in row assessment, when low-level terminals equipment triggers the operation of these high risks, premium terminals
The equipment property of can choose is the operating right that low-level terminals equipment authorizes the sensitive operation, to reinforce the pipe of sensitive operation
Control, specifically, this method further include:
D1, when detect any terminal equipment trigger any electronic equipment of at least one electronic equipment high risk operation
When, then the terminal device for having the super-ordinate right of ID authentication device to call number sends examination & approval instruction, and examination & approval instruction is used
Whether inquire in the terminal device for the super-ordinate right for having ID authentication device to call number is that any terminal equipment authorizes this
The operating right of high risk operation.
The response letter that D2, the terminal device for receiving the super-ordinate right that call number has the ID authentication device are sent
Breath, and the operating right that examination & approval any terminal equipment operates high risk is determined whether according to the response message.
Illustratively, if the ID authentication device in the embodiment of the present invention is by taking intelligent domestic gateway as an example, and the rudimentary end
When being equipped with the intelligent domestic gateway in end equipment and corresponding to the APP of intelligent home control system, referring to low-level terminals shown in fig. 6
Equipment accesses the browsing process figure of high risk operation it is found that the browsing process of low-level terminals equipment access high risk operation is as follows
It is shown:
1) equity stock limits the use of family (i.e. low-level terminals equipment) and is accessed by the intelligent home control system APP installed in mobile phone
The management portal of the corresponding intelligent home control system of the intelligent domestic gateway, the intelligent home control system show the intelligence man
Occupy gateway dynamic verification code generated, user inputs account, password, and built in dialing in the intelligent domestic gateway by mobile phone
SIM card number, read verification code information online.
2) intelligent domestic gateway carries out the double verifyings of vocal print+voice content to the voice of user, and whether identification user is legal
User is accessed, is verified, is successfully logged in the administration interface of the corresponding intelligent home control system of the intelligent domestic gateway, test
Card failure then reports an error.
3) ordinary user accesses the operable related service of administration interface of the intelligent home control system, including inquiry is awarded
Weigh equipment access situation, the smart home device of long-range control authorization, home equipment information of monitoring authorization etc..
4) intelligent domestic gateway judges whether user's operation is that (i.e. whether the user's operation is high risk behaviour to sensitive operation
Make), it if it is sensitive operation, will send short messages to specified approver (such as premium terminals equipment), and the reply of people waiting for approval;
If not sensitive operation, control instruction will be directly transmitted to smart home device.
5) smart home device receives control instruction, and parses to control instruction, executes the control instruction.
Identity identifying method provided in an embodiment of the present invention based on SIM card, the ID authentication device include built-in SIM card
Wireless communication module, by the wireless communication module receiving terminal apparatus initiate call request, then when determine terminal set
When standby call number has the call authority of ID authentication device, is then sent and talked about to terminal device by the wireless communication module
Sound Path Setup instruction, finally by between terminal device and ID authentication device speech channel reception terminal device send to
It identifies voice, and authentication is carried out to voice to be identified.In this way, the SIM card provides call number for the ID authentication device,
The ID authentication device is enabled to establish speech channel based on the wireless communication module of built-in SIM card, so that user believes
Breath is not easy to be stolen by hacker, the safety of authentication procedures is improved, further such that user information is protected.
It should be noted that during specific implementation, ID authentication device institute in above-mentioned method flow as shown in Figure 3
The computer that each step executed can execute the software form stored in memory by the processor of example, in hardware executes
Instruction realizes that, to avoid repeating, details are not described herein again.And program corresponding to movement performed by above-mentioned ID authentication device is equal
It can be stored in a software form in the memory of the ID authentication device, execute the above modules in order to which processor calls
Corresponding operation.
Memory above may include volatile memory (volatile memory), such as random access memory
Device (random-access memory, RAM);It also may include nonvolatile memory (non-volatile memory), example
Such as read-only memory (read-only memory, ROM), flash memory (flash memory), hard disk (hard disk
Drive, HDD) or solid state hard disk (solid-state drive, SSD);It can also include the combination of the memory of mentioned kind.
Processor in device presented above can be a processor, be also possible to the system of multiple processing elements
Claim.For example, processor can be central processing unit (central processing unit, CPU;It may be other general places
Manage device, digital signal processor (digital signal processing, DSP), specific integrated circuit (application
Specific integrated circuit, ASIC), field programmable gate array (field-programmable gate
Array, FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hardware components etc..It is logical
It can be microprocessor with processor or the processor be also possible to any conventional processor etc.;It can also be dedicated processes
Device, the application specific processor may include at least one of baseband processing chip, radio frequency processing chip etc..
It is apparent to those skilled in the art that for convenience and simplicity of description, the device of foregoing description
It with the specific work process of module, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In several embodiments provided herein, it should be understood that disclosed ID authentication device and method, it can
To realize by another way.For example, ID authentication device embodiment described above is only schematical, for example,
The division of the module, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple
Module or component can be combined or can be integrated into another system, or some features can be ignored or not executed.It is another
Point, shown or discussed mutual coupling, direct-coupling or communication connection can be through some interfaces, device or
The indirect coupling or communication connection of unit can be electrical property, mechanical or other forms.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that the independent physics of each unit includes, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although
Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used
To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features;
And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and
Range.
Claims (10)
1. a kind of ID authentication device based on SIM card, which is characterized in that the ID authentication device includes: radio communication mold
Block and processor, built-in SIM card in the wireless communication module, the SIM card provide ringing number for the ID authentication device
Code, in which:
The wireless communication module, for the call request that receiving terminal apparatus is initiated, the call request includes terminal device
Call number;
The processor, for determining whether the call number of the received terminal device of the wireless communication module has institute
State the call authority of ID authentication device;
The wireless communication module is also used to determine that the call number of the terminal device has the identity in the processor
When the call authority of authenticating device, Xiang Suoshu terminal device sends speech channel and establishes instruction, and the speech channel establishes instruction
It is used to indicate the speech channel that the terminal device is established between the terminal device and the ID authentication device;
The processor is also used to by whole described in the speech channel reception between the terminal device and the ID authentication device
The voice to be identified that end equipment is sent, and authentication is carried out to the voice to be identified.
2. equipment according to claim 1, which is characterized in that the ID authentication device, further includes: memory, in which:
The memory, for storing the call number for the terminal device for having call authority to the ID authentication device;
Whether the processor has the call authority of the ID authentication device in the call number for determining the terminal device
When be specifically used for: have what is stored in the call number of the terminal device and the memory to the ID authentication device
The call number of the terminal device of call authority is matched, and determines whether the call number of the terminal device has the body
The call authority of part authenticating device.
3. equipment according to claim 1, which is characterized in that if the call number of the terminal device has the identity
The super-ordinate right of authenticating device, and when the terminal device has passed through authentication, the processor is also used to:
The first authority distribution request that the terminal device is sent is received, the first authority distribution request is for being target terminal
The call number of equipment requests the call authority of the ID authentication device, the facility information including the target terminal equipment,
The call number of the target terminal equipment has the common permission of the ID authentication device;
By in the call authority list of ID authentication device described in the call number typing of the target terminal equipment, the calling
Permissions list includes the facility information for the terminal device for having call authority to the ID authentication device.
4. equipment according to claim 1, which is characterized in that the ID authentication device and at least one electronic equipment phase
Mutual communication, if the call number of the terminal device has the super-ordinate right of the ID authentication device and passed through authentication
When, the processor is also used to:
The second authority distribution request that the terminal device is sent is received, the second authority distribution request is for being target terminal
Equipment distributes the corresponding operating right of objective function of target electronic device, the objective function including the target electronic device
The call number of functional parameter, the target terminal equipment has the common permission of the ID authentication device;
The mesh for being designated as the target terminal equipment and distributing the target electronic device requested according to second authority distribution
Mark the corresponding operating right of function.
5. equipment according to claim 1 or 4, which is characterized in that when the ID authentication device and at least one electronics
Equipment is in communication with each other, and the processor is also used to:
When detecting that any terminal equipment triggers the high risk operation of any electronic equipment of at least one electronic equipment,
The terminal device for then having the super-ordinate right of the ID authentication device to call number sends examination & approval instruction, the examination & approval instruction
It whether is described any for having the inquiry of the terminal device of the super-ordinate right of the ID authentication device to the call number
Terminal device authorizes the operating right of the high risk operation;
The response message that the terminal device for the super-ordinate right that the call number has the ID authentication device is sent is received, and
Determine whether to examine the operating right that any terminal equipment operates the high risk according to the response message.
6. a kind of identity identifying method based on SIM card, which is characterized in that be applied to ID authentication device, the authentication
Equipment includes the wireless communication module of built-in SIM card, and the SIM card provides call number for the ID authentication device, described
Method includes:
The call request initiated by the wireless communication module receiving terminal apparatus, the call request includes terminal device
Call number;
When the call number for determining the received terminal device of wireless communication module has the ID authentication device
When call authority, then speech channel is sent to the terminal device by the wireless communication module and establish instruction, the speech
It is logical that Path Setup instruction is used to indicate the speech that the terminal device is established between the terminal device and the ID authentication device
Road;
By the transmission of terminal device described in the speech channel reception between the terminal device and the ID authentication device wait know
Other voice, and authentication is carried out to the voice to be identified.
7. according to the method described in claim 6, it is characterized in that, described when the call number for determining the terminal device has
When the call authority of the ID authentication device, then speech channel is sent to the terminal device by the wireless communication module
It establishes before instruction, the method also includes:
Has call authority to the ID authentication device for what is stored in the call number of the terminal device and memory
The call number of terminal device is matched, and determines whether the call number of the terminal device has the ID authentication device
Call authority.
8. according to the method described in claim 6, it is characterized in that, if the call number of the terminal device has the identity
The super-ordinate right of authenticating device, and when the terminal device has passed through authentication, the method also includes:
The first authority distribution request that the terminal device is sent is received, the first authority distribution request is for being target terminal
The call number of equipment requests the call authority of the ID authentication device, the facility information including the target terminal equipment,
The call number of the target terminal equipment has the common permission of the ID authentication device;
By in the call authority list of ID authentication device described in the call number typing of the target terminal equipment, the calling
Permissions list includes the facility information for the terminal device for having call authority to the ID authentication device.
9. according to the method described in claim 6, it is characterized in that, when the ID authentication device and at least one electronic equipment
It is in communication with each other, and the call number of the terminal device has the super-ordinate right of the ID authentication device and recognized by identity
When card, the method also includes:
The second authority distribution request that the terminal device is sent is received, the second authority distribution request is for being target terminal
Equipment distributes the corresponding operating right of objective function of target electronic device, the objective function including the target electronic device
The call number of functional parameter, the target terminal equipment has the common permission of the ID authentication device;
The mesh for being designated as the target terminal equipment and distributing the target electronic device requested according to second authority distribution
Mark the corresponding operating right of function.
10. method according to claim 6 or 9, which is characterized in that when the ID authentication device and at least one electronics
Equipment is in communication with each other, the method also includes:
When detecting that any terminal equipment triggers the high risk operation of any electronic equipment of at least one electronic equipment,
The terminal device for then having the super-ordinate right of the ID authentication device to the call number sends examination & approval instruction, the examination & approval
Instruction is for having whether the inquiry of the terminal device of the super-ordinate right of the ID authentication device is described to the call number
Any terminal equipment authorizes the operating right of the high risk operation;
The response message that the terminal device for the super-ordinate right that the call number has the ID authentication device is sent is received, and
Determine whether to examine the operating right that any terminal equipment operates the high risk according to the response message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610922170.4A CN107979468B (en) | 2016-10-21 | 2016-10-21 | A kind of identity identifying method and equipment based on SIM card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610922170.4A CN107979468B (en) | 2016-10-21 | 2016-10-21 | A kind of identity identifying method and equipment based on SIM card |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107979468A CN107979468A (en) | 2018-05-01 |
CN107979468B true CN107979468B (en) | 2019-06-25 |
Family
ID=62004720
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610922170.4A Active CN107979468B (en) | 2016-10-21 | 2016-10-21 | A kind of identity identifying method and equipment based on SIM card |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107979468B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110113357B (en) * | 2019-05-23 | 2022-11-15 | 五竹科技(北京)有限公司 | Method for authenticating identity of outbound robot and providing certification information |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101056343A (en) * | 2007-06-19 | 2007-10-17 | 华为技术有限公司 | Method and call terminal for multiple users to use the same call terminal |
CN101771967A (en) * | 2008-12-31 | 2010-07-07 | 华为终端有限公司 | Method for transmitting and forwarding short message, terminal, access gateway and short message system |
CN105610807A (en) * | 2015-12-23 | 2016-05-25 | 北京握奇智能科技有限公司 | Network identity authentication device and authentication method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102007028640A1 (en) * | 2007-06-21 | 2008-12-24 | Siemens Enterprise Communications Gmbh & Co. Kg | Method, terminal and voice memory for storing voice messages in a communication network |
-
2016
- 2016-10-21 CN CN201610922170.4A patent/CN107979468B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101056343A (en) * | 2007-06-19 | 2007-10-17 | 华为技术有限公司 | Method and call terminal for multiple users to use the same call terminal |
CN101771967A (en) * | 2008-12-31 | 2010-07-07 | 华为终端有限公司 | Method for transmitting and forwarding short message, terminal, access gateway and short message system |
CN105610807A (en) * | 2015-12-23 | 2016-05-25 | 北京握奇智能科技有限公司 | Network identity authentication device and authentication method |
Also Published As
Publication number | Publication date |
---|---|
CN107979468A (en) | 2018-05-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9621556B2 (en) | System and method for implementing a two-person access rule using mobile devices | |
US10219154B1 (en) | Frictionless or near-frictionless 3 factor user authentication method and system by use of triad network | |
CN104052775B (en) | Right management method, device and the system of a kind of cloud platform service | |
WO2015035895A1 (en) | Methods, devices, and systems for account login | |
EP2579220A1 (en) | Entrance guard control method and system thereof | |
KR101451359B1 (en) | User account recovery | |
US11388159B2 (en) | Variable-step authentication for communications in controlled environment | |
CN105259771A (en) | Authentication method and associated device | |
US9992330B1 (en) | Conference functionality between inmates and multiple approved parties in controlled environment | |
CN109413362A (en) | A kind of call voice access video-meeting method and device | |
CN109407528A (en) | Safety access method, device, server and storage medium | |
US20240155050A1 (en) | Privileged electronic communications with inmates | |
Young et al. | BadVoice: Soundless voice-control replay attack on modern smartphones | |
CN106385397B (en) | Method and device for access control and type configuration of network access equipment | |
CN106411811A (en) | Authentication method, system and device of accessing customer service | |
CN110895844A (en) | Interaction method and device of intelligent door equipment, computer equipment and storage medium | |
CN107979468B (en) | A kind of identity identifying method and equipment based on SIM card | |
KR101831381B1 (en) | Method of smart login using messenger service and device thereof | |
KR101133167B1 (en) | Method and apparatus for user verifing process with enhanced security | |
CN110264602A (en) | A kind of unlocking system, method, terminal device and door lock service device | |
EP3864878B1 (en) | Method for accessing data or a service from a first user device and corresponding second user device, server and system | |
CN110784447A (en) | Method for realizing non-perception authentication across protocols | |
CN110061956A (en) | A kind of processing method and system improving user's online experience | |
CN110545225B (en) | Local and internet equipment authentication and authorization method | |
CN116962998A (en) | Verification information sending method, electronic equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |