CN112507316A - User verification method and device, readable storage medium and electronic equipment - Google Patents

User verification method and device, readable storage medium and electronic equipment Download PDF

Info

Publication number
CN112507316A
CN112507316A CN202110170048.7A CN202110170048A CN112507316A CN 112507316 A CN112507316 A CN 112507316A CN 202110170048 A CN202110170048 A CN 202110170048A CN 112507316 A CN112507316 A CN 112507316A
Authority
CN
China
Prior art keywords
user
registered
verification
mobile phone
voice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110170048.7A
Other languages
Chinese (zh)
Inventor
邓菁
王秋明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yuanjian Information Technology Co Ltd
Original Assignee
Beijing Yuanjian Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yuanjian Information Technology Co Ltd filed Critical Beijing Yuanjian Information Technology Co Ltd
Priority to CN202110170048.7A priority Critical patent/CN112507316A/en
Publication of CN112507316A publication Critical patent/CN112507316A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The application provides a user authentication method, a user authentication device, a readable storage medium and electronic equipment, wherein after receiving an authentication request of a user to be detected, whether a mobile phone number associated with the authentication request is legal is determined; if the verification code is legal, generating a random verification code, detecting whether verification voice is sent by a real person or not based on the received voice verification code of the user to be detected, and judging whether the voice verification code is consistent with the random verification code or not; if the voice is verified to be sent by the real person, and the voice verification code is consistent with the random verification code, determining whether the user to be detected is a legal user or not based on preset voiceprint information associated with the mobile phone number and target voiceprint information in the voice verification code. Therefore, whether the user to be detected is the user to be detected currently is determined by identifying the voice verification code of the user to be detected, and the accuracy of verifying the verification information can be improved while the safety of the user verification process is ensured.

Description

User verification method and device, readable storage medium and electronic equipment
Technical Field
The present application relates to the field of identity authentication technologies, and in particular, to a method and an apparatus for authenticating a user, a readable storage medium, and an electronic device.
Background
At present, most of login verification of network platforms or verification inside the platforms are generally performed by sending corresponding short message verification codes to users, the users enter the platforms by inputting the received short message verification codes on corresponding interfaces on the platforms, and then perform corresponding operations, but the short message verification codes are aiming at the sending of mobile phone numbers of the users, the safety protection level of the short message verification codes is low, the short message verification codes are extremely easy to intercept and crack in the transmission process of the short message verification codes, and the users can log in the corresponding platforms as long as the short message verification codes are obtained, so that how to improve the safety and accuracy of the verification becomes a problem to be solved urgently.
Disclosure of Invention
In view of this, an object of the present application is to provide a user authentication method, device, readable storage medium and electronic device, which determine whether a user to be authenticated is the user to be authenticated currently by identifying a voice verification code of the user to be authenticated, so that the accuracy of authenticating authentication information can be improved while the security of the user authentication process is ensured.
The embodiment of the application provides a user verification method, which comprises the following steps:
after receiving an authentication request of a user to be detected, determining whether a mobile phone number associated with the authentication request is legal;
if the verification code is legal, generating a random verification code, detecting whether verification voice is sent by a real person or not based on the received voice verification code of the user to be detected, and judging whether the voice verification code is consistent with the random verification code or not;
if the verification voice is sent by a real person, and the voice verification code is consistent with the random verification code, determining whether the user to be detected is a legal user or not based on preset voiceprint information associated with the mobile phone number and target voiceprint information in the voice verification code.
Further, after receiving the verification request of the user to be detected, determining whether the mobile phone number associated with the verification request is legal or not includes:
detecting whether the mobile phone number associated with the verification request is consistent with any one of a plurality of prestored registered mobile phone numbers;
and if the mobile phone number associated with the verification request is consistent with any one of a plurality of prestored registered mobile phone numbers, determining that the mobile phone number associated with the verification request is legal.
Further, after the detecting whether the mobile phone number associated with the verification request is consistent with any one of the plurality of pre-stored registered mobile phone numbers, the verification method further includes:
if the mobile phone number associated with the verification request is inconsistent with any one of a plurality of prestored registered mobile phone numbers, determining that the mobile phone number associated with the verification request is illegal;
and generating prompt information for re-inputting the mobile phone number, receiving the updated mobile phone number input by the user to be detected, and determining whether the updated mobile phone number is legal.
Further, after receiving the verification request of the user to be detected, before determining whether the mobile phone number associated with the verification request is legal, the verification method further includes:
receiving a registration request of a user to be registered, and determining whether a registered mobile phone number associated with the registration request is registered;
if the acquired registered mobile phone number of the user to be registered is determined not to be registered, judging whether the user to be registered meets the registration condition; the registration condition comprises that the number of registration voices is larger than or equal to a preset registration number threshold, a plurality of registration voices are all uttered by a real person, and each registration voice is uttered by the same user to be registered;
if the user to be registered meets the registration condition, establishing preset voiceprint information corresponding to the user to be registered;
and storing the preset voiceprint information corresponding to the user to be registered and the registered mobile phone number of the user to be registered in a correlated manner.
Further, it is determined that the user to be registered satisfies the registration condition by:
generating a registration verification code for each registration voice, detecting whether the registration voice is sent by a real person or not based on the received user verification code, and judging whether the user verification code is consistent with the registration verification code or not;
if the registered voice is sent by a real person and the user verification code is consistent with the registered verification code, determining that the registered voice is verified to pass;
detecting whether the number of the verified registered voices corresponding to the registered mobile phone number is larger than a preset registered number threshold value or not;
and if the number of the verified registered voices corresponding to the registered mobile phone number is greater than the threshold registration number threshold and the verified registered voices belong to the same user to be registered, determining that the user to be registered meets the registration condition.
Further, the method comprises the following steps of determining that the registered voices are uttered by the same user to be registered:
extracting the registered voiceprint characteristics in each user verification code;
determining the similarity between the registered voiceprint features in every two user verification codes;
and if the similarity between the registered voiceprint characteristics of every two user verification codes in the plurality of user verification codes is greater than a preset verification threshold, determining that a plurality of verified registered voices corresponding to the registered mobile phone number all belong to the same user to be registered to generate voice.
Further, if the verification voice is sent by a real person and the voice verification code is consistent with the random verification code, determining whether the user to be detected is a legal user based on preset voiceprint information associated with the mobile phone number and target voiceprint information in the voice verification code, and the verification method further includes:
and if the user to be detected is determined to be an illegal user, generating prompt information for prompting the user to be detected to initiate a new verification request, and detecting the user to be detected again.
An embodiment of the present application further provides an authentication apparatus for a user, where the authentication apparatus includes:
the number verification module is used for determining whether the mobile phone number associated with the verification request is legal or not after receiving the verification request of the user to be detected;
the voice verification module is used for generating a random verification code if the verification code is legal, detecting whether verification voice is sent by a real person or not based on the received voice verification code of the user to be detected, and judging whether the voice verification code is consistent with the random verification code or not;
and the user verification module is used for determining whether the user to be detected is a legal user or not based on preset voiceprint information associated with the mobile phone number and target voiceprint information in the voice verification code if the verification voice is sent by a real person and the voice verification code is consistent with the random verification code.
Further, when the number verification module is configured to determine whether the mobile phone number associated with the verification request is legal after receiving the verification request of the user to be detected, the number verification module is configured to:
detecting whether the mobile phone number associated with the verification request is consistent with any one of a plurality of prestored registered mobile phone numbers;
and if the mobile phone number associated with the verification request is consistent with any one of a plurality of prestored registered mobile phone numbers, determining that the mobile phone number associated with the verification request is legal.
Further, the verification device further comprises a number re-verification module, wherein the number re-verification module is configured to:
if the mobile phone number associated with the verification request is inconsistent with any one of a plurality of prestored registered mobile phone numbers, determining that the mobile phone number associated with the verification request is illegal;
and generating prompt information for re-inputting the mobile phone number, receiving the updated mobile phone number input by the user to be detected, and determining whether the updated mobile phone number is legal.
Further, the authentication apparatus further includes a user registration module, and the user registration module is configured to:
receiving a registration request of a user to be registered, and determining whether a registered mobile phone number associated with the registration request is registered;
if the acquired registered mobile phone number of the user to be registered is determined not to be registered, judging whether the user to be registered meets the registration condition; the registration condition comprises that the number of registration voices is larger than or equal to a preset registration number threshold, a plurality of registration voices are all uttered by a real person, and each registration voice is uttered by the same user to be registered;
if the user to be registered meets the registration condition, establishing preset voiceprint information corresponding to the user to be registered;
and storing the preset voiceprint information corresponding to the user to be registered and the registered mobile phone number of the user to be registered in a correlated manner.
Further, the user registration module is configured to determine that the user to be registered satisfies the registration condition by:
generating a registration verification code for each registration voice, detecting whether the registration voice is sent by a real person or not based on the received user verification code, and judging whether the user verification code is consistent with the registration verification code or not;
if the registered voice is sent by a real person and the user verification code is consistent with the registered verification code, determining that the registered voice is verified to pass;
detecting whether the number of the verified registered voices corresponding to the registered mobile phone number is larger than a preset registered number threshold value or not;
and if the number of the verified registered voices corresponding to the registered mobile phone number is greater than the threshold registration number threshold and the verified registered voices belong to the same user to be registered, determining that the user to be registered meets the registration condition.
Further, the user registration module is configured to determine that the registration voices are uttered by the same user to be registered through the following steps:
extracting the registered voiceprint characteristics in each user verification code;
determining the similarity between the registered voiceprint features in every two user verification codes;
and if the similarity between the registered voiceprint characteristics of every two user verification codes in the plurality of user verification codes is greater than a preset verification threshold, determining that a plurality of verified registered voices corresponding to the registered mobile phone number all belong to the same user to be registered to generate voice.
Further, the verification device further comprises a user review module, and the user review module is configured to:
and if the user to be detected is determined to be an illegal user, generating prompt information for prompting the user to be detected to initiate a new verification request, and detecting the user to be detected again.
An embodiment of the present application further provides an electronic device, including: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory communicating over the bus when the electronic device is operating, the machine-readable instructions when executed by the processor performing the steps of the method of authenticating a user as described above.
Embodiments of the present application further provide a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to perform the steps of the user authentication method as described above.
According to the user authentication method, the user authentication device, the readable storage medium and the electronic equipment, after an authentication request of a user to be detected is received, whether a mobile phone number associated with the authentication request is legal or not is determined; if the verification code is legal, generating a random verification code, detecting whether verification voice is sent by a real person or not based on the received voice verification code of the user to be detected, and judging whether the voice verification code is consistent with the random verification code or not; if the verification voice is sent by a real person, and the voice verification code is consistent with the random verification code, determining whether the user to be detected is a legal user or not based on preset voiceprint information associated with the mobile phone number and target voiceprint information in the voice verification code.
Thus, after receiving the verification request of the user to be detected, the validity of the mobile phone number associated with the verification request is determined, generating a random verification code under the condition that the mobile phone number is determined to be legal, detecting whether the voice verification code is sent by a real person or not based on the voice verification code fed back by the user to be detected according to the random verification code, and judges whether the fed back voice verification code is consistent with the random verification code, if it is determined that the verification voice is sent by a real person and the voice verification code is consistent with the random verification code, determining whether the user to be detected is a legal user according to preset voiceprint information associated with the mobile phone number and a target voiceprint in the voice verification code fed back by the user to be detected, thereby avoiding verification errors caused by verification code leakage, the method and the device can improve the accuracy of verifying the verification information while ensuring the safety of the user verification process.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a flowchart of a user authentication method according to an embodiment of the present application;
fig. 2 is a flowchart of another user authentication method provided in an embodiment of the present application;
FIG. 3 is a flow chart of a registration process;
FIG. 4 is a flow chart of a verification process;
fig. 5 is a schematic structural diagram of an authentication apparatus for a user according to an embodiment of the present disclosure;
fig. 6 is a second schematic structural diagram of a user authentication device according to an embodiment of the present application;
fig. 7 is a third schematic structural diagram of an authentication apparatus for a user according to an embodiment of the present application;
fig. 8 is a fourth schematic structural diagram of an authentication apparatus for a user according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. Every other embodiment that can be obtained by a person skilled in the art without making creative efforts based on the embodiments of the present application falls within the protection scope of the present application.
First, an application scenario to which the present application is applicable will be described. The method and the device can be applied to the technical field of identity authentication.
Research shows that at present, most of login verification of network platforms or verification inside the platforms generally carry out verification by sending corresponding short message verification codes to users, and the users enter the platforms by inputting the received short message verification codes on corresponding interfaces on the platforms to further carry out corresponding operations.
Based on this, the embodiment of the application provides a user authentication method to improve the accuracy of user authentication.
Referring to fig. 1, fig. 1 is a flowchart of a user authentication method according to an embodiment of the present disclosure. As shown in fig. 1, the method for authenticating a user provided in the embodiment of the present application includes:
s101, after receiving an authentication request of a user to be detected, determining whether a mobile phone number associated with the authentication request is legal.
In the step, after receiving the verification request of the user to be detected, determining whether the associated mobile phone number in the verification request is legal or not.
Here, the manner in which the user to be detected makes the verification request may be made through a related Application (APP) on an intelligent terminal held by the user to be detected, for example, the user to be detected may click a "obtain voice verification code" control in the APP to make the verification request.
Here, the validity of the mobile phone number associated with the authentication request means whether or not the mobile phone number input in the authentication is a previously registered mobile phone number, that is, whether or not the registered mobile phone number associated with the registered preset voiceprint information coincides with the input mobile phone number. If the mobile phone number is registered, the mobile phone number associated with the verification request is legal, otherwise, the mobile phone number associated with the verification request is illegal.
S102, if the verification code is legal, generating a random verification code, detecting whether verification voice is sent by a real person or not based on the received voice verification code of the user to be detected, and judging whether the voice verification code is consistent with the random verification code or not.
In this step, if it is determined through step S101 that the mobile phone number associated with the verification request is legal, a random verification code is generated, and based on the received voice verification code fed back by the user to be detected according to the random verification code, it is detected whether the verification voice fed back is sent by an authentic person, and it is further determined whether the voice verification code fed back by the user to be detected is consistent with the sent random verification code.
Here, the random authentication code may be generated by using an One-time Password (OTP) technology, which is a technology of dynamically generating a Password according to an algorithm effective for a single login operation of a user or an interaction of the user with a server through a computer or other digital devices.
In the embodiment of the present application, an eight-bit random number string may be generated as the random verification code by the OTP technology, and in other embodiments, a character string may also be randomly generated as the random verification code based on the OTP technology, and the generation process of the random verification code and the specific representation form of the random verification code are not particularly limited.
Here, after the random verification code is generated, in order to ensure that the random verification code is not leaked during transmission, the generated random verification code needs to be encrypted for transmission to ensure the security of the random verification code.
Here, similarly, the voice verification code transmitted back by the user to be detected is also transmitted by encryption, and before the user to be detected is verified based on the voice verification code, the received voice verification code needs to be decrypted first, so as to obtain the original voice verification code of the user to be detected.
Here, for the received voice verification code fed back by the user to be detected, whether the voice verification code is sent by a real person or not needs to be detected, the verification of the step is performed, and the risk that the user to be detected is subjected to voice simulation through means such as recording playback and voice synthesis during voice verification is mainly avoided, so that an account of the user to be detected is revealed.
The technology that whether the received voice verification code fed back by the user to be detected needs to be detected is sent by a real person can be that voice living technology is adopted to carry out real person identification, and voice print characteristics contained in the fed-back voice verification code are detected to further determine whether verification voice is sent by the real person.
Here, the determination of whether the voice authentication code is consistent with the random authentication code is mainly performed by using a voice recognition technology, and comparing the similarity between the voice authentication code and the random authentication code, thereby determining whether the voice authentication code is consistent with the random authentication code.
Taking the random verification code as the random number string as an example, the similarity between the voice verification code and the random verification code may be determined by comparing the similarity between the indicated number at each position in the voice verification code and the number at the corresponding position in the random verification code one by one, and determining the similarity between the voice verification code and the random verification code.
When the similarity between the voice verification code and the random verification code is larger than a preset similarity threshold, whether the voice verification code is consistent with the random verification code or not is determined, and whether the voice of the user to be detected is the content appointed by the background can be determined through judging whether the voice verification code is consistent with the random verification code or not, so that whether the reply of the user to be detected is a real-time reply or not is determined.
And S103, if the verification voice is sent by a real person, and the voice verification code is consistent with the random verification code, determining whether the user to be detected is a legal user or not based on preset voiceprint information associated with the mobile phone number and target voiceprint information in the voice verification code.
In this step, if it is determined that the verification voice is sent by the real person of the user to be detected through the judgment in step S102, and the voice verification code fed back in the verification voice of the user to be detected is consistent with the random verification code (that is, the user to be detected speaks the designated content), it is determined whether the user to be detected is a valid user according to the preset voiceprint information associated with the mobile phone number and the target voiceprint information in the voice verification code fed back by the user to be detected.
When the user registers, voice information of the user is collected, voiceprint information of a local voice is established for each user, whether the user speaks himself or herself is judged according to the voiceprint information of each user, and after the voiceprint information is established for each user, the voiceprint information of the same user and the corresponding mobile phone number are stored in an associated mode, so that the corresponding voiceprint information can be found out according to the mobile phone number provided by the user to be detected in the verification process, and the user to be detected is verified whether the user to be detected is the user himself or not.
Here, the step of determining whether the user to be detected is a valid user based on the preset voiceprint information associated with the mobile phone number and the target voiceprint information in the voice verification code may be: and detecting whether the similarity between the preset voiceprint information associated with the mobile phone number and the target voiceprint information in the voice verification code is greater than a preset similarity threshold, if so, determining whether the user to be detected is a legal user, otherwise, determining whether the user to be detected is an illegal user.
Here, the step of determining whether the user to be detected is a valid user based on the preset voiceprint information associated with the mobile phone number and the target voiceprint information in the voice verification code may further include:
and inputting preset voiceprint information associated with the mobile phone number and target voiceprint information in the voice verification code into a pre-trained user identification model, and determining whether the user to be detected is a legal user or not according to the output result of the two-classification user identification model.
According to the terminal user verification method provided by the embodiment of the application, after a verification request of a user to be detected is received, whether a mobile phone number associated with the verification request is legal or not is determined; if the verification code is legal, generating a random verification code, detecting whether verification voice is sent by a real person or not based on the received voice verification code of the user to be detected, and judging whether the voice verification code is consistent with the random verification code or not; if the verification voice is sent by a real person, and the voice verification code is consistent with the random verification code, determining whether the user to be detected is a legal user or not based on preset voiceprint information associated with the mobile phone number and target voiceprint information in the voice verification code.
Thus, after receiving the verification request of the user to be detected, the validity of the mobile phone number associated with the verification request is determined, generating a random verification code under the condition that the mobile phone number is determined to be legal, detecting whether the voice verification code is sent by a real person or not based on the voice verification code fed back by the user to be detected according to the random verification code, and judges whether the fed back voice verification code is consistent with the random verification code, if it is determined that the verification voice is sent by a real person and the voice verification code is consistent with the random verification code, determining whether the user to be detected is a legal user according to preset voiceprint information associated with the mobile phone number and a target voiceprint in the voice verification code fed back by the user to be detected, thereby avoiding verification errors caused by verification code leakage, the method and the device can improve the accuracy of verifying the verification information while ensuring the safety of the user verification process.
Referring to fig. 2, fig. 2 is a flowchart of another user authentication method according to an embodiment of the present disclosure. As shown in fig. 2, the method for authenticating a user according to the embodiment of the present application includes:
s201, after receiving a verification request of a user to be detected, determining whether a mobile phone number associated with the verification request is legal.
S202, if the verification code is legal, generating a random verification code, detecting whether verification voice is sent by a real person or not based on the received voice verification code of the user to be detected, and judging whether the voice verification code is consistent with the random verification code or not.
And S203, if the verification voice is sent by a real person, and the voice verification code is consistent with the random verification code, determining whether the user to be detected is a legal user or not based on preset voiceprint information associated with the mobile phone number and target voiceprint information in the voice verification code.
And S204, generating prompt information for prompting the user to be detected to initiate a new verification request if the user to be detected is determined to be an illegal user, and detecting the user to be detected again.
In this step, if it is determined that the user to be detected is an illegal user through step S203, a message indicating that the verification fails may be fed back to the user to be detected, and corresponding prompt information may be generated to prompt the user to re-perform the verification request, and the user to be detected may be re-verified according to the verification request provided by the user to be detected.
Here, the message that the authentication fails is fed back to the user to be detected, the user to be detected may be prompted by the APP end that the user provided the authentication request, or the prompt message may be sent to the mobile phone number associated with the authentication request provided by the user to be detected, so as to prompt the user to be detected that the authentication fails.
Here, for the user to be detected, it may be that the verification fails due to some reasons (e.g., a wrong-looking verification code), and the user to be detected may be prompted again to make a verification request, and the user to be detected may be verified again, so as to avoid that the user to be detected has a mistake in verification due to misoperation of the user to be detected.
The number of times of re-verification of the user to be detected is limited, when the number of times of repeatedly submitting verification requests by the user to be detected within a preset time period is larger than a preset threshold value, the user to be detected is determined to be an illegal user, and the verification process is terminated.
The descriptions of S201 to S203 may refer to the descriptions of S101 to S103, and the same technical effects can be achieved, which are not described in detail.
Further, step S201 includes: detecting whether the mobile phone number associated with the verification request is consistent with any one of a plurality of prestored registered mobile phone numbers; if the mobile phone number associated with the verification request is consistent with any one of a plurality of prestored registered mobile phone numbers, determining that the mobile phone number associated with the verification request is legal; and if the mobile phone number associated with the verification request is not consistent with any one of the prestored plurality of registered mobile phone numbers, determining that the mobile phone number associated with the verification request is illegal.
In this step, it is detected whether the mobile phone number associated with the verification request is consistent with any one of the plurality of prestored registered mobile phone numbers, and if it is determined that the mobile phone number associated with the verification request is consistent with any one of the plurality of prestored registered mobile phone numbers, it is determined that the mobile phone number associated with the verification request is legal, that is, the mobile phone number associated with the verification request is registered in the registration process before the verification process.
Here, before the authentication process, the user may register on the platform, and when registering, the user may bind a mobile phone number, and when logging in the platform, the user needs to log in by using the mobile phone number registered by the user before, that is, only the registered mobile phone number is legal for the platform.
Here, the fact that the mobile phone number associated with the authentication request is consistent with the mobile phone number stored in advance means that: the digits of the two numbers are consistent, and the numbers at the corresponding positions of each digit are the same.
Further, after the detecting whether the mobile phone number associated with the verification request is consistent with any one of the plurality of pre-stored registered mobile phone numbers, the verification method further includes: if the mobile phone number associated with the verification request is inconsistent with any one of a plurality of prestored registered mobile phone numbers, determining that the mobile phone number associated with the verification request is illegal; and generating prompt information for re-inputting the mobile phone number, receiving the updated mobile phone number input by the user to be detected, and determining whether the updated mobile phone number is legal.
In the step, if the mobile phone number associated with the verification request is determined to be inconsistent with any one of the prestored plurality of registered mobile phone numbers, determining that the mobile phone number associated with the verification request is illegal, namely that the mobile phone number associated with the verification request is not registered in the registration process before the verification process; and generating prompt information for re-inputting the mobile phone number, receiving the updated mobile phone number input by the user to be detected, and verifying the validity of the updated mobile phone number again according to the updated mobile phone number.
Here, considering that an extreme case that the mobile phone number is wrongly input when the user to be detected makes a verification request may exist, after it is determined that the mobile phone number input by the user to be detected is an unregistered illegal mobile phone number, the user to be detected may be prompted that the mobile phone number is wrongly input and needs to be input again, and then the user to be detected is verified again according to the updated mobile phone number input by the user to be detected.
Here, similarly, the number of times of re-inputting the mobile phone number of the user to be detected is limited, and when the number of times of re-inputting the mobile phone number repeatedly proposed by the user to be detected within the preset time period is greater than the preset threshold value, it is determined that the user to be detected is an illegal user, and the verification process is terminated.
Further, before step S201, the verification method further includes: receiving a registration request of a user to be registered, and determining whether a registered mobile phone number associated with the registration request is registered; if the acquired registered mobile phone number of the user to be registered is determined not to be registered, judging whether the user to be registered meets the registration condition; the registration condition comprises that the number of registration voices is larger than or equal to a preset registration number threshold, a plurality of registration voices are all uttered by a real person, and each registration voice is uttered by the same user to be registered; if the user to be registered meets the registration condition, establishing preset voiceprint information corresponding to the user to be registered; and storing the preset voiceprint information corresponding to the user to be registered and the registered mobile phone number of the user to be registered in a correlated manner.
In the step, after receiving a registration request of a user to be registered, determining whether a registered mobile phone number associated with the registration request is registered; if the acquired registered mobile phone number of the user to be registered is determined not to be registered, whether the user to be registered meets the corresponding registration condition is judged, if yes, the user to be registered meets the registration condition, preset voiceprint information corresponding to the user to be registered is established, and the preset voiceprint information corresponding to the user to be registered and the registered mobile phone number of the user to be registered are stored in an associated mode.
Here, before authenticating the user to be detected, a registration process needs to be performed first to provide a corresponding authentication reference for the authentication process.
Here, after receiving the registration request of the user to be registered, it is necessary to determine whether the registered mobile phone number proposed by the user to be registered is registered, if it is determined that the registered mobile phone number proposed by the user to be registered is registered, the subsequent verification step is not performed, and "registered" is fed back to prompt the user to be registered that the registered mobile phone number is registered and repeated registration is not performed.
After the preset voiceprint information of the user to be registered is determined, the preset voiceprint information of the user to be registered is stored in association with the registered mobile phone number, so that the corresponding preset voiceprint information is determined according to the mobile phone number in the subsequent verification process, the user is verified, and after the preset voiceprint information of the user to be registered is determined to be stored in place in association with the registered mobile phone number, the registration process is ended.
Further, it is determined that the user to be registered satisfies the registration condition by: generating a registration verification code for each registration voice, detecting whether the registration voice is sent by a real person or not based on the received user verification code, and judging whether the user verification code is consistent with the registration verification code or not; if the registered voice is sent by a real person and the user verification code is consistent with the registered verification code, determining that the registered voice is verified to pass; detecting whether the number of the verified registered voices corresponding to the registered mobile phone number is larger than a preset registered number threshold value or not; and if the number of the verified registered voices corresponding to the registered mobile phone number is greater than the threshold registration number threshold and the verified registered voices belong to the same user to be registered, determining that the user to be registered meets the registration condition.
In the step, for each piece of registration voice, if the obtained registration mobile phone number of the user to be registered is determined not to be registered, a registration verification code is generated, whether the registration voice is sent by a real person or not is detected based on the received user verification code, whether the received user verification code is consistent with the registration verification code or not is judged, and if the registration voice is determined to be sent by the real person and the user verification code is consistent with the registration verification code, the registration voice is determined to pass verification; and simultaneously detecting whether the number of verified registered voices corresponding to the registered mobile phone number is greater than a preset registered number threshold value or not, determining that a plurality of verified registered voices corresponding to the registered mobile phone number belong to the same user to be registered, and determining that the user to be registered meets the registration condition.
Here, if it is determined that the registered mobile phone number is not registered, a corresponding registration verification code is randomly generated, whether the user to be registered is a real person or not and the voice spoken by the user to be registered are verified according to the registration verification code, and a specific verification process is consistent with a verification process in a verification process, which is not described herein again.
Here, in the process of verifying the user to be registered, the background may count the registered voice of the user to be registered, and meanwhile, count whether the number of the registered voice passing the verification is greater than a preset registration number threshold, if so, perform the judgment before establishing the preset voiceprint information, and if so, repeat the voice judgment section and the collection process until the number of the registered voice passing the verification is greater than the preset registration number threshold.
The preset registration number threshold may be set according to specific requirements, and may be 5, and is not specifically limited herein.
Here, after the number of verified registered voices is greater than the preset registration number threshold, it needs to be determined whether multiple registered voices under the same registered mobile phone number belong to the same user to be registered, if the multiple registered voices belong to the same user to be registered, corresponding voiceprint features in each registered voice are extracted, a part with consistent features in each voiceprint feature is extracted, and preset voiceprint information of the user to be registered is generated.
Further, the following steps are used for determining that the registered voices are uttered by the same user to be registered: extracting the registered voiceprint characteristics in each user verification code; determining the similarity between the registered voiceprint features in every two user verification codes; and if the similarity between the registered voiceprint characteristics of every two user verification codes in the plurality of user verification codes is greater than a preset verification threshold, determining that a plurality of verified registered voices corresponding to the registered mobile phone number all belong to the same user to be registered to generate voice.
In the step, registered voiceprint features in each user verification code under the same registered mobile phone number are extracted, the similarity between the registered voiceprint features in every two user verification codes is determined one by one, and if the similarity between the registered voiceprint features in every two user verification codes in the multiple user verification codes is larger than a preset verification threshold value, each user verification code under the same registered mobile phone number is determined to be from the same user to be registered.
Here, when determining whether the same registered mobile phone number belongs to the same user to be registered, in addition to the above calculation for the similarity between every two user verification codes, it may also be determined whether each user verification code under the same registered mobile phone number is from the same user to be registered through a pre-trained voice recognition model.
The verification implementation process of the application is explained aiming at a specific terminal server interaction scene, the verification implementation process comprises two processes, namely a registration process, and after the completion of registration is determined, a strict verification process is carried out:
1. referring to fig. 3, fig. 3 is a flowchart of a registration process, and as shown in fig. 3, the steps of the registration process are:
a) the user clicks on the APP for "voiceprint registration";
b) the APP sends the mobile phone number of the user and a registration request to a server;
c) the server side judges whether the mobile phone number is registered or not, and if the mobile phone number is registered, the server side returns to the registered state; if not, entering a voiceprint registration process;
d) the server side generates an 8-bit random digit string through the OTP technology, and the 8-bit random digit string is encrypted and then sent to the APP side;
e) after the APP decrypts the data, the data are displayed on a screen, and a user is prompted to read the displayed numeric strings;
f) after the APP collects the user voice, encrypting and sending the user voice to a server;
g) after the server decrypts the voice data, judging whether the voice is spoken by a real person through a voice living technology; judging whether the content of the voice is consistent with the prompt numeric string or not through a voice recognition technology; if the verification of the steps is passed, judging whether the requirement of the number of the registered voices is met, such as 5. If not, repeating the steps d) -g);
h) if the requirement of registering the number of the users is met, whether the obtained voice belongs to the same person is judged through the detection of the same speaker, if so, a voiceprint model of the user is established, and a registration result is returned to the APP terminal;
i) and the APP terminal acquires the registration result and feeds the registration result back to the user to complete the voiceprint registration operation.
2. Referring to fig. 4, fig. 4 is a flowchart of a verification process, as shown in fig. 4, the steps of the verification process are:
a) firstly, clicking 'obtaining a voice verification code' at an APP end by a user;
b) the APP sends the mobile phone number obtained by the user and the verification request to the server side;
c) the server side firstly verifies the validity of the mobile phone number. If the user is not registered, returning the user absence message to the APP terminal, and after the APP terminal acquires the message, feeding back the message to the user to complete the verification operation; if the user is registered, generating an 8-bit random number string by using the OTP technology, generating digital voice by using the voice synthesis technology, and dialing the mobile phone number of the user by an operator;
d) after the user receives the voice verification code, the user speaks the voice verification code within a specified time and hangs up.
e) After the server side obtains the voice of the user, whether the voice is spoken by a real person is judged through a voice living body technology; judging whether the content of the voice is consistent with the content of the prompted verification code through a voice recognition technology; and calling a voiceprint model of the user according to the mobile phone number, carrying out voiceprint verification on the voiceprint model and the user voice, and judging the validity of the user identity according to the similarity and a judgment threshold (such as 50 minutes). If the authentication passes through the steps, the user is considered to be a legal user, otherwise, the user is an illegal user;
f) the server side sends the verification result to the APP side, and the APP side feeds back the result to the user after obtaining the result, so that the verification operation is completed.
According to the user authentication method provided by the embodiment of the application, after an authentication request of a user to be detected is received, whether a mobile phone number associated with the authentication request is legal or not is determined; if the verification code is legal, generating a random verification code, detecting whether verification voice is sent by a real person or not based on the received voice verification code of the user to be detected, and judging whether the voice verification code is consistent with the random verification code or not; if the verification voice is sent by a real person, and the voice verification code is consistent with the random verification code, determining whether the user to be detected is a legal user or not based on preset voiceprint information associated with the mobile phone number and target voiceprint information in the voice verification code; and if the user to be detected is determined to be an illegal user, generating prompt information for prompting the user to be detected to initiate a new verification request, and detecting the user to be detected again.
Thus, after receiving the verification request of the user to be detected, the validity of the mobile phone number associated with the verification request is determined, generating a random verification code under the condition that the mobile phone number is determined to be legal, detecting whether the voice verification code is sent by a real person or not based on the voice verification code fed back by the user to be detected according to the random verification code, and judges whether the fed back voice verification code is consistent with the random verification code, if it is determined that the verification voice is sent by a real person and the voice verification code is consistent with the random verification code, determining whether the user to be detected is a legal user according to preset voiceprint information associated with the mobile phone number and a target voiceprint in the voice verification code fed back by the user to be detected, thereby avoiding verification errors caused by verification code leakage, the method and the device can improve the accuracy of verifying the verification information while ensuring the safety of the user verification process.
Furthermore, in the prior art, the safety protection level of the short message verification code is low, the verification safety level can be effectively improved through the voice verification code in the application, meanwhile, whether the user is the user himself or not is further determined through voice verification comparison, the mobile phone loss of the user is effectively avoided, and the loss of the user caused by the fact that the user account is stolen is avoided because the non-user himself obtains the short message verification code through the mobile phone.
Please refer to fig. 5 to 8, fig. 5 is a first schematic structural diagram of a user authentication device according to an embodiment of the present disclosure, fig. 6 is a second schematic structural diagram of a user authentication device according to an embodiment of the present disclosure, fig. 7 is a third schematic structural diagram of a user authentication device according to an embodiment of the present disclosure, and fig. 8 is a fourth schematic structural diagram of a user authentication device according to an embodiment of the present disclosure. As shown in fig. 5, the authentication apparatus 500 includes:
a number verification module 510, configured to determine whether a mobile phone number associated with a verification request is legal after receiving the verification request of a user to be detected;
a voice verification module 520, configured to generate a random verification code if the verification code is legal, detect whether verification voice is sent by a real person based on the received voice verification code of the user to be detected, and determine whether the voice verification code is consistent with the random verification code;
a user verification module 530, configured to determine whether the user to be detected is a valid user based on preset voiceprint information associated with the mobile phone number and target voiceprint information in the voice verification code if the verification voice is sent by an authentic person and the voice verification code is consistent with the random verification code.
Further, as shown in fig. 6, the verification apparatus 500 further includes a number re-verification module 540, where the number re-verification module 540 is configured to:
if the mobile phone number associated with the verification request is inconsistent with any one of a plurality of prestored registered mobile phone numbers, determining that the mobile phone number associated with the verification request is illegal;
and generating prompt information for re-inputting the mobile phone number, receiving the updated mobile phone number input by the user to be detected, and determining whether the updated mobile phone number is legal.
Further, as shown in fig. 7, the authentication apparatus 500 further includes a user registration module 550, where the user registration module 550 is configured to:
receiving a registration request of a user to be registered, and determining whether a registered mobile phone number associated with the registration request is registered;
if the acquired registered mobile phone number of the user to be registered is determined not to be registered, judging whether the user to be registered meets the registration condition; the registration condition comprises that the number of registration voices is larger than or equal to a preset registration number threshold, a plurality of registration voices are all uttered by a real person, and each registration voice is uttered by the same user to be registered;
if the user to be registered meets the registration condition, establishing preset voiceprint information corresponding to the user to be registered;
and storing the preset voiceprint information corresponding to the user to be registered and the registered mobile phone number of the user to be registered in a correlated manner.
Further, as shown in fig. 8, the authentication apparatus 500 further includes a user review module 560, where the user review module 560 is configured to:
and if the user to be detected is determined to be an illegal user, generating prompt information for prompting the user to be detected to initiate a new verification request, and detecting the user to be detected again.
Further, when the number verification module 510 is configured to determine whether the mobile phone number associated with the verification request is legal after receiving the verification request of the user to be detected, the number verification module 510 is configured to:
detecting whether the mobile phone number associated with the verification request is consistent with any one of a plurality of prestored registered mobile phone numbers;
and if the mobile phone number associated with the verification request is consistent with any one of a plurality of prestored registered mobile phone numbers, determining that the mobile phone number associated with the verification request is legal.
Further, the user registration module 550 is configured to determine that the user to be registered satisfies the registration condition by:
generating a registration verification code for each registration voice, detecting whether the registration voice is sent by a real person or not based on the received user verification code, and judging whether the user verification code is consistent with the registration verification code or not;
if the registered voice is sent by a real person and the user verification code is consistent with the registered verification code, determining that the registered voice is verified to pass;
detecting whether the number of the verified registered voices corresponding to the registered mobile phone number is larger than a preset registered number threshold value or not;
and if the number of the verified registered voices corresponding to the registered mobile phone number is greater than the threshold registration number threshold and the verified registered voices belong to the same user to be registered, determining that the user to be registered meets the registration condition.
Further, the user registration module 550 is configured to determine that the registered voices utter the same user to be registered by:
extracting the registered voiceprint characteristics in each user verification code;
determining the similarity between the registered voiceprint features in every two user verification codes;
and if the similarity between the registered voiceprint characteristics of every two user verification codes in the plurality of user verification codes is greater than a preset verification threshold, determining that a plurality of verified registered voices corresponding to the registered mobile phone number all belong to the same user to be registered to generate voice.
The user authentication device provided by the embodiment of the application determines whether a mobile phone number associated with an authentication request is legal or not after receiving the authentication request of a user to be detected; if the verification code is legal, generating a random verification code, detecting whether verification voice is sent by a real person or not based on the received voice verification code of the user to be detected, and judging whether the voice verification code is consistent with the random verification code or not; if the verification voice is sent by a real person, and the voice verification code is consistent with the random verification code, determining whether the user to be detected is a legal user or not based on preset voiceprint information associated with the mobile phone number and target voiceprint information in the voice verification code.
Thus, after receiving the verification request of the user to be detected, the validity of the mobile phone number associated with the verification request is determined, generating a random verification code under the condition that the mobile phone number is determined to be legal, detecting whether the voice verification code is sent by a real person or not based on the voice verification code fed back by the user to be detected according to the random verification code, and judges whether the fed back voice verification code is consistent with the random verification code, if it is determined that the verification voice is sent by a real person and the voice verification code is consistent with the random verification code, determining whether the user to be detected is a legal user according to preset voiceprint information associated with the mobile phone number and a target voiceprint in the voice verification code fed back by the user to be detected, thereby avoiding verification errors caused by verification code leakage, the method and the device can improve the accuracy of verifying the verification information while ensuring the safety of the user verification process.
Referring to fig. 9, fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. As shown in fig. 9, the electronic device 900 includes a processor 910, a memory 920, and a bus 930.
The memory 920 stores machine-readable instructions executable by the processor 910, when the electronic device 900 runs, the processor 910 communicates with the memory 920 through the bus 930, and when the machine-readable instructions are executed by the processor 910, the steps of the user authentication method in the method embodiments shown in fig. 1 and fig. 2 may be performed.
An embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the user authentication method in the method embodiments shown in fig. 1 and fig. 2 may be executed.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer-readable storage medium executable by a processor. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the exemplary embodiments of the present application, and are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A method of authenticating a user, the method comprising:
after receiving an authentication request of a user to be detected, determining whether a mobile phone number associated with the authentication request is legal;
if the verification code is legal, generating a random verification code, detecting whether verification voice is sent by a real person or not based on the received voice verification code of the user to be detected, and judging whether the voice verification code is consistent with the random verification code or not;
if the verification voice is sent by a real person, and the voice verification code is consistent with the random verification code, determining whether the user to be detected is a legal user or not based on preset voiceprint information associated with the mobile phone number and target voiceprint information in the voice verification code.
2. The authentication method according to claim 1, wherein determining whether the mobile phone number associated with the authentication request is legal after receiving the authentication request of the user to be detected comprises:
detecting whether the mobile phone number associated with the verification request is consistent with any one of a plurality of prestored registered mobile phone numbers;
and if the mobile phone number associated with the verification request is consistent with any one of a plurality of prestored registered mobile phone numbers, determining that the mobile phone number associated with the verification request is legal.
3. The authentication method according to claim 2, wherein after said detecting whether the mobile phone number associated with the authentication request coincides with any one of a plurality of registered mobile phone numbers stored in advance, the authentication method further comprises:
if the mobile phone number associated with the verification request is not consistent with any one of a plurality of prestored registered mobile phone numbers, determining that the mobile phone number associated with the verification request is illegal;
and generating prompt information for re-inputting the mobile phone number, receiving the updated mobile phone number input by the user to be detected, and determining whether the updated mobile phone number is legal.
4. The authentication method according to claim 1, wherein before receiving authentication of a user to be detected, the authentication method further comprises:
receiving a registration request of a user to be registered, and determining whether a registered mobile phone number associated with the registration request is registered;
if the acquired registered mobile phone number of the user to be registered is determined not to be registered, judging whether the user to be registered meets the registration condition; the registration condition comprises that the number of registration voices is larger than or equal to a preset registration number threshold, a plurality of registration voices are all uttered by a real person, and each registration voice is uttered by the same user to be registered;
if the user to be registered meets the registration condition, establishing preset voiceprint information corresponding to the user to be registered;
and storing the preset voiceprint information corresponding to the user to be registered and the registered mobile phone number of the user to be registered in a correlated manner.
5. The authentication method according to claim 4, wherein it is determined that the user to be registered satisfies the registration condition by:
generating a registration verification code for each registration voice, detecting whether the registration voice is sent by a real person or not based on the received user verification code, and judging whether the user verification code is consistent with the registration verification code or not;
if the registered voice is sent by a real person and the user verification code is consistent with the registered verification code, determining that the registered voice is verified to pass;
detecting whether the number of the verified registered voices corresponding to the registered mobile phone number is larger than a preset registered number threshold value or not;
and if the number of the verified registered voices corresponding to the registered mobile phone number is greater than the threshold registration number threshold and the verified registered voices belong to the same user to be registered, determining that the user to be registered meets the registration condition.
6. The authentication method according to claim 4, wherein the respective registered voices are determined to be uttered by the same user to be registered by:
extracting the registered voiceprint characteristics in each user verification code;
determining the similarity between the registered voiceprint features in every two user verification codes;
and if the similarity between the registered voiceprint characteristics of every two user verification codes in the plurality of user verification codes is greater than a preset verification threshold, determining that a plurality of verified registered voices corresponding to the registered mobile phone number all belong to the same user to be registered to generate voice.
7. An authentication apparatus of a user, the authentication apparatus comprising:
the number verification module is used for determining whether the mobile phone number associated with the verification request is legal or not after receiving the verification request of the user to be detected;
the voice verification module is used for generating a random verification code if the verification code is legal, detecting whether verification voice is sent by a real person or not based on the received voice verification code of the user to be detected, and judging whether the voice verification code is consistent with the random verification code or not;
and the user verification module is used for determining whether the user to be detected is a legal user or not based on preset voiceprint information associated with the mobile phone number and target voiceprint information in the voice verification code if the verification voice is sent by a real person and the voice verification code is consistent with the random verification code.
8. The verification device according to claim 7, wherein the number verification module, when configured to determine whether the mobile phone number associated with the verification request is legal after receiving the verification request of the user to be detected, is configured to:
detecting whether the mobile phone number associated with the verification request is consistent with any one of a plurality of prestored registered mobile phone numbers;
and if the mobile phone number associated with the verification request is consistent with any one of a plurality of prestored registered mobile phone numbers, determining that the mobile phone number associated with the verification request is legal.
9. An electronic device, comprising: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory communicating over the bus when the electronic device is running, the machine-readable instructions when executed by the processor performing the steps of the method of authenticating a user according to any one of claims 1 to 6.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, performs the steps of the method for authenticating a user according to any one of claims 1 to 6.
CN202110170048.7A 2021-02-08 2021-02-08 User verification method and device, readable storage medium and electronic equipment Pending CN112507316A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110170048.7A CN112507316A (en) 2021-02-08 2021-02-08 User verification method and device, readable storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110170048.7A CN112507316A (en) 2021-02-08 2021-02-08 User verification method and device, readable storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN112507316A true CN112507316A (en) 2021-03-16

Family

ID=74952786

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110170048.7A Pending CN112507316A (en) 2021-02-08 2021-02-08 User verification method and device, readable storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN112507316A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113242551A (en) * 2021-06-08 2021-08-10 中国银行股份有限公司 Mobile banking login verification method and device
CN113422781A (en) * 2021-07-03 2021-09-21 深圳市泰壹格物信息技术有限公司 Voice verification code sending system based on 5G message service
CN114640521A (en) * 2022-03-18 2022-06-17 成都商汤科技有限公司 Registration method and device, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102402985A (en) * 2010-09-14 2012-04-04 盛乐信息技术(上海)有限公司 Voiceprint authentication system for improving voiceprint identification safety and method for realizing the same
CN104184587A (en) * 2014-08-08 2014-12-03 腾讯科技(深圳)有限公司 Voiceprint generation method, voiceprint generation server, client and voiceprint generation system
CN109493872A (en) * 2018-12-13 2019-03-19 北京三快在线科技有限公司 Voice messaging verification method and device, electronic equipment, storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102402985A (en) * 2010-09-14 2012-04-04 盛乐信息技术(上海)有限公司 Voiceprint authentication system for improving voiceprint identification safety and method for realizing the same
CN104184587A (en) * 2014-08-08 2014-12-03 腾讯科技(深圳)有限公司 Voiceprint generation method, voiceprint generation server, client and voiceprint generation system
CN109493872A (en) * 2018-12-13 2019-03-19 北京三快在线科技有限公司 Voice messaging verification method and device, electronic equipment, storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113242551A (en) * 2021-06-08 2021-08-10 中国银行股份有限公司 Mobile banking login verification method and device
CN113422781A (en) * 2021-07-03 2021-09-21 深圳市泰壹格物信息技术有限公司 Voice verification code sending system based on 5G message service
CN114640521A (en) * 2022-03-18 2022-06-17 成都商汤科技有限公司 Registration method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US20220398594A1 (en) Pro-active identity verification for authentication of transaction initiated via non-voice channel
US11847199B2 (en) Remote usage of locally stored biometric authentication data
CN111414599A (en) Identity authentication method, device, terminal, server and readable storage medium
CN112507316A (en) User verification method and device, readable storage medium and electronic equipment
CN111241517B (en) Method and device for constructing biological feature verification question-answer library
CN106453205B (en) identity verification method and device
US10027485B1 (en) System and method for device registration and authentication
KR100992573B1 (en) Authentication method and system using mobile terminal
US10694029B1 (en) Validating automatic number identification data
US11057372B1 (en) System and method for authenticating a user to provide a web service
JP2018532301A (en) User authentication method and apparatus
US20180316661A1 (en) Method and apparatus for providing client-side score-based authentication
CN105337997B (en) Login method of application client and related equipment
WO2016015687A1 (en) Voiceprint verification method and device
CN108055238B (en) Account verification method and system
CN110691085B (en) Login method, login device, password management system and computer readable medium
WO2014166362A1 (en) Method, server, client and system for verifying verification codes
CN107533598B (en) Input method and device of login password of application program and terminal
CN112000951A (en) Access method, device, system, electronic equipment and storage medium
CN105141427A (en) Login authentication method, device and system based on voiceprint recognition
EP3118760B1 (en) Authentication information management system, authentication information management device, program, recording medium, and authentication information management method
KR20170049317A (en) Apparatus and method for authenticating using speech recognition
JP2002269047A (en) Sound user authentication system
CN111200591A (en) Multiple man-machine verification method, device, equipment and storage medium
KR20200004666A (en) Biometric information authentication system using machine learning and block chain and its method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210316

RJ01 Rejection of invention patent application after publication