CN107979468B - A kind of identity identifying method and equipment based on SIM card - Google Patents

A kind of identity identifying method and equipment based on SIM card Download PDF

Info

Publication number
CN107979468B
CN107979468B CN201610922170.4A CN201610922170A CN107979468B CN 107979468 B CN107979468 B CN 107979468B CN 201610922170 A CN201610922170 A CN 201610922170A CN 107979468 B CN107979468 B CN 107979468B
Authority
CN
China
Prior art keywords
terminal device
authentication
authentication device
call
call number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610922170.4A
Other languages
Chinese (zh)
Other versions
CN107979468A (en
Inventor
张小梅
马铮
高枫
俞播
唐磊
朱安南
姜楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201610922170.4A priority Critical patent/CN107979468B/en
Publication of CN107979468A publication Critical patent/CN107979468A/en
Application granted granted Critical
Publication of CN107979468B publication Critical patent/CN107979468B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the present invention provides a kind of identity identifying method and equipment based on SIM card, is related to field of communication technology, to solve the problems, such as that existing identification authentication security is poor.ID authentication device provided by the invention based on SIM card includes wireless communication module and processor, built-in SIM card in the wireless communication module, the SIM card provides call number for ID authentication device, wireless communication module is used for the call request that receiving terminal apparatus is initiated, processor is for determining whether the call number of the received terminal device of wireless communication module has the call authority of ID authentication device, wireless communication module is also used to when the call number of processor judgement terminal device has the call authority of ID authentication device, speech channel, which is sent, to terminal device establishes instruction, processor is also used to the voice to be identified sent by the speech channel reception terminal device between terminal device and ID authentication device, and authentication is carried out to voice to be identified.

Description

A kind of identity identifying method and equipment based on SIM card
Technical field
The present invention relates to field of communication technology more particularly to a kind of identity identifying methods and equipment based on SIM card.
Background technique
With the arrival of mobile internet era, the technology and means of steal personal information constantly change, so that identity is recognized Card becomes a kind of important means of protection personal information.In order to improve the safety of authentication, traditional according to login account On the basis of family, password carry out authentication, increase the process of voice print verification.Specifically, in advance in the equipment of user's access User's vocal print is stored, after user passes through authentication using logon account, password, by data network by user's language to be identified The equipment that sound is sent to user access, further progress voice print verification.
But since no matter user passes through logon account, password carries out authentication, or body is carried out by voice print verification Part verifying is to be set by data network by what logon account, password and user's voice to be identified were sent to that user wants access to It is standby, and data network itself does not have safeguard procedures, safety is lower, so that the safety of authentication process itself is poor, causes It is easily intercepted and captured by hacker by logon account, password and the user voice to be identified of data network transmission, so that logon account, Password and user's voice leakage to be identified, and when hacker thinks user using the logon account of intercepting and capturing, password and voice to be identified When the equipment to be accessed accesses, which can not identify that the user identity of current accessed is hacker or user, make Userspersonal information can further be obtained from the equipment by obtaining hacker, cause the leakage of userspersonal information.
Therefore, the safety for how further increasing authentication procedures becomes current urgent problem to be solved.
Summary of the invention
The embodiment of the present invention provides a kind of identity identifying method and equipment based on SIM card, to solve authentication The problem of journey safety difference.
In order to achieve the above objectives, the embodiment of the present invention adopts the following technical scheme that
In a first aspect, providing a kind of ID authentication device based on SIM card, the ID authentication device includes: channel radio Believe module and processor, built-in SIM card in the wireless communication module, the SIM card is provided for the ID authentication device and exhaled It calls out the numbers code, in which:
The wireless communication module, for the call request that receiving terminal apparatus is initiated, the call request includes terminal The call number of equipment;
The processor, for determining whether the call number of the received terminal device of the wireless communication module has The call authority of the standby ID authentication device;
The wireless communication module, be also used to the processor determine the terminal device call number have it is described When the call authority of ID authentication device, Xiang Suoshu terminal device sends speech channel and establishes instruction, and the speech channel is established Instruction is used to indicate the speech channel that the terminal device is established between the terminal device and the ID authentication device;
The processor is also used to through the speech channel reception institute between the terminal device and the ID authentication device The voice to be identified of terminal device transmission is stated, and authentication is carried out to the voice to be identified.
Optionally, the ID authentication device, further includes: memory, in which:
The memory, for storing the ringing number for the terminal device for having call authority to the ID authentication device Code;
Whether the processor has the calling of the ID authentication device in the call number for determining the terminal device It is specifically used for when permission: will be stored in the call number of the terminal device and the memory to the ID authentication device The call number for having the terminal device of call authority is matched, and determines whether the call number of the terminal device has institute State the call authority of ID authentication device.
Optionally, if the call number of the terminal device has the super-ordinate right of the ID authentication device, and it is described When terminal device has passed through authentication, the processor is also used to:
The first authority distribution request that the terminal device is sent is received, the first authority distribution request is for being target The call number of terminal device requests the call authority of the ID authentication device, the equipment letter including the target terminal equipment Breath, the call number of the target terminal equipment have the common permission of the ID authentication device;
It is described by the call authority list of ID authentication device described in the call number typing of the target terminal equipment Call authority list includes the facility information for the terminal device for having call authority to the ID authentication device.
Optionally, the ID authentication device is in communication with each other at least one electronic equipment, if the terminal device is exhaled When code of calling out the numbers has the super-ordinate right of the ID authentication device and passed through authentication, the processor is also used to:
The second authority distribution request that the terminal device is sent is received, the second authority distribution request is for being target Terminal device distributes the corresponding operating right of objective function of target electronic device, the target function including the target electronic device The functional parameter of energy, the call number of the target terminal equipment have the common permission of the ID authentication device;
The target electronic device is distributed according to the target terminal equipment that is designated as of second authority distribution request The corresponding operating right of objective function.
Optionally, when the ID authentication device and at least one electronic equipment are in communication with each other, the processor is also used In:
As the high risk behaviour for any electronic equipment for detecting any terminal equipment triggering at least one electronic equipment When making, then the terminal device for having the super-ordinate right of the ID authentication device to call number sends examination & approval instruction, described to examine Whether criticize instruction for having the inquiry of the terminal device of the super-ordinate right of the ID authentication device to the call number is institute State the operating right that any terminal equipment authorizes the high risk operation;
Receive the response letter that the terminal device for the super-ordinate right that the call number has the ID authentication device is sent Breath, and determine whether to examine the operating right that any terminal equipment operates the high risk according to the response message.
Second aspect provides a kind of identity identifying method based on SIM card, is applied to ID authentication device, the identity Authenticating device includes the wireless communication module of built-in SIM card, and the SIM card provides call number for the ID authentication device, The described method includes:
The call request initiated by the wireless communication module receiving terminal apparatus, the call request includes that terminal is set Standby call number;
It is set when the call number for determining the received terminal device of wireless communication module has the authentication When standby call authority, then speech channel is sent to the terminal device by the wireless communication module and establish instruction, it is described Speech channel foundation instruction is used to indicate the terminal device and establishes between the terminal device and the ID authentication device Sound channel;
It is sent by terminal device described in the speech channel reception between the terminal device and the ID authentication device Voice to be identified, and authentication is carried out to the voice to be identified.
Optionally, the call authority for having the ID authentication device when the call number for determining the terminal device When, then before sending speech channel foundation instruction to the terminal device by the wireless communication module, the method is also wrapped It includes:
Having to the ID authentication device of storing in the call number of the terminal device and the memory is exhaled It makes the call number of the terminal device of permission be matched, determines whether the call number of the terminal device has the identity The call authority of authenticating device.
Optionally, if the call number of the terminal device has the super-ordinate right of the ID authentication device, and it is described When terminal device has passed through authentication, the method also includes:
The first authority distribution request that the terminal device is sent is received, the first authority distribution request is for being target The call number of terminal device requests the call authority of the ID authentication device, the equipment letter including the target terminal equipment Breath, the call number of the target terminal equipment have the common permission of the ID authentication device;
It is described by the call authority list of ID authentication device described in the call number typing of the target terminal equipment Call authority list includes the facility information for the terminal device for having call authority to the ID authentication device.
Optionally, when the ID authentication device and at least one electronic equipment are in communication with each other, and the terminal device When call number has the super-ordinate right of the ID authentication device and has passed through authentication, the method also includes:
The second authority distribution request that the terminal device is sent is received, the second authority distribution request is for being target Terminal device distributes the corresponding operating right of objective function of target electronic device, the target function including the target electronic device The functional parameter of energy, the call number of the target terminal equipment have the common permission of the ID authentication device;
The target electronic device is distributed according to the target terminal equipment that is designated as of second authority distribution request The corresponding operating right of objective function.
Optionally, when the ID authentication device and at least one electronic equipment are in communication with each other, the method also includes:
As the high risk behaviour for any electronic equipment for detecting any terminal equipment triggering at least one electronic equipment When making, then the terminal device for having the super-ordinate right of the ID authentication device to the call number sends examination & approval instruction, institute Examination & approval instruction is stated for whether having the inquiry of the terminal device of the super-ordinate right of the ID authentication device to the call number The operating right of the high risk operation is authorized for any terminal equipment;
Receive the response letter that the terminal device for the super-ordinate right that the call number has the ID authentication device is sent Breath, and determine whether to examine the operating right that any terminal equipment operates the high risk according to the response message.
Identity identifying method and equipment provided in an embodiment of the present invention based on SIM card, which includes nothing Line communication module and processor, built-in SIM card in the wireless communication module, the SIM card provide calling for the ID authentication device Number, the wireless communication module are used for the call request that receiving terminal apparatus is initiated, and processor is for determining wireless communication module Whether the call number of received terminal device has the call authority of ID authentication device, and wireless communication module is also used to locating When reason device determines that the call number of terminal device has the call authority of ID authentication device, speech channel is sent to terminal device Instruction is established, what processor was also used to send by the speech channel reception terminal device between terminal device and ID authentication device Voice to be identified, and authentication is carried out to voice to be identified.In this way, the SIM card provides ringing number for the ID authentication device Code, enables the ID authentication device to establish speech channel based on the wireless communication module of built-in SIM card, so that user Information is not easy to be stolen by hacker, improves the safety of authentication procedures, further such that user information is protected.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be in embodiment or description of the prior art Required attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is only some realities of the invention Example is applied, it for those of ordinary skill in the art, without creative efforts, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is a kind of structural schematic diagram of the ID authentication device based on SIM card provided in an embodiment of the present invention;
Fig. 2 is the structural schematic diagram of another ID authentication device based on SIM card provided in an embodiment of the present invention;
Fig. 3 is a kind of flow diagram of the identity identifying method based on SIM card provided in an embodiment of the present invention;
Fig. 4 is a kind of flow diagram of authentication process provided in an embodiment of the present invention;
Fig. 5 is a kind of flow diagram of the authority distribution of low-level terminals equipment provided in an embodiment of the present invention;
Fig. 6 is the approval process signal that a kind of low-level terminals equipment provided in an embodiment of the present invention accesses high risk operation Figure.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
The executing subject of identity identifying method provided in an embodiment of the present invention based on SIM card is the identity based on SIM card Authenticating device (referred to as: ID authentication device), or realize the electronic equipment of the identity identifying method based on SIM card. Wherein, it is built-in with SIM card in the wireless communication module in the ID authentication device in the embodiment of the present invention, is by the SIM card The ID authentication device provides call number, so that the ID authentication device can be by being built-in with the channel radio of SIM card Believe that module carries out voice communication, i.e. the ID authentication device has mobile communication ability.Illustratively, in the embodiment of the present invention ID authentication device can be the electronic equipments such as intelligent gateway device, terminal device (tablet computer, laptop etc.).Its In, above-mentioned ID authentication device can be with the control unit or module in above-mentioned electronic equipment.
The terms "and/or", only a kind of incidence relation for describing affiliated partner, indicates that there may be three kinds of passes System, for example, A and/or B, can indicate: individualism A exists simultaneously A and B, these three situations of individualism B.In addition, herein Middle character "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or".
For the ease of clearly describing the technical solution of the embodiment of the present invention, in an embodiment of the present invention, use " the One ", the printed words such as " second " distinguish function or the essentially identical identical entry of effect or similar item, and those skilled in the art can To understand that the printed words such as " first ", " second " are not defined quantity and execution order.
The embodiment of the present invention provides a kind of ID authentication device based on SIM card, as shown in Figure 1, the authentication is set Standby 1 specifically includes: wireless communication module 11 and processor 12, and built-in SIM card in the wireless communication module 11, which is should ID authentication device 1 provides call number, in which:
Wireless communication module 11, the call request initiated for receiving terminal apparatus.
Above-mentioned call request includes the call number of terminal device.
Processor 12 is recognized for determining whether the call number of the received terminal device of wireless communication module 11 has identity Demonstrate,prove the call authority of equipment.
Wireless communication module 11 is also used to determine that the call number of terminal device has ID authentication device in processor 12 Call authority when, to terminal device send speech channel establish instruction.
Wherein, the instruction of above-mentioned speech Path Setup is used to indicate terminal device and establishes terminal device and ID authentication device Speech channel between 1.Illustratively, which has ID authentication device 1 in the call number for determining the terminal device Call authority when, then show that the ID authentication device 1 has been that the terminal device has opened call authority, which can be with Voice authentication is directly carried out by the speech channel between the terminal device and ID authentication device 1.
Processor 12 is also used to send out by the speech channel reception terminal device between terminal device and ID authentication device 1 The voice to be identified sent, and authentication is carried out to voice to be identified.
Illustratively, processor 12 passes through speech between terminal device and ID authentication device 1 receiving terminal device It, can be according to the user speech sample that the ID authentication device 1 prestores to the language to be identified after the voice to be identified that channel is sent Sound is analyzed, and determines whether the voice to be identified matches with the user speech sample, to complete authentication.If the processing Device 12 determines that the voice to be identified matches with the user speech sample, then it represents that authentication success, i.e., the terminal device can To access the ID authentication device 1;If the processor 12 determines that the voice to be identified and the user speech sample matches fail, Indicate authentication failure, i.e., the terminal device cannot access the ID authentication device 1.
Illustratively, processor 12 needs before carrying out authentication to voice to be identified in the ID authentication device 1 In advance by the corresponding user speech sample configuration of terminal device in processor 12, and the processor 12 is receiving preset use After the speech samples of family, vocal print feature is extracted from the user speech sample, and the user speech sample is constructed to the vocal print feature This sound-groove model, so that subsequent processor 12 carries out voiceprint using the sound-groove model.
Further, in order to improve the safety of user's voiceprint, ID authentication device 1 is by by terminal device and identity Mode that the user's communication vocal print that speech channel between authenticating device 1 is conveyed is combined with conversational speech content verifies user Legitimacy.
Specifically, above-mentioned processor 12 is whole by the speech channel reception between terminal device and ID authentication device 1 The voice to be identified that end equipment is sent, and authentication is carried out to voice to be identified and is specifically used for: by terminal device and identity Speech channel between authenticating device feeds back the voice packet comprising speech verification information to terminal device.
Illustratively, above-mentioned voice packet is used for so that terminal device, which will collect user, carries out language to speech verification information Voice feedback to be identified after sound verifying is to ID authentication device 1.And above-mentioned speech verification information can be authentication and set Standby 1 request user carries out the speech prompt information of speech verification.Above-mentioned voice to be identified can be user in the voice packet The speech verification information of carrying carries out speech verification and the voice that generates.Exemplary, above-mentioned speech verification information is to need to use Verifying voice that family is read aloud needs user to answer the verifying voice of stochastic problem.
Illustratively, processor 12 is after sending the voice packet comprising speech verification information to terminal device, so that user The voice prompting that can be received according to terminal device, reads aloud or answers stochastic problem, and terminal device will by speech channel The voice to be identified of the answer of voice messaging or answer stochastic problem that user reads aloud is sent to the processing of ID authentication device 1 Device 12.And the processor 12 of the ID authentication device 1 is after receiving the voice to be identified, can wait for identifying in voice from this and mentions Take out the voice content text in user's vocal print A and the voice to be identified, the user's vocal print A that then will acquire be stored in advance The corresponding user's vocal print B of user speech sample match, and the voice content text of the voice to be identified is verified. If the voice content text authentication success of user's vocal print A and user's vocal print B successful match and the voice to be identified, determines identity It authenticates successfully, if it fails to match or the voice content text authentication of the voice to be identified fails by user's vocal print A and user's vocal print B, Then determine that authentication fails.
Optionally, as shown in Figure 1, the ID authentication device 1 further include: memory 13, in which:
Memory 13, for storing the call number for the terminal device for having call authority to ID authentication device 1.
Whether processor 12 has the call authority of ID authentication device 1 in the call number for determining terminal device, specifically For: the terminal for having call authority to ID authentication device 1 that will be stored in the call number of terminal device and memory 13 The call number of equipment is matched, and determines whether the call number of terminal device has the call authority of ID authentication device.
Specifically, when being stored in the call number and memory 13 that processor 12 determines the terminal device to authentication The call number that equipment 1 has the terminal device of call authority is mutually matched, then shows that the call number of terminal device has body The call authority of part authenticating device 1;If processor 12 determine terminal device call number and memory 13 in store to body The call number that part authenticating device 1 has the terminal device of call authority mismatches, then shows the call number of terminal device not The call authority for having ID authentication device 1.
Optionally, in order to enhance the safety for accessing ID authentication device 1, the embodiment of the present invention can be according to terminal device The permission of ID authentication device 1 that has of call number, terminal device is divided into premium terminals equipment and low-level terminals The terminal device that call number can be had the super-ordinate right of ID authentication device 1 by equipment, the i.e. embodiment of the present invention is known as height Grade terminal device, is known as low-level terminals equipment for the terminal device that call number has the common permission of the ID authentication device 1. Wherein, the equipment power that above-mentioned premium terminals equipment can be used for controlling low-level terminals equipment interconnect with ID authentication device 1 Limit, equipment operation instruction etc. are associated management with low-level terminals equipment, meanwhile, above-mentioned premium terminals equipment can be also used for Establish sensitive operation scene, the rudimentary permission user of creation, sensitive operation examination & approval, user authority management etc..
Specifically, if the call number of the terminal device has super-ordinate right (i.e. terminal device of ID authentication device 1 For premium terminals equipment), and when the terminal device has passed through authentication, which is also used to:
The first authority distribution request that receiving terminal apparatus is sent, first authority distribution are requested for setting for target terminal The call authority of standby call number request ID authentication device, first authority distribution request includes setting for target terminal equipment Standby information, the call number of above-mentioned target terminal equipment have the common permission of ID authentication device, i.e., above-mentioned target is whole End equipment is low-level terminals equipment;
By in the call authority list of the call number typing ID authentication device of target terminal equipment, which is arranged Table includes the facility information for having the terminal device of call authority to ID authentication device.
Illustratively, premium terminals equipment is to be configured with advanced end when carrying out initial configuration to ID authentication device 1 The facility information of the facility information of end equipment, the premium terminals equipment includes but is not limited to: the account of premium terminals equipment, close Code, call number etc..And premium terminals equipment is after through authentication, can be the authentication of low-level terminals device request The access authority of equipment so that low-level terminals equipment has the call authority for calling the ID authentication device, and then carries out Authentication.Premium terminals equipment can limit the terminal device for accessing the ID authentication device 1 in this way, to improve The safety of the ID authentication device.
Optionally, as shown in Fig. 2, the ID authentication device 1 is in communication with each other at least one electronic equipment, illustratively, If the ID authentication device 1 can be intelligent domestic gateway or other and the intelligent family in family by taking home Intranet as an example The electronic equipment of electricity interconnection, above-mentioned electronic equipment can be the intelligent family such as intelligent air condition, intelligent refrigerator, dust catcher, water heater The electronics such as the intelligent security guards such as electric equipment and monitoring camera, intelligent door lock equipment and smart phone, tablet computer, sound equipment are set It is standby, and the ID authentication device 1 can be above-mentioned any electronic equipment.
When ID authentication device and at least one electronic equipment are in communication with each other, if the call number of terminal device have it is described The super-ordinate right of ID authentication device and when having passed through authentication,
Processor 12, is specifically also used to: receiving the second authority distribution request that above-mentioned terminal device is sent, the second permission point It requests to include target for distributing the access authority of target electronic device, second authority distribution for target terminal equipment with request The functional parameter of electronic equipment;The call number of the target terminal equipment has the common permission of ID authentication device, i.e., above-mentioned Target terminal equipment be low-level terminals equipment;
According to the permission for being designated as target terminal equipment distribution target electronic device of the second authority distribution request.
Illustratively, the device parameter of above-mentioned target electronic device can be the device identification of target electronic device, product Model etc..The functional parameter of the objective function of target electronic device can be the corresponding operational order of the objective function, for example, with For home Intranet, the device parameter of target electronic device can be the model of television set, brand of television set etc., target The functional parameter of the objective function of electronic equipment can be on or off the corresponding operational order of electronic equipment, be also possible to adjust The corresponding operational order of high television sound volume.
Illustratively, if by taking home Intranet as an example, the ID authentication device 1 can for intelligent domestic gateway or other With the electronic equipment of the intelligent appliance interconnection in family, the terminal device of owner's control (can be set as premium terminals equipment, have most Advanced access authority) it can be distributed inside the home network for the terminal device (low-level terminals equipment can be set as) of guest's control In have identity authentication function electronic equipment access authority.
For example, if the terminal device of owner's control is to smart home when the ID authentication device 1 is intelligent domestic gateway When gateway carries out initial configuration, the call number of its own can be added in the call authority list of the intelligent domestic gateway, It, can be by dialing the intelligent domestic gateway in this way when the terminal device of owner control needs to log in the intelligent domestic gateway Built-in SIM card carries out voice identification authentication, and after authenticating successfully, the terminal device of owner control can access the smart home Gateway, and the household appliance in home network is distributed (i.e. and intelligence by the terminal device that the ID authentication device is guest's control Can the connected household appliance of home gateway or terminal device) access authority and control authority.
Optionally, as shown in Fig. 2, when the ID authentication device 1 and at least one electronic equipment are in communication with each other, the processor It is also used to:
When detecting that any terminal equipment triggers the high risk operation of any electronic equipment of at least one electronic equipment, Then have to call number the super-ordinate right of ID authentication device terminal device send examination & approval instruction, the examination & approval instruction for Whether the terminal device inquiry that call number has the super-ordinate right of ID authentication device 1 is that any terminal equipment authorizes high risk The operating right of operation;Receive the response that the terminal device for the super-ordinate right that the call number has ID authentication device 1 is sent Information, and information determines whether to examine the operating right that any terminal equipment operates high risk according to response.
Illustratively, above-mentioned high risk operation can be to be related to the operation of privacy information, for example, low-level terminals equipment is thought The operation for being equipped with the room of security protection door is opened, or closes the operation of intelligent video camera head.Exemplary, ID authentication device 1 exists It can be sent by short message mode when sending examination & approval instruction to premium terminals equipment.
It should be noted that the premium terminals equipment for having examination & approval ability in the embodiment of the present invention can configure one or It is multiple, and ID authentication device 1 can also be sent out when sending examination & approval instruction to premium terminals equipment to partial lower terminal device It submits to a higher level for approval or revision and criticizes instruction, here and without limitation.The embodiment of the present invention can be by the method for more people's containing to sensitive operation in this way Use controlled, to reduce operational risk.
ID authentication device provided in an embodiment of the present invention based on SIM card, the equipment include wireless communication module and place Manage device, wherein built-in SIM card in the wireless communication module, wherein the SIM card provides call number for the ID authentication device, The wireless communication module is used for the call request that receiving terminal apparatus is initiated, and processor is for determining that wireless communication module is received Whether the call number of terminal device has the call authority of ID authentication device, and wireless communication module is also used to sentence in processor When the call number for determining terminal device has the call authority of ID authentication device, speech channel foundation is sent to terminal device and is referred to It enables, processor is also used to send by the speech channel reception terminal device between terminal device and ID authentication device to be identified Voice, and authentication is carried out to voice to be identified.In this way, the SIM card provides call number for the ID authentication device, so that The ID authentication device can establish speech channel based on the wireless communication module of built-in SIM card, so that user information is not It is easily stolen by hacker, improves the safety of authentication procedures, further such that user information is protected.
It will be described below based on the function of each functional module in the ID authentication device shown in fig. 1 or fig. 2 based on SIM card And other associated descriptions, the identity identifying method provided in an embodiment of the present invention based on SIM card is introduced.Implement below The explanation of technical term relevant to above-described embodiment, concept etc. is referred to the above embodiments in example, and which is not described herein again.
The embodiment of the present invention provides a kind of identity identifying method based on SIM card, which includes built-in The wireless communication module of SIM card, which provides call number for the ID authentication device, as shown in figure 3, this method includes Following steps:
201, the call request that module receiving terminal apparatus is initiated by wireless communication.
Wherein, above-mentioned call request includes the call number of terminal device.
202, when the call number for determining terminal device has the call authority of ID authentication device, then pass through channel radio Believe that module sends speech channel to terminal device and establishes instruction.
Wherein, the instruction of above-mentioned speech Path Setup is used to indicate terminal device and establishes terminal device and ID authentication device Between speech channel.
Illustratively, before step 202, ID authentication device needs to determine whether the call number of the terminal device has The call authority of standby ID authentication device, specifically, ID authentication device determines whether the call number of the terminal device has The determination method of the call authority of ID authentication device can be realized by following content:
202a, has call authority to ID authentication device for what is stored in the call number of terminal device and memory The call number of terminal device is matched, and determines whether the call number of terminal device has the calling privilege of ID authentication device Limit.
203, the language to be identified sent by the speech channel reception terminal device between terminal device and ID authentication device Sound, and authentication is carried out to voice to be identified.
Optionally, in order to improve the safety of user's voiceprint, ID authentication device is by by terminal device and identity Mode that the user's communication vocal print that speech channel between authenticating device is conveyed is combined with conversational speech content verifies user Legitimacy, specifically, step 203 specifically comprises the following steps:
The verification information that A1, receiving terminal apparatus are sent to ID authentication device.
Wherein, above-mentioned speech verification information be used for so that terminal device will collect user to the speech verification information into Generated voice feedback to be identified is to ID authentication device after row speech verification.Illustratively, above-mentioned verification information can be with Speech verification information, which, which can carry, passes through the terminal device and the ID authentication device in the terminal device Between voice channel send voice packet in;Above-mentioned verification information can be identifying code, which can be the terminal and set What the standby data channel by between the terminal device and the intelligent domestic gateway was sent.
Illustratively, referring to authentication process schematic diagram shown in Fig. 4 it is found that if the identity in the embodiment of the present invention is recognized Card equipment is equipped with the home network by taking intelligent domestic gateway as an example, and in the terminal device and corresponds to intelligent home control system Application program (English: Application, referred to as: APP) when, which carries out the identifying procedure of authentication such as Shown in lower:
1) terminal device inputs speech samples, intelligent domestic gateway benefit to intelligent domestic gateway by the way of making a phone call With the vocal print feature sequence construct sound-groove model extracted from user speech sample, recognize to carry out identity in the next steps Card.
2) user is logged in by the APP that the intelligent domestic gateway installed on terminal device corresponds to intelligent home control system and is somebody's turn to do When the administration interface of intelligent home control system, user can directly be dialed in intelligent domestic gateway built-in by terminal device The call number of SIM card, after establishing speech channel between terminal device and intelligent domestic gateway, which can show dynamic Identifying code is fed back at this point, user is read aloud speech samples caused by the dynamic verification code by terminal device by speech channel Intelligent domestic gateway.
3) intelligent domestic gateway will carry out Application on Voiceprint Recognition to the speech samples, simultaneously after receiving the speech samples Whether the voice content that the speech samples can be verified automatically matches with the identifying code, steals authentication information to prevent hacker and steps on by force Record.If the double authentication faileds of above-mentioned vocal print+voice content, terminal device can be again built in calling intelligent home gateway The call number of SIM card carries out authentication.In addition, system can also be according to the situation of user speech authentication, suitably The sound-groove model for updating or adjusting user, to improve the reliability of authentication.
Optionally, in order to enhance the safety for accessing ID authentication device 1, the embodiment of the present invention can be according to terminal device The permission of ID authentication device that has of call number, terminal device is divided into premium terminals equipment and low-level terminals are set Standby, i.e. the terminal device of the super-ordinate right that call number can be had to ID authentication device of the embodiment of the present invention is known as advanced end The terminal device that call number has the common permission of the ID authentication device is known as low-level terminals equipment by end equipment.Wherein, Equipment permission, the equipment with ID authentication device interconnection that above-mentioned premium terminals equipment can be used for controlling low-level terminals equipment Operational order etc. is associated management with low-level terminals equipment, meanwhile, above-mentioned premium terminals equipment can be also used for establishing quick Feel operation scenario, the rudimentary permission user of creation, sensitive operation examination & approval, user authority management etc..
Illustratively, if the call number of the terminal device has the super-ordinate right of the ID authentication device, and institute When stating terminal device and having passed through authentication, this method further includes following steps:
The first authority distribution request that B1, receiving terminal apparatus are sent.
Wherein, the first above-mentioned authority distribution request for the call number of target terminal equipment for requesting the identity to be recognized The call authority of equipment is demonstrate,proved, first authority distribution request includes the facility information of target terminal equipment, the target terminal equipment Call number have the common permission of ID authentication device;
B2, will be in the call authority list of the call number typing ID authentication device of target terminal equipment.
Wherein, above-mentioned call authority list includes having the equipment of the terminal device of call authority to ID authentication device Information.
Illustratively, when ID authentication device and at least one electronic equipment are in communication with each other, and the ringing number of terminal device When code has the super-ordinate right of ID authentication device and has passed through authentication, this method further include:
C1, the second authority distribution request for receiving terminal device transmission.
Wherein, the second above-mentioned authority distribution request is for distributing the target function of target electronic device for target terminal equipment The corresponding operating right of energy, second authority distribution request includes the functional parameter of the objective function of target electronic device, above-mentioned The call number of target terminal equipment have the common permission of ID authentication device;
C2, the objective function for being designated as target terminal equipment distribution target electronic device according to the request of the second authority distribution Corresponding operating right.
Illustratively, if the ID authentication device in the embodiment of the present invention is by taking intelligent domestic gateway as an example, and the terminal is set When the intelligent domestic gateway being installed in standby corresponding to the APP of intelligent home control system, low-level terminals equipment referring to Figure 5 Authority distribution flow diagram, the authority distribution process of the low-level terminals equipment is as follows:
1) intelligent domestic gateway carries out initial configuration, and configuration has user's (i.e. premium terminals equipment) letter of super-ordinate right The permission that breath (including account name, login password, cell-phone number, user's vocal print sample) and super-ordinate right user have, example Such as, have establish sensitive operation scene, creation equity stock limits the use of family, sensitive operation examination & approval, user authority management and long-range household Control authority.
2) super-ordinate right user is visited by the APP that the intelligent domestic gateway that mobile phone is installed corresponds to intelligent home control system It asks the intelligent domestic gateway corresponding intelligent home control system, SIM built-in in the intelligent domestic gateway is dialed by mobile phone Card number, the intelligent home control system show intelligent domestic gateway dynamic verification code generated, and user inputs account, close Code, and verification code information is read by mobile phone.
3) intelligent domestic gateway carries out the double verifyings of vocal print+voice content to the voice of user, and whether identification user is legal User is accessed, is verified, is successfully logged in the administration interface of the corresponding intelligent home control system of the intelligent domestic gateway, test Card failure then reports an error.
4) super-ordinate right user executes the operation for creating equity stock limit user account (low-level terminals equipment), and typing is general Logical permission user information, including account name, login password, cell-phone number, user's vocal print sample etc..
5) after creating user, the corresponding permission of the user is assigned, for example, specific intelligence house control system manages portal dish The operating right of the specific operation of single operating right or the smart home device that can be managed.
6) operational order control is carried out to the smart home device of authorization, limiting the ordinary user can be to smart home device The instruction of operation.
Illustratively, by the risk of the various control functions to the electronic equipment being connect with ID authentication device into The high risk operation of electronic equipment is selected in row assessment, when low-level terminals equipment triggers the operation of these high risks, premium terminals The equipment property of can choose is the operating right that low-level terminals equipment authorizes the sensitive operation, to reinforce the pipe of sensitive operation Control, specifically, this method further include:
D1, when detect any terminal equipment trigger any electronic equipment of at least one electronic equipment high risk operation When, then the terminal device for having the super-ordinate right of ID authentication device to call number sends examination & approval instruction, and examination & approval instruction is used Whether inquire in the terminal device for the super-ordinate right for having ID authentication device to call number is that any terminal equipment authorizes this The operating right of high risk operation.
The response letter that D2, the terminal device for receiving the super-ordinate right that call number has the ID authentication device are sent Breath, and the operating right that examination & approval any terminal equipment operates high risk is determined whether according to the response message.
Illustratively, if the ID authentication device in the embodiment of the present invention is by taking intelligent domestic gateway as an example, and the rudimentary end When being equipped with the intelligent domestic gateway in end equipment and corresponding to the APP of intelligent home control system, referring to low-level terminals shown in fig. 6 Equipment accesses the browsing process figure of high risk operation it is found that the browsing process of low-level terminals equipment access high risk operation is as follows It is shown:
1) equity stock limits the use of family (i.e. low-level terminals equipment) and is accessed by the intelligent home control system APP installed in mobile phone The management portal of the corresponding intelligent home control system of the intelligent domestic gateway, the intelligent home control system show the intelligence man Occupy gateway dynamic verification code generated, user inputs account, password, and built in dialing in the intelligent domestic gateway by mobile phone SIM card number, read verification code information online.
2) intelligent domestic gateway carries out the double verifyings of vocal print+voice content to the voice of user, and whether identification user is legal User is accessed, is verified, is successfully logged in the administration interface of the corresponding intelligent home control system of the intelligent domestic gateway, test Card failure then reports an error.
3) ordinary user accesses the operable related service of administration interface of the intelligent home control system, including inquiry is awarded Weigh equipment access situation, the smart home device of long-range control authorization, home equipment information of monitoring authorization etc..
4) intelligent domestic gateway judges whether user's operation is that (i.e. whether the user's operation is high risk behaviour to sensitive operation Make), it if it is sensitive operation, will send short messages to specified approver (such as premium terminals equipment), and the reply of people waiting for approval; If not sensitive operation, control instruction will be directly transmitted to smart home device.
5) smart home device receives control instruction, and parses to control instruction, executes the control instruction.
Identity identifying method provided in an embodiment of the present invention based on SIM card, the ID authentication device include built-in SIM card Wireless communication module, by the wireless communication module receiving terminal apparatus initiate call request, then when determine terminal set When standby call number has the call authority of ID authentication device, is then sent and talked about to terminal device by the wireless communication module Sound Path Setup instruction, finally by between terminal device and ID authentication device speech channel reception terminal device send to It identifies voice, and authentication is carried out to voice to be identified.In this way, the SIM card provides call number for the ID authentication device, The ID authentication device is enabled to establish speech channel based on the wireless communication module of built-in SIM card, so that user believes Breath is not easy to be stolen by hacker, the safety of authentication procedures is improved, further such that user information is protected.
It should be noted that during specific implementation, ID authentication device institute in above-mentioned method flow as shown in Figure 3 The computer that each step executed can execute the software form stored in memory by the processor of example, in hardware executes Instruction realizes that, to avoid repeating, details are not described herein again.And program corresponding to movement performed by above-mentioned ID authentication device is equal It can be stored in a software form in the memory of the ID authentication device, execute the above modules in order to which processor calls Corresponding operation.
Memory above may include volatile memory (volatile memory), such as random access memory Device (random-access memory, RAM);It also may include nonvolatile memory (non-volatile memory), example Such as read-only memory (read-only memory, ROM), flash memory (flash memory), hard disk (hard disk Drive, HDD) or solid state hard disk (solid-state drive, SSD);It can also include the combination of the memory of mentioned kind.
Processor in device presented above can be a processor, be also possible to the system of multiple processing elements Claim.For example, processor can be central processing unit (central processing unit, CPU;It may be other general places Manage device, digital signal processor (digital signal processing, DSP), specific integrated circuit (application Specific integrated circuit, ASIC), field programmable gate array (field-programmable gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hardware components etc..It is logical It can be microprocessor with processor or the processor be also possible to any conventional processor etc.;It can also be dedicated processes Device, the application specific processor may include at least one of baseband processing chip, radio frequency processing chip etc..
It is apparent to those skilled in the art that for convenience and simplicity of description, the device of foregoing description It with the specific work process of module, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In several embodiments provided herein, it should be understood that disclosed ID authentication device and method, it can To realize by another way.For example, ID authentication device embodiment described above is only schematical, for example, The division of the module, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple Module or component can be combined or can be integrated into another system, or some features can be ignored or not executed.It is another Point, shown or discussed mutual coupling, direct-coupling or communication connection can be through some interfaces, device or The indirect coupling or communication connection of unit can be electrical property, mechanical or other forms.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that the independent physics of each unit includes, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
Finally, it should be noted that the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although Present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: it still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features; And these are modified or replaceed, technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution spirit and Range.

Claims (10)

1. a kind of ID authentication device based on SIM card, which is characterized in that the ID authentication device includes: radio communication mold Block and processor, built-in SIM card in the wireless communication module, the SIM card provide ringing number for the ID authentication device Code, in which:
The wireless communication module, for the call request that receiving terminal apparatus is initiated, the call request includes terminal device Call number;
The processor, for determining whether the call number of the received terminal device of the wireless communication module has institute State the call authority of ID authentication device;
The wireless communication module is also used to determine that the call number of the terminal device has the identity in the processor When the call authority of authenticating device, Xiang Suoshu terminal device sends speech channel and establishes instruction, and the speech channel establishes instruction It is used to indicate the speech channel that the terminal device is established between the terminal device and the ID authentication device;
The processor is also used to by whole described in the speech channel reception between the terminal device and the ID authentication device The voice to be identified that end equipment is sent, and authentication is carried out to the voice to be identified.
2. equipment according to claim 1, which is characterized in that the ID authentication device, further includes: memory, in which:
The memory, for storing the call number for the terminal device for having call authority to the ID authentication device;
Whether the processor has the call authority of the ID authentication device in the call number for determining the terminal device When be specifically used for: have what is stored in the call number of the terminal device and the memory to the ID authentication device The call number of the terminal device of call authority is matched, and determines whether the call number of the terminal device has the body The call authority of part authenticating device.
3. equipment according to claim 1, which is characterized in that if the call number of the terminal device has the identity The super-ordinate right of authenticating device, and when the terminal device has passed through authentication, the processor is also used to:
The first authority distribution request that the terminal device is sent is received, the first authority distribution request is for being target terminal The call number of equipment requests the call authority of the ID authentication device, the facility information including the target terminal equipment, The call number of the target terminal equipment has the common permission of the ID authentication device;
By in the call authority list of ID authentication device described in the call number typing of the target terminal equipment, the calling Permissions list includes the facility information for the terminal device for having call authority to the ID authentication device.
4. equipment according to claim 1, which is characterized in that the ID authentication device and at least one electronic equipment phase Mutual communication, if the call number of the terminal device has the super-ordinate right of the ID authentication device and passed through authentication When, the processor is also used to:
The second authority distribution request that the terminal device is sent is received, the second authority distribution request is for being target terminal Equipment distributes the corresponding operating right of objective function of target electronic device, the objective function including the target electronic device The call number of functional parameter, the target terminal equipment has the common permission of the ID authentication device;
The mesh for being designated as the target terminal equipment and distributing the target electronic device requested according to second authority distribution Mark the corresponding operating right of function.
5. equipment according to claim 1 or 4, which is characterized in that when the ID authentication device and at least one electronics Equipment is in communication with each other, and the processor is also used to:
When detecting that any terminal equipment triggers the high risk operation of any electronic equipment of at least one electronic equipment, The terminal device for then having the super-ordinate right of the ID authentication device to call number sends examination & approval instruction, the examination & approval instruction It whether is described any for having the inquiry of the terminal device of the super-ordinate right of the ID authentication device to the call number Terminal device authorizes the operating right of the high risk operation;
The response message that the terminal device for the super-ordinate right that the call number has the ID authentication device is sent is received, and Determine whether to examine the operating right that any terminal equipment operates the high risk according to the response message.
6. a kind of identity identifying method based on SIM card, which is characterized in that be applied to ID authentication device, the authentication Equipment includes the wireless communication module of built-in SIM card, and the SIM card provides call number for the ID authentication device, described Method includes:
The call request initiated by the wireless communication module receiving terminal apparatus, the call request includes terminal device Call number;
When the call number for determining the received terminal device of wireless communication module has the ID authentication device When call authority, then speech channel is sent to the terminal device by the wireless communication module and establish instruction, the speech It is logical that Path Setup instruction is used to indicate the speech that the terminal device is established between the terminal device and the ID authentication device Road;
By the transmission of terminal device described in the speech channel reception between the terminal device and the ID authentication device wait know Other voice, and authentication is carried out to the voice to be identified.
7. according to the method described in claim 6, it is characterized in that, described when the call number for determining the terminal device has When the call authority of the ID authentication device, then speech channel is sent to the terminal device by the wireless communication module It establishes before instruction, the method also includes:
Has call authority to the ID authentication device for what is stored in the call number of the terminal device and memory The call number of terminal device is matched, and determines whether the call number of the terminal device has the ID authentication device Call authority.
8. according to the method described in claim 6, it is characterized in that, if the call number of the terminal device has the identity The super-ordinate right of authenticating device, and when the terminal device has passed through authentication, the method also includes:
The first authority distribution request that the terminal device is sent is received, the first authority distribution request is for being target terminal The call number of equipment requests the call authority of the ID authentication device, the facility information including the target terminal equipment, The call number of the target terminal equipment has the common permission of the ID authentication device;
By in the call authority list of ID authentication device described in the call number typing of the target terminal equipment, the calling Permissions list includes the facility information for the terminal device for having call authority to the ID authentication device.
9. according to the method described in claim 6, it is characterized in that, when the ID authentication device and at least one electronic equipment It is in communication with each other, and the call number of the terminal device has the super-ordinate right of the ID authentication device and recognized by identity When card, the method also includes:
The second authority distribution request that the terminal device is sent is received, the second authority distribution request is for being target terminal Equipment distributes the corresponding operating right of objective function of target electronic device, the objective function including the target electronic device The call number of functional parameter, the target terminal equipment has the common permission of the ID authentication device;
The mesh for being designated as the target terminal equipment and distributing the target electronic device requested according to second authority distribution Mark the corresponding operating right of function.
10. method according to claim 6 or 9, which is characterized in that when the ID authentication device and at least one electronics Equipment is in communication with each other, the method also includes:
When detecting that any terminal equipment triggers the high risk operation of any electronic equipment of at least one electronic equipment, The terminal device for then having the super-ordinate right of the ID authentication device to the call number sends examination & approval instruction, the examination & approval Instruction is for having whether the inquiry of the terminal device of the super-ordinate right of the ID authentication device is described to the call number Any terminal equipment authorizes the operating right of the high risk operation;
The response message that the terminal device for the super-ordinate right that the call number has the ID authentication device is sent is received, and Determine whether to examine the operating right that any terminal equipment operates the high risk according to the response message.
CN201610922170.4A 2016-10-21 2016-10-21 A kind of identity identifying method and equipment based on SIM card Active CN107979468B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610922170.4A CN107979468B (en) 2016-10-21 2016-10-21 A kind of identity identifying method and equipment based on SIM card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610922170.4A CN107979468B (en) 2016-10-21 2016-10-21 A kind of identity identifying method and equipment based on SIM card

Publications (2)

Publication Number Publication Date
CN107979468A CN107979468A (en) 2018-05-01
CN107979468B true CN107979468B (en) 2019-06-25

Family

ID=62004720

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610922170.4A Active CN107979468B (en) 2016-10-21 2016-10-21 A kind of identity identifying method and equipment based on SIM card

Country Status (1)

Country Link
CN (1) CN107979468B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110113357B (en) * 2019-05-23 2022-11-15 五竹科技(北京)有限公司 Method for authenticating identity of outbound robot and providing certification information

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101056343A (en) * 2007-06-19 2007-10-17 华为技术有限公司 Method and call terminal for multiple users to use the same call terminal
CN101771967A (en) * 2008-12-31 2010-07-07 华为终端有限公司 Method for transmitting and forwarding short message, terminal, access gateway and short message system
CN105610807A (en) * 2015-12-23 2016-05-25 北京握奇智能科技有限公司 Network identity authentication device and authentication method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102007028640A1 (en) * 2007-06-21 2008-12-24 Siemens Enterprise Communications Gmbh & Co. Kg Method, terminal and voice memory for storing voice messages in a communication network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101056343A (en) * 2007-06-19 2007-10-17 华为技术有限公司 Method and call terminal for multiple users to use the same call terminal
CN101771967A (en) * 2008-12-31 2010-07-07 华为终端有限公司 Method for transmitting and forwarding short message, terminal, access gateway and short message system
CN105610807A (en) * 2015-12-23 2016-05-25 北京握奇智能科技有限公司 Network identity authentication device and authentication method

Also Published As

Publication number Publication date
CN107979468A (en) 2018-05-01

Similar Documents

Publication Publication Date Title
US9621556B2 (en) System and method for implementing a two-person access rule using mobile devices
US10219154B1 (en) Frictionless or near-frictionless 3 factor user authentication method and system by use of triad network
CN104052775B (en) Right management method, device and the system of a kind of cloud platform service
WO2015035895A1 (en) Methods, devices, and systems for account login
EP2579220A1 (en) Entrance guard control method and system thereof
KR101451359B1 (en) User account recovery
US11388159B2 (en) Variable-step authentication for communications in controlled environment
CN105259771A (en) Authentication method and associated device
US9992330B1 (en) Conference functionality between inmates and multiple approved parties in controlled environment
CN109413362A (en) A kind of call voice access video-meeting method and device
CN109407528A (en) Safety access method, device, server and storage medium
US20240155050A1 (en) Privileged electronic communications with inmates
Young et al. BadVoice: Soundless voice-control replay attack on modern smartphones
CN106385397B (en) Method and device for access control and type configuration of network access equipment
CN106411811A (en) Authentication method, system and device of accessing customer service
CN110895844A (en) Interaction method and device of intelligent door equipment, computer equipment and storage medium
CN107979468B (en) A kind of identity identifying method and equipment based on SIM card
KR101831381B1 (en) Method of smart login using messenger service and device thereof
KR101133167B1 (en) Method and apparatus for user verifing process with enhanced security
CN110264602A (en) A kind of unlocking system, method, terminal device and door lock service device
EP3864878B1 (en) Method for accessing data or a service from a first user device and corresponding second user device, server and system
CN110784447A (en) Method for realizing non-perception authentication across protocols
CN110061956A (en) A kind of processing method and system improving user's online experience
CN110545225B (en) Local and internet equipment authentication and authorization method
CN116962998A (en) Verification information sending method, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant