CN110474902B - Account binding method, system, computing device and medium - Google Patents

Account binding method, system, computing device and medium Download PDF

Info

Publication number
CN110474902B
CN110474902B CN201910751767.0A CN201910751767A CN110474902B CN 110474902 B CN110474902 B CN 110474902B CN 201910751767 A CN201910751767 A CN 201910751767A CN 110474902 B CN110474902 B CN 110474902B
Authority
CN
China
Prior art keywords
binding
information
account
audio
bound
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910751767.0A
Other languages
Chinese (zh)
Other versions
CN110474902A (en
Inventor
朱金美
罗涛
李峰
施佳子
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN201910751767.0A priority Critical patent/CN110474902B/en
Publication of CN110474902A publication Critical patent/CN110474902A/en
Application granted granted Critical
Publication of CN110474902B publication Critical patent/CN110474902B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/02Preprocessing operations, e.g. segment selection; Pattern representation or modelling, e.g. based on linear discriminant analysis [LDA] or principal components; Feature selection or extraction
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/22Interactive procedures; Man-machine interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computer Hardware Design (AREA)
  • Strategic Management (AREA)
  • Human Computer Interaction (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • General Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Finance (AREA)
  • Software Systems (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present disclosure provides a method of account binding performed by a server, comprising: receiving a binding request from a first terminal device; checking the binding request; determining first binding information and first binding audio under the condition that the binding request passes the verification; sending the first binding audio to the first terminal equipment so that the first terminal equipment sends the second binding audio to the second terminal equipment according to the first binding audio; receiving second binding information from the second terminal equipment and identity information of a second account, and determining whether the second binding information is consistent with the first binding information; and under the condition that the second binding information is determined to be consistent with the first binding information, determining a second account according to the identity information of the second account, and binding the first account with the second account. The disclosure also provides a method for account binding executed by the terminal device, a system for account binding, a computing device and a medium.

Description

Account binding method, system, computing device and medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method, a system, a computing device, and a medium for account binding.
Background
In recent years, with the rapid development of artificial intelligence, smart speakers are also rapidly popularized as a carrier of artificial intelligence, and meanwhile, demands for consumption and the like based on smart speakers are increasing. The intelligent sound box is mainly oriented to the home user, so how to realize the binding of the intelligent sound box and the home user is the first step of meeting the requirements of the home user on consumption and the like.
Currently, the mainstream binding process of the smart sound box and the third party account is based on an OAuth (Open Authorization) protocol to complete an Authorization authentication process. The OAuth authorization main flow is as follows: the method comprises the steps that a smart sound box manufacturer App (Application) requests a third party account to log in an authorization page in a WebView mode, then a user inputs account information and a password in the third party account WebView to complete identity authentication and authorization, and after authorization, an Access Token is provided for the manufacturer App, so that the whole authentication process is completed. This authorization method has the following disadvantages:
(1) the user flow is cumbersome. The user needs to install the manufacturer App, then requests the third party account login authorization through the manufacturer App, and finally obtains the Access Token, and the whole process is long.
(2) And the potential safety hazard of information exists. The user needs to input the account and password information of the user in the manufacturer App, and the risk of user information leakage exists.
(3) One smart sound box device can only be bound with one user, and cannot authorize a plurality of users to use.
Disclosure of Invention
One aspect of the present disclosure provides a method of account binding performed by a server, comprising: receiving a binding request from a first terminal device, wherein the binding request is used for binding a first account with a second account; verifying the binding request; determining first binding information and first binding audio under the condition that the binding request passes the verification; sending the first bound audio to the first terminal equipment so that the first terminal equipment sends a second bound audio to second terminal equipment according to the first bound audio; receiving second binding information from the second terminal equipment and identity information of a second account, and determining whether the second binding information is consistent with the first binding information; and under the condition that the second binding information is determined to be consistent with the first binding information, determining the second account according to the identity information of the second account, and binding the first account with the second account.
Optionally, the determining the first binding information includes: generating a set of random numbers; and determining the information segment and the frequency corresponding to each digit in the random number according to the preset corresponding relation among the digits, the information segments and the frequencies, combining the information segments to be used as first binding information, and synthesizing the frequencies to be used as first binding audio.
Optionally, the binding request includes a device identifier and an audio instruction of the first terminal device; the verifying the binding request comprises: determining a first account bound with the equipment identifier of the first terminal equipment according to the equipment identifier of the first terminal equipment; determining whether the voiceprint characteristics of the audio instruction are consistent with the prestored voiceprint characteristics of the first account; and if the voiceprint feature of the audio instruction is determined to be consistent with the voiceprint feature of the pre-stored first account, the binding request passes the verification.
Optionally, the binding the first account with the second account comprises: and establishing a binding relationship among the second account, the first account and the first terminal equipment.
Optionally, the method further comprises: acquiring configuration information, wherein the configuration information comprises one or more of consumption limit information, account authority information, payment mode information and operation reminding information; and configuring the second account according to the configuration information.
Another aspect of the present disclosure provides a method of account binding performed by a terminal device, including: receiving second bound audio from the first terminal device; obtaining second binding information by analyzing the second binding audio; acquiring identity information of a second account; and sending the second binding information and the identity information of the second account to a server.
Another aspect of the present disclosure provides a system for account binding, comprising:
the server is used for receiving a binding request from the first terminal equipment, and the binding request is used for binding the first account with the second account; verifying the binding request; determining first binding information and first binding audio under the condition that the binding request passes the verification; sending the first bound audio to the first terminal equipment so that the first terminal equipment sends a second bound audio to second terminal equipment according to the first bound audio; receiving second binding information from the second terminal equipment and identity information of a second account, and determining whether the second binding information is consistent with the first binding information; and under the condition that the second binding information is determined to be consistent with the first binding information, determining the second account according to the identity information of the second account, and binding the first account with the second account.
The first terminal equipment is used for sending a binding request to the server; and receiving the first bound audio, and sending a second bound audio to a second terminal device according to the first bound audio. And
the second terminal equipment is used for receiving the second bound audio from the first terminal equipment; obtaining second binding information by analyzing the second binding audio; acquiring identity information of a second account; and sending the second binding information and the identity information of the second account to a server.
Optionally, the server is further configured to: generating a set of random numbers; determining an information segment and a frequency corresponding to each digit in the random digits according to a preset corresponding relation among the digits, the information segments and the frequencies; and combining the information segments to be used as first binding information, and synthesizing the frequency to be used as first binding audio.
Another aspect of the disclosure provides a computing device comprising: one or more processors; storage means for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method as described above.
Another aspect of the present disclosure provides a computer-readable storage medium storing computer-executable instructions for implementing the method as described above when executed.
Another aspect of the disclosure provides a computer program comprising computer executable instructions for implementing the method as described above when executed.
According to the embodiment of the disclosure, the first binding audio containing the first binding information is sent to the first terminal device, and then the first terminal device sends the second binding audio to the second terminal device according to the first binding audio, so that the second terminal device obtains the second binding information according to the second binding audio, and then whether the second binding information from the second terminal device is consistent with the first binding information or not is verified, and under the condition that the second binding information is consistent with the first binding information, the first account, the second account and the first terminal device are bound, the whole binding process is simpler and more convenient, and the security is higher. Meanwhile, through the method, the plurality of second accounts can be bound with the first account and the first terminal device, so that the problem that one intelligent sound box (the first terminal device) can only bind one user and cannot authorize the plurality of users is solved.
Drawings
For a more complete understanding of the present disclosure and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
FIG. 1 schematically illustrates an exemplary system architecture for a method applicable to account binding, in accordance with an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow diagram of a method of account binding performed by a server in accordance with an embodiment of the present disclosure;
fig. 3 schematically shows a flow chart of a method of account binding performed by a terminal device according to an embodiment of the present disclosure;
FIG. 4 schematically illustrates a flow diagram of a method of account binding performed by a server according to another embodiment of the present disclosure;
FIG. 5 schematically shows a block diagram of a server according to an embodiment of the disclosure;
fig. 6 schematically shows a block diagram of a first terminal device according to an embodiment of the present disclosure;
fig. 7 schematically shows a block diagram of a second terminal device according to an embodiment of the present disclosure; and
FIG. 8 schematically illustrates a block diagram of a computing device suitable for implementing a method according to an embodiment of the disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
Some block diagrams and/or flow diagrams are shown in the figures. It will be understood that some blocks of the block diagrams and/or flowchart illustrations, or combinations thereof, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the instructions, which execute via the processor, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks. The techniques of this disclosure may be implemented in hardware and/or software (including firmware, microcode, etc.). In addition, the techniques of this disclosure may take the form of a computer program product on a computer-readable storage medium having instructions stored thereon for use by or in connection with an instruction execution system.
The embodiment of the disclosure provides an account binding method, a server and a terminal device which can apply the method. The method includes receiving a binding request from a first terminal device, wherein the binding request is used to bind a first account with a second account. Then checking the binding request; in the case that the binding request passes the check, the first binding information is determined. Then, determining first binding audio according to the first binding information; and then the first bound audio is sent to the first terminal equipment, so that the first terminal equipment sends the second bound audio to the second terminal equipment according to the first bound audio. Next, second binding information from the second terminal device and identity information of the second account are received, and it is determined whether the second binding information is consistent with the first binding information. And under the condition that the second binding information is determined to be consistent with the first binding information, determining a second account according to the identity information of the second account, and binding the first account with the second account.
Fig. 1 schematically illustrates an exemplary system architecture of a method applicable to account binding according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of a scenario in which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, but does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the exemplary system 100 includes a first terminal device 101, a second terminal device 102, a server 103, a storage device 104, and a network 105. The network 105 is used to provide a medium of communication links between the first terminal device 101, the second terminal device 102, the server 103, and the storage device 104. Network 105 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The first terminal device 101 and the server 103 are connected via a network 105. The server 103 is connected to the second terminal apparatus 102 via the network 105. The storage device 104 is connected to the server 103 and the second terminal device 102, respectively. Information may be transmitted between the first terminal apparatus 101 and the second terminal apparatus 102 by an analog audio signal.
The first terminal device 101 is configured to collect audio information (e.g., voice information of a user) around the device and send the audio information to the server 103, and play the audio information sent from the server 103. The first terminal device 101 may be, for example, a smart speaker, and may also be other electronic devices capable of collecting audio information and playing audio information.
The second terminal apparatus 102 is configured to receive audio information played by the first terminal apparatus 101, perform processing such as analysis on the audio information, and send a processing result to the server 103 through the network 105. The second terminal device 102 may have various communication client applications installed thereon, such as an internet banking application, a shopping application, a web browser application, a search application, an instant messaging tool, a mailbox client, social platform software, etc. (just examples).
The second terminal device 102 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 103 is configured to receive data sent by the first terminal device 101 or the second terminal device 102, perform processing such as analysis on the data, and feed back a processing result (for example, obtaining or generating information or data according to a user request) to the first terminal device 101 or the second terminal device 102.
The storage device 104 is connected to the server 103 and is used for providing data storage service for the server 103. The storage device 104 may be, for example, a file server, a database server, or the like.
It should be understood that the number of first terminal devices, second terminal devices, servers, storage devices and networks in fig. 1 is merely illustrative. There may be any number of first terminal devices, second terminal devices, servers, storage devices, and networks, as desired for implementation.
Fig. 2 schematically shows a flow chart of a method of account binding performed by a server according to an embodiment of the present disclosure.
As shown in fig. 2, the method includes operations S210 to S270.
In operation S210, a binding request from a first terminal device is received.
According to an embodiment of the present disclosure, the first terminal apparatus 101 receives an audio instruction of the user, which is audio information including an instruction issued by the main user. The voice instruction and the device ID of the first terminal device 101 are then sent as a binding request to the server over the network 105 to request the server to bind the first account with the second account. The server 103 then receives the binding request sent by the first terminal device 101.
In operation S220, the binding request is checked.
According to an embodiment of the present disclosure, operation S220 may include, for example, searching, according to the device identifier in the binding request, a first account bound to the device identifier in the storage apparatus 104, then obtaining a voiceprint feature of the audio instruction by analyzing the audio instruction in the binding request, comparing the voiceprint feature with a voiceprint feature of the first account stored in the storage apparatus 104, if the voiceprint feature is consistent with the voiceprint feature of the first account stored in the storage apparatus 104, the binding request passes verification, otherwise, the binding request cannot pass verification.
In operation S230, in case that the binding request is verified, the first binding information and the first bound audio are determined.
According to an embodiment of the present disclosure, operation S230 may include, for example, generating a group of strings composed of random numbers when the binding request passes the verification, and using the group of strings as a group of information array subscripts corresponding to the binding information token. Then, by querying a "frequency-information" dictionary (for example, as shown in table 1), information segments and frequencies corresponding to each of the information array indices are obtained, and then the information segments are assembled into first binding information token1 according to the generation order of the array indices, and at the same time, the frequencies are assembled into a frequency array query arr according to the generation order of the array indices. And the subscript of the information array is greater than or equal to 0 and smaller than the length of the frequency-information dictionary. Generating a corresponding PCM (Pulse Code Modulation) audio sinvoice according to the frequency array ferqueArr, and synthesizing the audio sinvoice and a background audio prepared in advance into an audio unit voice by utilizing Fourier transform and inverse transform, namely a first bound audio.
TABLE 1
Frequency of Information segment Information array subscript
17000hz a 0
17100hz b 1
17200hz c 2
... ...
In operation S240, the first bound audio is transmitted to the first terminal device, so that the first terminal device transmits the second bound audio to the second terminal device according to the first bound audio.
According to the embodiment of the present disclosure, the server 103 transmits the audio unity voice to the first terminal apparatus 101 through the network 105, and then the first terminal apparatus 101 transmits the audio unity voice to the second terminal apparatus 102 by playing the audio unity voice.
It should be noted that the first bound audio is an audio unity received by the terminal device 101 from the server, and the second bound audio is an audio played by the terminal device 101 from the audio unity, both of which are audio unity in nature, but have different forms and contain the same sound frequency information.
Next, in operation S250, second binding information from the second terminal device and identity information of the second account are received, and it is determined whether the second binding information is consistent with the first binding information.
According to the embodiment of the present disclosure, after receiving the audio unity voice sent by the first terminal device 101, the second terminal device 102 determines the second binding information token2 according to the audio unity voice. The server then receives the second binding information token2 from the second terminal device 102 and the identity ID of the second account, and then determines whether the second binding information token2 is consistent with the information contained in the first binding information token 1.
In operation S260, in case that it is determined that the second binding information is identical to the first binding information, the second account is determined according to the identity information of the second account, and the first account is bound with the second account.
According to the embodiment of the present disclosure, operation S260 may include, for example, in a case that it is determined that the second binding information token2 is consistent with the first binding information token1, determining the second account according to the identity ID of the second account, and then establishing a binding relationship between the second account, the first account, and the first terminal device.
Optionally, after the first account is bound with the second account, a master-slave relationship between the first account and the second account may also be set. For example, in this embodiment, the first account is set as the primary account, and the second account is set as the sub-account of the first account.
Fig. 3 schematically shows a flow chart of a method of account binding performed by a terminal device according to an embodiment of the present disclosure.
As shown in fig. 3, the method includes operations S310 to S340.
In operation S310, second bound audio from the first terminal device is received.
According to the embodiment of the present disclosure, the first terminal device 101 plays the audio unity voice through the speaker. The second terminal device 102 then receives the audio unity voice.
In operation S320, second binding information is obtained by parsing the second binding audio.
According to the embodiment of the present disclosure, the operation S320 may include, for example, obtaining a frequency array corresponding to the audio through fast fourier transform FFT, discrete fourier transform DFT, discrete cosine transform DCT, and the like, then querying a "frequency-information" dictionary, and converting the frequencies in the audio unit into corresponding information segments according to the "frequency-information" dictionary, thereby obtaining the second binding information token 2.
Next, in operation S330, identity information of the second account is acquired.
According to an embodiment of the present disclosure, the identity information of the second account may be pre-stored in the first terminal device local memory. Thus, in operation S330, the identity information of the second account may be read by accessing the local storage of the first terminal device.
According to an embodiment of the present disclosure, the identity information of the second account may be, for example, an identity ID of the second account.
In operation S340, the second binding information and the identity information of the second account are sent to the server.
Operation S340 may, for example, include sending the second binding information token2 and the identity ID of the second account to the server 103 according to an embodiment of the present disclosure.
It should be noted that, in the embodiment of the present disclosure, the binding of one second account with the first account and the first terminal device is implemented, but those skilled in the art may understand that the second account may be multiple.
According to the embodiment of the disclosure, the server sends the audio (the first binding audio) carrying the token information (the first binding information) to the first terminal device, then the first terminal device transmits the audio carrying the token information to the second terminal device in a sound wave transmission mode, the second terminal device can obtain the token information by analyzing the audio, and then the server can be requested to complete the binding of the second account, the first account and the intelligent loudspeaker box by means of the token information, so that the whole binding process is simple, and the security is high.
Fig. 4 schematically illustrates a flow chart of a method of account binding performed by a server according to another embodiment of the present disclosure.
As shown in fig. 4, the method includes the following operations S410 to S420 in addition to the operations S210 to S260.
In operation S410, configuration information is acquired.
According to the embodiment of the disclosure, the configuration information may be input through voice, for example, a user sends out voice containing the configuration information, then the smart speaker receives the voice and sends the voice to the server, and the server analyzes the voice, so as to obtain the configuration information.
According to another embodiment of the disclosure, configuration options can be displayed to a user in a terminal device such as a smart phone, so that the user can select from the configuration options through operations such as touch control, and thus, the entry of configuration information is completed. Then the smart phone sends the configuration information to the server. And then the server receives the configuration information sent by the smart phone.
It should be noted that the above method for acquiring configuration information is only an example, and configuration information may also be acquired in other manners.
According to the embodiment of the disclosure, the configuration information includes at least one of consumption limit information, account authority information, payment mode information, operation reminding information, and the like.
In operation S420, the second account is configured according to the configuration information.
According to an embodiment of the present disclosure, in operation S420, for example, the authority, the amount, the payment method, and the operation reminding function of the second account may be set according to the configuration information.
Specifically, the setting of the authority of the second account according to the configuration information includes setting, according to the account authority information in the configuration information, an authority that the second account authorizes voiceprints of another person (i.e., whether the second account authorizes voiceprints of another person) and a payment authority (i.e., whether a payment operation can be performed), and recording the setting content in an authority setting list. It should be noted that the content of the above-mentioned right setting is only an example, and the disclosure is not limited to the specific content of the right setting.
The setting of the amount of the second account according to the configuration information comprises setting the second account as an amount limiting user according to the consumption amount limiting information in the configuration information, and setting a consumption amount threshold value for the second account. The quota user may be, for example, an elderly user. Because old people often have low vigilance in the transaction, in order to guarantee the security in the follow-up payment transaction, when the old people pay, if the amount reaches the threshold value set in advance, the payment authorization information is informed to the main account for authorization before payment.
The setting of the payment method of the second account according to the configuration information includes setting a payment method that can be used by the second account, such as WeChat payment, Payment, Bank card payment, and the like, according to the payment method in the configuration information. Optionally, when the payment mode is set as a bank card, which bank card is used in payment may be further set.
The setting of the operation reminding function of the second account according to the configuration information includes setting the operation reminding function of the second account according to the operation reminding information in the configuration information. The operation reminding information comprises operation types for triggering operation reminding and reminding contents corresponding to each operation type. When the second account executes the operation with the operation reminder, prompt information containing corresponding reminder content is generated to prompt the first account.
To facilitate understanding of the technical solutions of the embodiments of the present disclosure, the method shown in fig. 4 is further described below with reference to specific embodiments. It will be understood by those skilled in the art that the following descriptions are provided for purposes of illustration only and that the disclosed embodiments are not limited thereto.
Illustratively, in the following example, the server is a bank system server, the first terminal device is a smart speaker, the second terminal device is a smart phone, the smart phone is installed with a bank system client app, and the user logs in the second account on the bank system client app.
According to the embodiment of the disclosure, the intelligent sound box receives the request voice of the master user, and then sends the unique device id (identity identification number) of the intelligent sound box and the user request voice to the bank system server.
And the bank system server receives the user request voice sent by the intelligent sound box, and performs semantic analysis on the user request voice to obtain a corresponding text, namely the semantics of the user request voice. And judging whether the request of the user is an account binding request or not by carrying out consistency comparison with a preset text. If the request of the user is an account binding request, generating binding information token and binding information audio unity according to the unique device id of the intelligent sound box, storing the corresponding relation between the binding information token and the unique device id of the intelligent sound box into a storage unit of the storage device, and sending the binding information audio unity to the intelligent sound box.
And the intelligent sound box receives the binding information audio unity and then plays the binding information audio unity.
The smart phone monitors whether the audio frequency of the binding account exists or not, acquires the audio frequency which is played by the smart sound box and carries the binding information token in a recording mode to obtain the binding information audio frequency unity, acquires a frequency array corresponding to the audio frequency in a Fast Fourier Transform (FFT), Discrete Fourier Transform (DFT), Discrete Cosine Transform (DCT) and other modes, and then queries a frequency-information dictionary to acquire the corresponding binding information token 2. And then, the binding information token2 and the identity ID of the login user on the smart phone are sent to a bank system server to verify whether the master user is successfully bound.
The bank system server receives the binding information token2, checks whether the binding information token2 is consistent with the binding information token1 in the storage device, determines the sub-account according to the identity ID if the binding information token is consistent with the binding information token1 in the storage device, establishes the binding relationship between the main account, the sub-account and the first terminal device, and returns a message of successful binding to the smart phone. Otherwise, returning the binding identification message to the smart phone.
Then, the intelligent sound box receives the request voice requestVoice2 of the master user, and then sends the unique device id of the intelligent sound box and the user request voice2 to a bank system server.
The bank system server analyzes the request voice requestVoice2, judges whether the request voice is 'i want to authorize the sub-user', and if the request voice requestVoice2 is 'i want to authorize the sub-user', identifies whether the request voice requestVoice2 is from the master user. And if the request voice requestVoice2 comes from the master user, sending a prepared prompt voice 'please record the audio of the sub-user to be authorized' to the intelligent sound box.
The intelligent sound box plays the prompt voice to prompt the sub-user to input the voice. And then receiving the voice of the sub-user through the intelligent sound box, analyzing the voice of the sub-user to obtain voiceprint information, and storing the voiceprint information of the user to a voiceprint information storage unit in a storage device in a voiceprint id-user voiceprint format.
The bank system server side obtains the configuration information, sets the authority for the user according to the configuration information, and records the set content in the authority setting list, wherein the authority includes but is not limited to the following: the sub-user authorizes the authority of the voiceprint of other people, the payment authority of the sub-user, the payment bank card setting of the sub-user and the like.
And then, the intelligent sound box receives the request voice requestVoice3 of the master user, and then sends the unique device id of the intelligent sound box and the user request voice3 to a bank system server.
The bank system server analyzes the request voice3, judges whether the request voice is 'I want to authorize sub-users', if the request voice3 is 'I want to authorize sub-users', analyzes the voiceprint information of the request voice3, and determines the voiceprint id corresponding to the voiceprint information according to the voiceprint id-user voiceprint in the voiceprint information storage unit, thereby determining whether the request voice comes from the sub-users. If the request voice comes from the sub-user, the voiceprint id and the corresponding payment amount of the current user in the authority setting list are read from the storage device, and whether the payment amount of the current transaction exceeds the payment amount of the user is judged. And if the payment limit is not exceeded, executing the payment operation requested by the user. Otherwise, prompting the master user, requesting the master user to carry out payment authorization, and executing the payment operation after the master user authorizes.
Fig. 5 schematically shows a block diagram of a server according to an embodiment of the present disclosure.
As shown in fig. 5, the server 500 includes a receiving module 510, a checking module 520, a first determining module 530, a first transmitting module 540, a first receiving module 550, a second determining module 560, a third determining module 570, and a binding module 580.
Specifically, the receiving module 510 is configured to receive a binding request from a first terminal device, where the binding request is used to bind a first account with a second account;
a checking module 520, configured to check the binding request;
a first determining module 530, configured to determine the first binding information and the first binding audio if the binding request passes the check.
The first sending module 540 is configured to send the first bound audio to the first terminal device, so that the first terminal device sends the second bound audio to the second terminal device according to the first bound audio.
A first receiving module 550, configured to receive the second binding information and the identity information of the second account from the second terminal device.
A second determining module 560, configured to determine whether the second binding information is consistent with the first binding information.
The third determining module 570 is configured to determine the second account according to the identity information of the second account when it is determined that the second binding information is consistent with the first binding information.
A binding module 580 for binding the first account with the second account.
Fig. 6 schematically shows a block diagram of a first terminal device according to an embodiment of the disclosure.
As shown in fig. 6, the first terminal device 600 includes a second transmitting module 610, a second receiving module 620, and a third transmitting module 630.
Specifically, the second sending module 610 is configured to send the binding request to the server.
A second receiving module 620, configured to receive the first bound audio.
A third sending module 630, configured to send the second bound audio to the second terminal device according to the first bound audio.
Fig. 7 schematically shows a block diagram of a second terminal device according to an embodiment of the present disclosure.
As shown in fig. 7, the second terminal device 700 includes a third receiving module 710, a parsing module 720, an obtaining module 730, and a fourth sending module 740.
Specifically, the third receiving module 710 is configured to receive the second bound audio from the first terminal device.
And the parsing module 720 is configured to obtain the second binding information by parsing the second binding audio.
The obtaining module 730 is configured to obtain the identity information of the second account.
The fourth sending module 740 is configured to send the second binding information and the identity information of the second account to the server.
According to the embodiment of the disclosure, the server sends the audio (the first binding audio) carrying the token information (the first binding information) to the first terminal device, then the first terminal device transmits the audio carrying the token information to the second terminal device in a sound wave transmission mode, the second terminal device can obtain the token information by analyzing the audio, and then the server can be requested to complete the binding of the second account, the first account and the intelligent loudspeaker box by means of the token information, so that the whole binding process is simple, and the security is high.
Any number of modules, sub-modules, units, sub-units, or at least part of the functionality of any number thereof according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware implementations. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the disclosure may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
For example, any plurality of the receiving module 510, the checking module 520, the first determining module 530, the first transmitting module 540, the first receiving module 550, the second determining module 560, the third determining module 570, and the binding module 580, or the second transmitting module 610, the second receiving module 620, and the third transmitting module 630, or the third receiving module 710, the parsing module 720, the obtaining module 730, and the fourth transmitting module 740 may be combined and implemented in one module, or any one of them may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the receiving module 510, the checking module 520, the first determining module 530, the first transmitting module 540, the first receiving module 550, the second determining module 560, the third determining module 570 and the binding module 580, the second transmitting module 610, the second receiving module 620, the third transmitting module 630, the third receiving module 710, the parsing module 720, the obtaining module 730 and the fourth transmitting module 740 may be at least partially implemented as a hardware circuit, such as Field Programmable Gate Arrays (FPGAs), Programmable Logic Arrays (PLAs), systems on a chip, systems on a substrate, systems on a package, Application Specific Integrated Circuits (ASICs), or may be implemented in hardware or firmware in any other reasonable way of integrating or packaging circuits, or in any one of three implementations, software, hardware and firmware, or in any suitable combination of any of them. Alternatively, at least one of the receiving module 510, the checking module 520, the first determining module 530, the first transmitting module 540, the first receiving module 550, the second determining module 560, the third determining module 570 and the binding module 580, the second transmitting module 610, the second receiving module 620, the third transmitting module 630, the third receiving module 710, the parsing module 720, the obtaining module 730 and the fourth transmitting module 740 may be at least partially implemented as a computer program module which, when executed, may perform a corresponding function.
Fig. 8 schematically illustrates a block diagram of a computing device suitable for implementing the above-described method in accordance with an embodiment of the present disclosure. The computing device illustrated in fig. 8 is only one example and should not impose any limitations on the functionality or scope of use of embodiments of the disclosure.
As shown in fig. 8, computing device 800 includes a processor 810, a computer-readable storage medium 820, a signal transmitter 830, and a signal receiver 840. The computing device 800 may perform a method according to embodiments of the disclosure.
In particular, processor 810 may include, for example, a general purpose microprocessor, an instruction set processor and/or related chip set and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), and/or the like. The processor 810 may also include on-board memory for caching purposes. Processor 810 may be a single processing unit or a plurality of processing units for performing different actions of a method flow according to embodiments of the disclosure.
Computer-readable storage medium 820, for example, may be a non-volatile computer-readable storage medium, specific examples including, but not limited to: magnetic storage devices, such as magnetic tape or Hard Disk Drives (HDDs); optical storage devices, such as compact disks (CD-ROMs); a memory, such as a Random Access Memory (RAM) or a flash memory; and so on.
The computer-readable storage medium 820 may include a computer program 821, which computer program 821 may include code/computer-executable instructions that, when executed by the processor 810, cause the processor 810 to perform a method according to an embodiment of the present disclosure, or any variation thereof.
The computer program 821 may be configured with, for example, computer program code comprising computer program modules. For example, in an example embodiment, code in computer program 821 may include one or more program modules, including for example 821A, modules 821B, … …. It should be noted that the division and number of modules are not fixed, and those skilled in the art may use suitable program modules or program module combinations according to actual situations, and when the program modules are executed by the processor 810, the processor 810 may execute the method according to the embodiment of the present disclosure or any variation thereof.
In accordance with an embodiment of the present disclosure, the processor 810 may interact with the signal transmitter 830 and the signal receiver 840 to perform a method in accordance with an embodiment of the present disclosure or any variation thereof.
According to an embodiment of the present invention, at least one of the receiving module 510, the checking module 520, the first determining module 530, the first sending module 540, the first receiving module 550, the second determining module 560, the third determining module 570, the binding module 580, the second sending module 610, the second receiving module 620, the third sending module 630, the third receiving module 710, the parsing module 720, the obtaining module 730, and the fourth sending module 740 may be implemented as a computer program module described with reference to fig. 8, which, when executed by the processor 810, may implement the corresponding operations described above.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
While the disclosure has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the disclosure as defined by the appended claims and their equivalents. Accordingly, the scope of the present disclosure should not be limited to the above-described embodiments, but should be defined not only by the appended claims, but also by equivalents thereof.

Claims (8)

1. A method of account binding performed by a server, comprising:
receiving a binding request from a first terminal device, wherein the binding request is used for binding a first account with a second account;
verifying the binding request;
determining first binding information and first binding audio under the condition that the binding request passes the verification;
sending the first bound audio to the first terminal equipment so that the first terminal equipment sends a second bound audio to second terminal equipment according to the first bound audio;
receiving second binding information from the second terminal equipment and identity information of a second account, and determining whether the second binding information is consistent with the first binding information; and
under the condition that the second binding information is determined to be consistent with the first binding information, determining the second account according to the identity information of the second account, and binding the first account with the second account;
wherein the determining the first binding information and the first binding audio comprises:
generating a set of random numbers;
determining an information segment and a frequency corresponding to each digit in the random digits according to a preset corresponding relation among the digits, the information segments and the frequencies;
combining the information segments to serve as first binding information, and synthesizing the frequency to serve as first binding audio;
wherein the first bound audio is generated by:
generating a pulse modulation coded audio according to the frequency;
and synthesizing the pulse modulation coded audio and the pre-generated background audio by utilizing Fourier transform and inverse transform to generate the first bound audio.
2. The method of claim 1, wherein the binding request comprises a device identification and audio instructions of the first terminal device; the verifying the binding request comprises:
determining a first account bound with the equipment identifier of the first terminal equipment according to the equipment identifier of the first terminal equipment;
determining whether the voiceprint characteristics of the audio instruction are consistent with the prestored voiceprint characteristics of the first account; and
and if the voiceprint feature of the audio instruction is determined to be consistent with the prestored voiceprint feature of the first account, the binding request passes the verification.
3. The method of claim 1, wherein the binding the first account with the second account comprises:
and establishing a binding relationship among the second account, the first account and the first terminal equipment.
4. The method of claim 1, further comprising:
acquiring configuration information, wherein the configuration information comprises one or more of consumption limit information, account authority information, payment mode information and operation reminding information; and
and configuring the second account according to the configuration information.
5. A method of account binding performed by a terminal device, comprising:
receiving second bound audio from the first terminal device;
obtaining second binding information by analyzing the second binding audio;
acquiring identity information of a second account; and
sending the second binding information and the identity information of the second account to a server;
wherein the second bound audio is sent by the first terminal device according to the received first bound audio from the server, and the server further generates first binding information, wherein the first binding information and the first bound audio are generated by:
generating a set of random numbers;
determining an information segment and a frequency corresponding to each digit in the random digits according to a preset corresponding relation among the digits, the information segments and the frequencies;
combining the information segments to serve as first binding information, and synthesizing the frequency to serve as first binding audio;
the first bound audio is generated by:
generating a pulse modulation coded audio according to the frequency;
and synthesizing the pulse modulation coded audio and the pre-generated background audio by utilizing Fourier transform and inverse transform to generate the first bound audio.
6. A system of account binding, comprising:
the server is used for receiving a binding request from the first terminal equipment, and the binding request is used for binding the first account with the second account; verifying the binding request; determining first binding information and first binding audio under the condition that the binding request passes the verification; sending the first bound audio to the first terminal equipment so that the first terminal equipment sends a second bound audio to second terminal equipment according to the first bound audio; receiving second binding information from the second terminal equipment and identity information of a second account, and determining whether the second binding information is consistent with the first binding information; under the condition that the second binding information is determined to be consistent with the first binding information, determining the second account according to the identity information of the second account, and binding the first account with the second account;
the first terminal equipment is used for sending a binding request to the server; receiving the first bound audio, and sending a second bound audio to a second terminal device according to the first bound audio; and
the second terminal equipment is used for receiving the second bound audio from the first terminal equipment; obtaining second binding information by analyzing the second binding audio; acquiring identity information of a second account; sending the second binding information and the identity information of the second account to a server;
wherein the server is further configured to:
generating a set of random numbers;
determining an information segment and a frequency corresponding to each digit in the random digits according to a preset corresponding relation among the digits, the information segments and the frequencies;
combining the information segments to serve as first binding information, and synthesizing the frequency to serve as first binding audio;
the first bound audio is generated by:
generating a pulse modulation coded audio according to the frequency;
and synthesizing the pulse modulation coded audio and the pre-generated background audio by utilizing Fourier transform and inverse transform to generate the first bound audio.
7. A computing device, comprising:
one or more processors;
a memory for storing one or more computer programs,
wherein the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1 to 5.
8. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to carry out the method of any one of claims 1 to 5.
CN201910751767.0A 2019-08-14 2019-08-14 Account binding method, system, computing device and medium Active CN110474902B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910751767.0A CN110474902B (en) 2019-08-14 2019-08-14 Account binding method, system, computing device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910751767.0A CN110474902B (en) 2019-08-14 2019-08-14 Account binding method, system, computing device and medium

Publications (2)

Publication Number Publication Date
CN110474902A CN110474902A (en) 2019-11-19
CN110474902B true CN110474902B (en) 2022-05-03

Family

ID=68511424

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910751767.0A Active CN110474902B (en) 2019-08-14 2019-08-14 Account binding method, system, computing device and medium

Country Status (1)

Country Link
CN (1) CN110474902B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111161319A (en) * 2019-12-30 2020-05-15 秒针信息技术有限公司 Work supervision method and device and storage medium
CN111833066A (en) * 2020-07-01 2020-10-27 中国建设银行股份有限公司 Account authorization method, device and system
CN111951014B (en) * 2020-08-13 2024-03-01 中国工商银行股份有限公司 Account binding system and method based on intelligent sound box
CN114331448A (en) * 2020-09-30 2022-04-12 华为技术有限公司 Biological information verification method and device
CN113965929A (en) * 2021-10-21 2022-01-21 北京雪扬科技有限公司 Hardware binding method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103250205A (en) * 2010-12-07 2013-08-14 英派尔科技开发有限公司 Audio fingerprint differences for end-to-end quality of experience measurement
CN106776977A (en) * 2016-12-06 2017-05-31 深圳前海勇艺达机器人有限公司 Search for the method and device of music
CN109040122A (en) * 2018-09-14 2018-12-18 小雅智能平台(深圳)有限公司 The method, apparatus and related accessory of a kind of new user's registration and binding service equipment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104092653B (en) * 2014-01-20 2017-01-25 腾讯科技(深圳)有限公司 Data processing method and system
CN107294916B (en) * 2016-03-31 2019-10-08 北京神州泰岳软件股份有限公司 Single-point logging method, single-sign-on terminal and single-node login system
CN107786505B (en) * 2016-08-26 2021-08-06 阿里巴巴集团控股有限公司 Method and system for determining target client, client and server
CN107944853B (en) * 2016-10-12 2022-02-01 斑马智行网络(香港)有限公司 IoT (Internet of things) equipment payment method, IoT equipment, IoT server and intelligent terminal
US10645079B2 (en) * 2017-05-12 2020-05-05 Bank Of America Corporation Preventing unauthorized access to secured information systems using authentication tokens and multi-device authentication prompts

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103250205A (en) * 2010-12-07 2013-08-14 英派尔科技开发有限公司 Audio fingerprint differences for end-to-end quality of experience measurement
CN106776977A (en) * 2016-12-06 2017-05-31 深圳前海勇艺达机器人有限公司 Search for the method and device of music
CN109040122A (en) * 2018-09-14 2018-12-18 小雅智能平台(深圳)有限公司 The method, apparatus and related accessory of a kind of new user's registration and binding service equipment

Also Published As

Publication number Publication date
CN110474902A (en) 2019-11-19

Similar Documents

Publication Publication Date Title
CN110474902B (en) Account binding method, system, computing device and medium
US11706217B2 (en) Managing voice applications within a digital workspace
US10672402B2 (en) Speech with context authenticator
JP6812392B2 (en) Information output method, information output device, terminal device and computer-readable storage medium
US11916913B2 (en) Secure audio transcription
US20210374742A1 (en) Voice interface transaction system using audio signals
US11615169B2 (en) Authentication using cognitive analysis
JP6692832B2 (en) Authentication of packetized audio signals
CN104079409A (en) Account login method and device
US11012556B2 (en) Non-verbal sensitive data authentication
US9253304B2 (en) Voice communication management
CN111199037B (en) Login method, system and device
CN105141427A (en) Login authentication method, device and system based on voiceprint recognition
CN111949959B (en) Authorization authentication method and device in Oauth protocol
CN113168435A (en) Non-contact user authentication method
US10218700B2 (en) Authorizations for computing devices to access a protected resource
US20180083940A1 (en) System to resolve multiple identity crisis in indentity-as-a-service application environment
CN111402896B (en) Voice verification method and network equipment
WO2019161600A1 (en) Method, device, server and medium for adding member to community
CN110430202A (en) Authentication method and device
CN111951014B (en) Account binding system and method based on intelligent sound box
CN113273133B (en) Token management layer for automatic authentication during communication channel interactions
CN117521141A (en) File access authority control method and device, storage medium and computer equipment
CN116405572A (en) Cloud browser access method, device, system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant