CN111090846B - Login authentication method, login authentication device, electronic equipment and computer readable storage medium - Google Patents

Login authentication method, login authentication device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN111090846B
CN111090846B CN201911244362.4A CN201911244362A CN111090846B CN 111090846 B CN111090846 B CN 111090846B CN 201911244362 A CN201911244362 A CN 201911244362A CN 111090846 B CN111090846 B CN 111090846B
Authority
CN
China
Prior art keywords
target
user
plaintext
target audio
prompt
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911244362.4A
Other languages
Chinese (zh)
Other versions
CN111090846A (en
Inventor
赖勇铨
李家锐
李美玲
尚伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Citic Bank Corp Ltd
Original Assignee
China Citic Bank Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Citic Bank Corp Ltd filed Critical China Citic Bank Corp Ltd
Priority to CN201911244362.4A priority Critical patent/CN111090846B/en
Publication of CN111090846A publication Critical patent/CN111090846A/en
Application granted granted Critical
Publication of CN111090846B publication Critical patent/CN111090846B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/26Speech to text systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Telephone Function (AREA)

Abstract

The application provides a login authentication method, a login authentication device, electronic equipment and a computer readable storage medium, which are applied to the technical field of computers, wherein the login authentication method comprises the following steps: firstly checking a registration text, performing voice recognition on read target audio to obtain a target text, then checking the target text based on the prompt plaintext and a prestored ciphertext, and checking voiceprint characteristics when the checking result is consistent, so as to determine whether to allow a user to log in. Therefore, when a user logs in, the user only needs to read corresponding target audio according to the prompt plaintext, and the convenience of user login authentication is improved; in addition, the user login needs to be checked on the registration text and the voiceprint characteristics, and the double check improves the security of the user login authentication; furthermore, the target audio is based on prompt plaintext reading, and the setting of the prompt plaintext has a certain prompt function, so that a user can quickly determine ciphertext corresponding to the target application.

Description

Login authentication method, login authentication device, electronic equipment and computer readable storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a login authentication method, a login authentication device, an electronic device, and a computer readable storage medium.
Background
With the development of APP technology, various APP applications (such as short video APP, communication APP and financial service APP) are provided in the APP market for users to select, and users can select corresponding APP applications to log in and use based on own needs, so that how to log in the APP becomes a key problem.
At present, a user can realize the login of a corresponding APP by inputting an account number and a corresponding password of the APP, namely, the account number and the corresponding password of the user are input in a corresponding APP login interface and submitted to a server, and then the server verifies the account number and the corresponding password input by the user to determine whether the current user is allowed to login. However, according to the existing method of performing APP login by manually inputting an account number and a corresponding password, the account number and the corresponding password of APP need to be manually input one by one, so that the problem of complicated operation exists. Therefore, the existing mode of manually inputting the APP account number and the corresponding password to perform APP login has the problems of complex operation and lower safety.
Disclosure of Invention
The application provides a login authentication method, a login authentication device, electronic equipment and a computer readable storage medium, which are used for the convenience and the security of login authentication, and the technical scheme adopted by the application is as follows:
in a first aspect, there is provided a login authentication method, the method comprising,
collecting target audio information read by a target user based on prompt plaintext;
identifying target audio information by a voice identification method to obtain a target text;
verifying the target text based on the prompt plaintext and the prestored ciphertext to obtain a first verification result;
when the verification result is consistent, extracting voiceprint features of the target audio information, and calculating similarity between the voiceprint features of the target audio information and prestored voiceprint features of the target user;
it is determined whether to allow the user to log in based on the similarity calculation result.
Wherein, the prompt plaintext and/or prestored ciphertext is 3-5 bit character.
Wherein, the prompt plaintext and/or prestored ciphertext is a number.
Specifically, identifying the target audio information by a voice recognition method to obtain a target text, and further comprises the following steps:
detecting whether the target audio information is a played recording and/or detecting whether noise when the target user reads exceeds a predetermined threshold.
Specifically, the prompt plaintext is stored in the terminal device, and the method further comprises:
when the target user is detected to open the target application, the indication plaintext is acquired from the terminal equipment, and is displayed on a screen of the terminal equipment.
Further, the method further comprises:
receiving a registration text input by a target user, wherein the registration text comprises a ciphertext set by the target user;
collecting second target audio of a target user, and identifying and obtaining second target text corresponding to the second target audio through a voice identification algorithm;
and checking whether the registration text is consistent with the second target text, obtaining a second check result, and determining whether the user is successfully registered based on the second check result.
In a second aspect, there is provided a login authentication device, the device comprising,
the first acquisition module is used for acquiring target audio information read by a target user based on prompt plaintext;
the recognition module is used for recognizing the target audio information through a voice recognition method to obtain a target text;
the verification module is used for verifying the target text based on the prompt plaintext and the prestored ciphertext to obtain a first verification result;
the extraction module is used for extracting voiceprint features of the target audio information when the first verification result is consistent, and calculating the similarity between the voiceprint features of the target audio information and prestored voiceprint features of the target user;
and the first determining module is used for determining whether the user is allowed to log in or not based on the similarity calculation result.
Wherein, the prompt plaintext and/or prestored ciphertext is 3-5 bit character.
Wherein, the prompt plaintext and/or prestored ciphertext is a number.
Further, the apparatus further comprises:
the first detection module is used for detecting whether the target audio information is a played record or not and/or detecting whether noise generated when a target user reads the record exceeds a preset threshold value or not.
Further, the prompting plaintext is stored in the terminal device, and the device further comprises:
and the acquisition module is used for acquiring the indication plaintext from the terminal equipment and displaying the indication plaintext on a screen of the terminal equipment when the target user is detected to open the target application.
Further, the apparatus further comprises:
the receiving module is used for receiving a registration text input by the target user, wherein the registration text comprises a ciphertext set by the target user;
the second acquisition module is used for acquiring second target audio of the target user and identifying a second target text corresponding to the second target audio through a voice recognition algorithm;
and the second checking module is used for checking whether the registration text is consistent with the second target text, obtaining a second checking result and determining whether the user is successfully registered based on the second checking result.
Further, the apparatus further comprises:
the third acquisition module is used for acquiring a third target audio of the target user;
the extraction and calculation module is used for respectively extracting and obtaining voiceprint features of the third target audio and voiceprint features of the second target audio and calculating similarity of the voiceprint features of the third target audio and the voiceprint features of the second target audio;
the second verification module is specifically configured to determine whether the user is successfully registered based on the second verification result and a similarity between the voiceprint feature of the third target audio and the voiceprint feature of the second target audio.
In a third aspect, an electronic device is provided, the electronic device comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more applications configured to: the login authentication method shown in the first aspect is performed.
In a fourth aspect, there is provided a computer readable storage medium storing computer instructions that, when run on a computer, cause the computer to perform the login authentication method of the first aspect.
Compared with the prior art that login authentication is achieved through an account number and a password, the method, the device and the electronic equipment achieve login authentication, the method and the device achieve login authentication through the voice recognition, the target text is obtained through collecting target audio information which is read by a target user based on prompt plaintext, then the target audio information is recognized through a voice recognition method, then the target text is checked based on prompt plaintext and prestored ciphertext, a first check result is obtained, when the check result is consistent, voiceprint characteristics of the target audio information are extracted, similarity between the voiceprint characteristics of the target audio information and the voiceprint characteristics of the prestored target user is calculated, and finally whether the user is allowed to login is determined based on the similarity calculation result. Firstly checking the registration text, performing voice recognition on the read target audio to obtain a target text, then checking the target text based on the prompt plaintext and the prestored ciphertext, and checking the voiceprint characteristics when the checking result is consistent, so as to determine whether the user is allowed to log in. The complicated steps that the user inputs the account number and the corresponding password one by one are avoided, and when the user logs in, the user only needs to read the corresponding target audio according to the prompt plaintext, so that the convenience of user login authentication is improved; in addition, the user login needs to be checked on the registration text and the voiceprint characteristics, and the double check improves the security of the user login authentication; moreover, the target audio is based on prompt plaintext reading, and the setting of the prompt plaintext has a certain prompt function, so that a user can quickly determine ciphertext corresponding to the target application.
Additional aspects and advantages of the application will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings, in which:
fig. 1 is a schematic flow chart of a login authentication method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a login authentication device according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of another login authentication device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are exemplary only for the purpose of illustrating the present application and are not to be construed as limiting the present application.
As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless expressly stated otherwise, as understood by those skilled in the art. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. The term "and/or" as used herein includes all or any element and all combination of one or more of the associated listed items.
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The following describes the technical solutions of the present application and how the technical solutions of the present application solve the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
The embodiment of the application provides a login authentication method, as shown in fig. 1, the method may include the following steps:
step S101, collecting target audio information read by a target user based on a prompt plaintext;
specifically, when the target user opens the corresponding APP, the target user reads information based on a prompt plaintext displayed on a screen of the terminal device to obtain target audio information; the terminal equipment can be a mobile phone, a PAD, a wearable device (a watch and the like) and can be other terminal equipment; the terminal equipment acquires audio read by the target user through the corresponding audio acquisition equipment when the target user clicks or touches the corresponding control, so that target audio information is obtained.
Step S102, identifying target audio information by a voice identification method to obtain a target text;
specifically, the target audio information can be subjected to voice recognition by a corresponding voice recognition method to obtain a target text corresponding to the target audio information; the speech recognition method may be a speech recognition method based on a convolutional neural network, a speech recognition method based on a long-short term neural network, or other speech recognition methods capable of realizing the functions of the application, which is not limited herein.
Step S103, verifying the target text based on the prompt plaintext and the prestored ciphertext to obtain a first verification result;
specifically, the target text and the prompt plaintext can be matched with prestored ciphertext, so that a first verification result is obtained; the prompt plaintext and the prestored ciphertext can be spliced and then matched with the target text, wherein the splicing can be that the prompt plaintext is in front or the ciphertext is in front.
Step S104, when the verification result is consistent, extracting voiceprint features of the target audio information, and calculating similarity between the voiceprint features of the target audio information and prestored voiceprint features of the target user;
specifically, when the verification result is consistent, the verification of the registration text is proved to pass, the verification of the voiceprint features is carried out, the voiceprint features of the target audio information can be extracted through a corresponding voiceprint feature extraction method, and then the similarity between the voiceprint features of the target audio information and the prestored voiceprint features of the target user is calculated (specifically, the verification can be realized by calculating the distance between the voiceprint features, such as Euclidean distance, hamming distance and the like).
Step S105, determining whether to allow the user to log in based on the similarity calculation result.
Specifically, the user may be allowed to log in when the similarity is within a certain threshold value, and log in fails when the similarity exceeds a certain threshold value.
It should be noted that the sequence of steps S102, S103, and S104 may be adjusted, and the voiceprint feature may be checked (step S104) first, and then the registered text may be checked (i.e., steps S102 and S103), where the judgment basis for determining whether to allow the user to log in step S105 is also changed accordingly, and the change may be that the user is allowed to log in when the prompt plaintext is consistent with the prestored ciphertext to the target text.
The steps S102, S103, and S104 may be performed at the terminal device side or may be performed at the server side, and specifically, other steps may be changed accordingly.
Compared with the prior art that login authentication is achieved through an account number and a password, the login authentication method is achieved through the steps that target audio information read by a target user based on prompt plaintext is collected, target text is obtained through recognition of the target audio information through a voice recognition method, then the target text is checked based on prompt plaintext and prestored ciphertext, a first check result is obtained, when the check result is consistent, voiceprint characteristics of the target audio information are extracted, similarity of the voiceprint characteristics of the target audio information and the prestored voiceprint characteristics of the target user is calculated, and finally whether the user is allowed to login is determined based on the similarity calculation result. Firstly checking the registration text, performing voice recognition on the read target audio to obtain a target text, then checking the target text based on the prompt plaintext and the prestored ciphertext, and checking the voiceprint characteristics when the checking result is consistent, so as to determine whether the user is allowed to log in. The complicated steps that the user inputs the account number and the corresponding password one by one are avoided, and when the user logs in, the user only needs to read the corresponding target audio according to the prompt plaintext, so that the convenience of user login authentication is improved; in addition, the user login needs to be checked on the registration text and the voiceprint characteristics, and the double check improves the security of the user login authentication; moreover, the target audio is based on prompt plaintext reading, and the setting of the prompt plaintext has a certain prompt function, so that a user can quickly determine ciphertext corresponding to the target application.
The embodiment of the application provides a possible implementation manner, wherein the prompt plaintext and/or prestored ciphertext is 3-5-bit characters.
Specifically, the prompting plaintext and/or the prestored ciphertext is a 3-5-bit character, wherein the lengths of the prompting plaintext and the prestored ciphertext can be the same or different, for example, the prompting plaintext is 3 bits, and the ciphertext can be 4 bits; or the prompt plaintext and ciphertext are both 3 bits. The setting of the prompt plaintext can be used for a user to quickly determine the corresponding ciphertext according to the prompt plaintext. For example, the user may classify the passwords, each class corresponds to one password, and for each class, the user may set a prompt plaintext, and when the user logs in to the corresponding application, the corresponding ciphertext may be quickly determined according to the prompt plaintext.
For the embodiment of the application, the prompt plaintext and/or the prestored ciphertext is 3-5-bit characters, so that the prompt plaintext can express certain information and simultaneously can avoid occupying too much storage space due to too long prompt plaintext, in addition, the ciphertext ensures certain safety at 3-5 bits, and the problem that an attacker tries out the corresponding ciphertext to cause the leakage of the ciphertext due to too short ciphertext can be avoided.
The embodiment of the application provides a possible implementation manner, and prompts a plaintext and/or prestored ciphertext to be numbers.
Specifically, the prompt plaintext and/or the prestored ciphertext is a number, wherein the prompt plaintext can be a number with prompt meaning for a user, and the user can quickly determine the corresponding ciphertext aiming at the prompt plaintext.
For the embodiment of the application, the prompt plaintext and/or prestored ciphertext is a number, so that the user can conveniently memorize and read, and in addition, a semi-plaintext mode (the registered text is partially plaintext and the registered text is partially ciphertext) is adopted, so that the safety is higher compared with a full-plaintext mode (the registered text is fully plaintext).
The embodiment of the present application provides a possible implementation manner, and before step S102 includes:
step S106 (not shown in the figure) detects whether the target audio information is a played recording, and/or detects whether noise when the target user reads aloud exceeds a predetermined threshold.
Specifically, before step 102, a detection (recording detection) of whether the target audio is a play recording and/or a detection of whether the noise exceeds a predetermined threshold (noise detection) may be performed, where the present application may include both recording detection and noise detection, or may include only one of them. After the voice recognition of the target audio is carried out after the recording detection and/or the noise detection are carried out, and when the voice recognition of the target audio does not pass the corresponding detection, the user is prompted to log in failure.
For the embodiment of the application, the recording detection is performed, so that the security of login authentication is improved, and the noise detection is performed, so that the accuracy of login authentication can be improved.
The embodiment provides a possible implementation manner, further, the method prompts that the plaintext is stored in the terminal device, and the method further includes:
step S107 (not shown in the figure), when it is detected that the target user opens the target application, the indication plaintext is acquired from the terminal device and displayed on the screen of the terminal device.
Specifically, the prompt plaintext is stored in the terminal device, and when the target user is detected to open the target application, the prompt plaintext can be obtained from the terminal device and displayed on the screen of the terminal device.
For the embodiment of the application, the prompt plaintext is stored in the terminal equipment, when the user opens the target application, the prompt plaintext can be obtained from the terminal equipment and displayed on the screen of the terminal equipment, the corresponding prompt plaintext does not need to be obtained from the server, and then the display is performed, so that the time for the user to open the application to display the prompt plaintext is reduced, and further the user experience can be improved.
The embodiment of the application provides a possible implementation manner, and further, the method further comprises the following steps:
step S108 (not shown in the figure), receiving a registration text input by the target user, wherein the registration text comprises ciphertext set by the target user;
step S109 (not shown), collecting a second target audio of the target user, and recognizing and obtaining a second target text corresponding to the second target audio through a voice recognition algorithm;
step S110 (not shown in the figure) checks whether the registration text is consistent with the second target text, obtains a second check result, and determines whether the user is registered successfully based on the second check result.
Specifically, in the user registration stage, a registration text input by a target user is received, wherein the user can set characters with preset numerical digits in the registration text as prompt plaintext, the rest are ciphertext, then second target audio read by the user is collected, and when the second target text obtained by carrying out voice recognition on the second target audio is consistent with the registration text, the user registration is successful.
For the embodiment of the application, the registration problem of the user is solved.
The embodiment of the application provides a possible implementation manner, and further, the method further comprises the following steps:
step S111 (not shown in the figure), collecting the third target audio of the target user;
step S112 (not shown in the figure), respectively extracting and obtaining the voiceprint feature of the third target audio and the voiceprint feature of the second target audio, and calculating the similarity of the voiceprint feature of the third target audio and the voiceprint feature of the second target audio;
step S110 determines whether the user is registered successfully based on the second check result, including:
step S1101 (not shown in the figure), it is determined whether the user is successfully registered based on the second check result and the similarity of the voiceprint feature of the third target audio and the voiceprint feature of the second target audio.
For the embodiment of the application, when the similarity of the voiceprint features corresponding to the second target audio and the third target audio is within a certain range, the user is successfully registered, namely, the voiceprint features of the registered user are ensured to have certain stability, and the accuracy of subsequent login authentication based on the voiceprint features is improved.
Fig. 2 is a login authentication device provided in an embodiment of the present application, where the device 20 includes: a first acquisition module 201, an identification module 202, a first verification module 203, an extraction module 204, and a determination module 205, wherein,
the first acquisition module 201 is configured to acquire target audio information that is read aloud by a target user based on a prompt plaintext;
a recognition module 202, configured to recognize the target audio information by using a speech recognition method to obtain a target text;
the first verification module 203 is configured to verify the target text based on the prompt plaintext and the prestored ciphertext, so as to obtain a first verification result;
the extracting module 204 is configured to extract voiceprint features of the target audio information and calculate similarity between the voiceprint features of the target audio information and prestored voiceprint features of the target user when the first verification result is consistent;
a determining module 205, configured to determine whether to allow the user to log in based on the similarity calculation result.
Compared with the prior art that login authentication is achieved through an account number and a password, the login authentication device is achieved through the method that a target user collects target audio information read in the prompt plaintext, then the target audio information is identified through a voice recognition method to obtain target text, then the target text is checked based on the prompt plaintext and prestored ciphertext to obtain a first check result, when the check result is consistent, voiceprint characteristics of the target audio information are extracted, similarity between the voiceprint characteristics of the target audio information and the prestored voiceprint characteristics of the target user is calculated, and finally whether the user is allowed to login is determined based on the similarity calculation result. Firstly checking the registration text, performing voice recognition on the read target audio to obtain a target text, then checking the target text based on the prompt plaintext and the prestored ciphertext, and checking the voiceprint characteristics when the checking result is consistent, so as to determine whether the user is allowed to log in. The complicated steps that the user inputs the account number and the corresponding password one by one are avoided, and when the user logs in, the user only needs to read the corresponding target audio according to the prompt plaintext, so that the convenience of user login authentication is improved; in addition, the user login needs to be checked on the registration text and the voiceprint characteristics, and the double check improves the security of the user login authentication; moreover, the target audio is based on prompt plaintext reading, and the setting of the prompt plaintext has a certain prompt function, so that a user can quickly determine ciphertext corresponding to the target application.
The login authentication device of the present embodiment may perform a login authentication method provided in the above embodiment of the present application, and the implementation principle is similar, and will not be described here again.
As shown in fig. 3, another login authentication device is provided in the embodiment of the present application, and the device 30 includes: a first acquisition module 301, an identification module 302, a first verification module 303, an extraction module 304, and a determination module 305, wherein,
the first collection module 301 is configured to collect target audio information that is read aloud by a target user based on a prompt plaintext;
the first acquisition module 301 in fig. 3 is the same as or similar to the first acquisition module 201 in fig. 2.
The recognition module 302 is configured to recognize the target audio information by using a speech recognition method to obtain a target text;
wherein the identification module 302 in fig. 3 is the same as or similar to the function of the identification module 202 in fig. 2.
The first verification module 303 is configured to verify the target text based on the prompt plaintext and the prestored ciphertext, so as to obtain a first verification result;
wherein the first verification module 303 in fig. 3 is the same as or similar to the function of the first verification module 203 in fig. 2.
The extracting module 304 is configured to extract voiceprint features of the target audio information and calculate similarity between the voiceprint features of the target audio information and prestored voiceprint features of the target user when the first verification result is consistent;
wherein the extraction module 304 in fig. 3 is the same or similar in function to the extraction module 204 in fig. 2.
A determining module 305, configured to determine whether to allow the user to log in based on the similarity calculation result.
The determining module 305 in fig. 3 is the same as or similar to the determining module 205 in fig. 2.
The embodiment of the application provides a possible implementation manner, wherein the prompt plaintext and/or prestored ciphertext is 3-5-bit characters.
For the embodiment of the application, the prompt plaintext and/or the prestored ciphertext is 3-5-bit characters, so that the prompt plaintext can express certain information and simultaneously can avoid occupying too much storage space due to too long prompt plaintext, in addition, the ciphertext ensures certain safety at 3-5 bits, and the problem that an attacker tries out the corresponding ciphertext to cause the leakage of the ciphertext due to too short ciphertext can be avoided.
The embodiment of the application provides a possible implementation manner, wherein the prompt plaintext and/or prestored ciphertext is a number.
For the embodiment of the application, the prompt plaintext and/or prestored ciphertext is a number, so that the user can conveniently memorize and read, and in addition, a semi-plaintext mode (the registered text is partially plaintext and the registered text is partially ciphertext) is adopted, so that the safety is higher compared with a full-plaintext mode (the registered text is fully plaintext).
The embodiment of the present application provides a possible implementation manner, further, the apparatus 30 further includes:
the first detection module 306 is configured to detect whether the target audio information is a played recording, and/or detect whether noise when the target user reads the recording exceeds a predetermined threshold.
For the embodiment of the application, the recording detection is performed, so that the security of login authentication is improved, and the noise detection is performed, so that the accuracy of login authentication can be improved.
The embodiment of the application provides a possible implementation manner, which prompts that plaintext is stored in a terminal device, and further comprises:
and the acquisition module 307 is used for acquiring the indication plaintext from the terminal equipment and displaying the indication plaintext on a screen of the terminal equipment when the target user is detected to open the target application.
For the embodiment of the application, the prompt plaintext is stored in the terminal equipment, when the user opens the target application, the prompt plaintext can be obtained from the terminal equipment and displayed on the screen of the terminal equipment, the corresponding prompt plaintext does not need to be obtained from the server, and then the display is performed, so that the time for the user to open the application to display the prompt plaintext is reduced, and further the user experience can be improved.
The embodiment of the present application provides a possible implementation manner, further, the apparatus 30 further includes:
a receiving module 308, configured to receive a registration text input by a target user, where the registration text includes a ciphertext set by the target user;
the second collection module 309 is configured to collect a second target audio of the target user, and identify, by using a speech recognition algorithm, a second target text corresponding to the second target audio;
and a second checking module 310, configured to check whether the registration text is consistent with the second target text, obtain a second checking result, and determine whether the user is successfully registered based on the second checking result.
For the embodiment of the application, the registration problem of the user is solved.
The embodiment of the present application provides a possible implementation manner, further, the apparatus 30 further includes:
a third acquisition module 311, configured to acquire a third target audio of the target user;
the extraction and calculation module 312 extracts the voiceprint feature of the third target audio and the voiceprint feature of the second target audio respectively, and calculates the similarity between the voiceprint feature of the third target audio and the voiceprint feature of the second target audio
The second verification module 310 is specifically configured to determine whether the user is successfully registered based on the second verification result and the similarity between the voiceprint feature of the third target audio and the voiceprint feature of the second target audio.
For the embodiment of the application, when the similarity of the voiceprint features corresponding to the second target audio and the third target audio is within a certain range, the user is successfully registered, namely, the voiceprint features of the registered user are ensured to have certain stability, and the accuracy of subsequent login authentication based on the voiceprint features is improved.
Compared with the prior art that login authentication is achieved through an account number and a password, the login authentication device is achieved through the method that a target user collects target audio information read in the prompt plaintext, then the target audio information is identified through a voice recognition method to obtain target text, then the target text is checked based on the prompt plaintext and prestored ciphertext to obtain a first check result, when the check result is consistent, voiceprint characteristics of the target audio information are extracted, similarity between the voiceprint characteristics of the target audio information and the prestored voiceprint characteristics of the target user is calculated, and finally whether the user is allowed to login is determined based on the similarity calculation result. Firstly checking the registration text, performing voice recognition on the read target audio to obtain a target text, then checking the target text based on the prompt plaintext and the prestored ciphertext, and checking the voiceprint characteristics when the checking result is consistent, so as to determine whether the user is allowed to log in. The complicated steps that the user inputs the account number and the corresponding password one by one are avoided, and when the user logs in, the user only needs to read the corresponding target audio according to the prompt plaintext, so that the convenience of user login authentication is improved; in addition, the user login needs to be checked on the registration text and the voiceprint characteristics, and the double check improves the security of the user login authentication; moreover, the target audio is based on prompt plaintext reading, and the setting of the prompt plaintext has a certain prompt function, so that a user can quickly determine ciphertext corresponding to the target application.
The embodiment of the present application provides a login authentication device, which is applicable to the method shown in the foregoing embodiment, and is not described herein again.
The embodiment of the application provides an electronic device, as shown in fig. 4, an electronic device 40 shown in fig. 4 includes: a processor 401 and a memory 403. Processor 401 is connected to memory 403, such as via bus 402. Further, the electronic device 40 may also include a transceiver 404. It should be noted that, in practical applications, the transceiver 404 is not limited to one, and the structure of the electronic device 40 is not limited to the embodiment of the present application. The processor 401 is applied to the embodiment of the present application, and is configured to implement the functions of the first acquisition module, the identification module, the first verification module, the extraction module, and the determination module shown in fig. 2 or fig. 3, and the functions of the first detection module, the acquisition module, the receiving module, the second acquisition module, the second verification module, the third acquisition module, and the extraction calculation module shown in fig. 3. Transceiver 404 includes a receiver and a transmitter.
The processor 401 may be a CPU, general purpose processor, DSP, ASIC, FPGA or other programmable logic device, transistor logic device, hardware components, or any combination thereof. Which may implement or perform the various exemplary logic blocks, modules, and circuits described in connection with this disclosure. Processor 401 may also be a combination that implements computing functionality, such as a combination comprising one or more microprocessors, a combination of a DSP and a microprocessor, or the like.
Bus 402 may include a path to transfer information between the components. Bus 402 may be a PCI bus, an EISA bus, or the like. Bus 402 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in fig. 4, but not only one bus or one type of bus.
The memory 403 may be, but is not limited to, a ROM or other type of static storage device that can store static information and instructions, a RAM or other type of dynamic storage device that can store information and instructions, an EEPROM, a CD-ROM or other optical disk storage, optical disk storage (including compact disks, laser disks, optical disks, digital versatile disks, blu-ray disks, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
The memory 403 is used for storing application program codes for executing the present application and is controlled to be executed by the processor 401. The processor 401 is configured to execute application code stored in the memory 403 to implement the functions of the login authentication device provided by the embodiment shown in fig. 2 or fig. 3.
Compared with the prior art that login authentication is achieved through an account number and a password, the method comprises the steps of collecting target audio information read by a target user based on prompt plaintext, identifying the target audio information through a voice recognition method to obtain target text, checking the target text based on prompt plaintext and prestored ciphertext to obtain a first checking result, extracting voiceprint characteristics of the target audio information when the checking result is consistent, calculating similarity between the voiceprint characteristics of the target audio information and prestored target user voiceprint characteristics, and finally determining whether to allow the user to login based on the similarity calculation result. Firstly checking a registration text, performing voice recognition on read target audio to obtain a target text, then checking the target text based on the prompt plaintext and a prestored ciphertext, and checking voiceprint characteristics when the checking result is consistent, so as to determine whether to allow a user to log in. The complicated steps that the user inputs the account number and the corresponding password one by one are avoided, and when the user logs in, the user only needs to read the corresponding target audio according to the prompt plaintext, so that the convenience of user login authentication is improved; in addition, the user login needs to be checked on the registration text and the voiceprint characteristics, and the double check improves the security of the user login authentication; moreover, the target audio is based on prompt plaintext reading, and the setting of the prompt plaintext has a certain prompt function, so that a user can quickly determine ciphertext corresponding to the target application.
The embodiment of the application provides electronic equipment which is suitable for the embodiment of the method. And will not be described in detail herein.
The present embodiment provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method shown in the above embodiment.
Compared with the prior art that login authentication is achieved through an account number and a password, the method comprises the steps of collecting target audio information which is read in a prompt plaintext and used by a target user, identifying the target audio information through a voice recognition method to obtain a target text, then verifying the target text based on the prompt plaintext and a prestored ciphertext to obtain a first verification result, extracting voiceprint characteristics of the target audio information when the verification result is consistent, calculating similarity between the voiceprint characteristics of the target audio information and the prestored voiceprint characteristics of the target user, and finally determining whether the user is allowed to login or not based on the similarity calculation result. Firstly checking a registration text, performing voice recognition on read target audio to obtain a target text, then checking the target text based on the prompt plaintext and a prestored ciphertext, and checking voiceprint characteristics when the checking result is consistent, so as to determine whether to allow a user to log in. The complicated steps that the user inputs the account number and the corresponding password one by one are avoided, and when the user logs in, the user only needs to read the corresponding target audio according to the prompt plaintext, so that the convenience of user login authentication is improved; in addition, the user login needs to be checked on the registration text and the voiceprint characteristics, and the double check improves the security of the user login authentication; moreover, the target audio is based on prompt plaintext reading, and the setting of the prompt plaintext has a certain prompt function, so that a user can quickly determine ciphertext corresponding to the target application.
The present application provides a computer readable storage medium suitable for use in the above method embodiments. And will not be described in detail herein.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
The foregoing is only a partial embodiment of the present application and it should be noted that, for a person skilled in the art, several improvements and modifications can be made without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.

Claims (9)

1. A login authentication method, comprising:
receiving a registration text input by a target user, wherein the registration text comprises a ciphertext set by the target user;
collecting second target audio of a target user, and identifying a second target text corresponding to the second target audio through a voice identification algorithm;
checking whether the registration text is consistent with the second target text or not, obtaining a second check result, and determining whether the user is successfully registered or not based on the second check result;
collecting target audio information read by a target user based on prompt plaintext;
identifying the target audio information by a voice identification method to obtain a target text;
splicing the prompt plaintext with the prestored ciphertext, and then checking the target text to obtain a first checking result;
when the verification result is consistent, extracting voiceprint features of the target audio information, and calculating similarity between the voiceprint features of the target audio information and prestored voiceprint features of a target user;
it is determined whether to allow the user to log in based on the similarity calculation result.
2. The method according to claim 1, wherein the hint plaintext and/or the pre-stored ciphertext is a 3-5 bit character.
3. The method according to claim 1 or 2, characterized in that the hint plaintext and/or the pre-stored ciphertext is a number.
4. The method of claim 1, wherein the identifying the target audio information by the speech recognition method results in a target text, further comprising:
detecting whether the target audio information is a played recording and/or detecting whether noise when a target user reads exceeds a preset threshold value.
5. The method of claim 1, wherein the hint plaintext is stored in a terminal device, the method further comprising:
and when the target user is detected to open the target application, acquiring the prompt plaintext from the terminal equipment, and displaying the prompt plaintext on a screen of the terminal equipment.
6. The method according to claim 1, characterized in that the method further comprises:
collecting a third target audio of a target user;
respectively extracting voiceprint features of the third target audio and voiceprint features of the second target audio, and calculating similarity of the voiceprint features of the third target audio and the voiceprint features of the second target audio;
the determining whether the user is registered successfully based on the second check result comprises:
and determining whether the user is successfully registered or not based on a second check result and the similarity of the voiceprint characteristics of the third target audio and the voiceprint characteristics of the second target audio.
7. A login authentication device, comprising:
the receiving module is used for receiving a registration text input by the target user, wherein the registration text comprises a ciphertext set by the target user;
the second acquisition module is used for acquiring second target audio of the target user and identifying a second target text corresponding to the second target audio through a voice recognition algorithm;
the second checking module is used for checking whether the registration text is consistent with the second target text, obtaining a second checking result, and determining whether the user is successfully registered based on the second checking result;
the first acquisition module is used for acquiring target audio information read by a target user based on prompt plaintext;
the recognition module is used for recognizing the target audio information through a voice recognition method to obtain a target text;
the first verification module is used for splicing the prompt plaintext with the prestored ciphertext and then verifying the target text to obtain a first verification result;
the extraction module is used for extracting voiceprint features of the target audio information when the first verification result is consistent, and calculating the similarity between the voiceprint features of the target audio information and prestored voiceprint features of a target user;
and the determining module is used for determining whether the user is allowed to log in or not based on the similarity calculation result.
8. An electronic device, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more applications configured to: the login authentication method according to any one of claims 1 to 6 is performed.
9. A computer readable storage medium storing computer instructions which, when run on a computer, cause the computer to perform the login authentication method according to any one of claims 1 to 6.
CN201911244362.4A 2019-12-06 2019-12-06 Login authentication method, login authentication device, electronic equipment and computer readable storage medium Active CN111090846B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911244362.4A CN111090846B (en) 2019-12-06 2019-12-06 Login authentication method, login authentication device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911244362.4A CN111090846B (en) 2019-12-06 2019-12-06 Login authentication method, login authentication device, electronic equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN111090846A CN111090846A (en) 2020-05-01
CN111090846B true CN111090846B (en) 2023-07-21

Family

ID=70396127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911244362.4A Active CN111090846B (en) 2019-12-06 2019-12-06 Login authentication method, login authentication device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111090846B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111883106B (en) * 2020-07-27 2024-04-19 腾讯音乐娱乐科技(深圳)有限公司 Audio processing method and device
CN112309406A (en) * 2020-09-21 2021-02-02 北京沃东天骏信息技术有限公司 Voiceprint registration method, voiceprint registration device and computer-readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218738A (en) * 1978-05-05 1980-08-19 International Business Machines Corporation Method for authenticating the identity of a user of an information system
AU1352400A (en) * 1995-05-17 2000-03-23 Open Invention Network, Llc Tokenless identification system for authorization of electronic transactions and electronic transmissions
CN106951791A (en) * 2017-04-19 2017-07-14 杭州弗兰科信息安全科技有限公司 A kind of confidential document access control system based on ciphertext
CN107454044A (en) * 2016-06-01 2017-12-08 北京泰克贝思科技股份有限公司 A kind of e-book reading protection of usage right method and system

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8437471B2 (en) * 2010-08-04 2013-05-07 Lawrence P. Huang System for scrambling and methods for use therewith
CN102413100A (en) * 2010-09-25 2012-04-11 盛乐信息技术(上海)有限公司 Voice-print authentication system having voice-print password picture prompting function and realization method thereof
CN104184587B (en) * 2014-08-08 2016-04-20 腾讯科技(深圳)有限公司 Vocal print generation method, server, client and system
CN104821934B (en) * 2015-03-20 2018-11-20 百度在线网络技术(北京)有限公司 Vocal print login method and device based on artificial intelligence
CN105450665B (en) * 2015-12-30 2018-11-06 宇龙计算机通信科技(深圳)有限公司 Safe login method and device, terminal
CN106100846B (en) * 2016-06-02 2019-05-03 百度在线网络技术(北京)有限公司 Voiceprint registration, authentication method and device
CN108040032A (en) * 2017-11-02 2018-05-15 阿里巴巴集团控股有限公司 A kind of voiceprint authentication method, account register method and device
CN108449323B (en) * 2018-02-14 2021-05-25 深圳市声扬科技有限公司 Login authentication method and device, computer equipment and storage medium
CN110265037B (en) * 2019-06-13 2022-09-30 中信银行股份有限公司 Identity verification method and device, electronic equipment and computer readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218738A (en) * 1978-05-05 1980-08-19 International Business Machines Corporation Method for authenticating the identity of a user of an information system
AU1352400A (en) * 1995-05-17 2000-03-23 Open Invention Network, Llc Tokenless identification system for authorization of electronic transactions and electronic transmissions
CN107454044A (en) * 2016-06-01 2017-12-08 北京泰克贝思科技股份有限公司 A kind of e-book reading protection of usage right method and system
CN106951791A (en) * 2017-04-19 2017-07-14 杭州弗兰科信息安全科技有限公司 A kind of confidential document access control system based on ciphertext

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Design and Implementation of an A utomatic Speaker Recognition System using neural and fuzzy logic in Matlab;Shivam Jain等;《2013 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSC)》;全文 *
基于同态加密的声纹模板设计及其分析;朱华虹等;《Computer Engineering and Applications 计算机工程与应用》;全文 *
密文语音检索的语音认证研究;林蓝;《现代商贸工业》(第6期);全文 *

Also Published As

Publication number Publication date
CN111090846A (en) 2020-05-01

Similar Documents

Publication Publication Date Title
CN104408341B (en) Smart phone user identity identifying method based on gyroscope behavioural characteristic
CN106961418A (en) Identity identifying method and identity authorization system
WO2019090834A1 (en) Express cabinet pickup method and apparatus based on voiceprint
WO2016015687A1 (en) Voiceprint verification method and device
CN104598796A (en) Method and system for identifying identity
CN105404809B (en) A kind of identity identifying method and user terminal
CN106572049A (en) Identity verifying apparatus and method
CN101365193A (en) System and method for customer authentication execution based on customer behavior mode
CN108629174B (en) Method and device for checking character strings
CN105847288A (en) Verification code processing method and device
JPWO2012144105A1 (en) Biometric authentication system
CN111090846B (en) Login authentication method, login authentication device, electronic equipment and computer readable storage medium
US11902275B2 (en) Context-based authentication of a user
CN110990811A (en) Identity authentication method and device
CN112507316A (en) User verification method and device, readable storage medium and electronic equipment
KR101972800B1 (en) Method and apparatus for authenticating handwritten signature
WO2020024415A1 (en) Voiceprint recognition processing method and apparatus, electronic device and storage medium
CN112351047B (en) Double-engine based voiceprint identity authentication method, device, equipment and storage medium
JP5584578B2 (en) Biometric information registration / authentication device and registration / authentication method thereof
CN106250755A (en) For generating the method and device of identifying code
CN107507308B (en) Information matching method and device and intelligent door lock
US9773150B1 (en) Method and system for evaluating fingerprint templates
WO2016095564A1 (en) Identity verification method and device
CN105897429A (en) Authentication method, authentication device and terminal
CN110797028A (en) Security authentication method based on voiceprint characteristics and used for police mobile terminal access

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant