CN112597465A - Voice password verification method and verification device - Google Patents

Voice password verification method and verification device Download PDF

Info

Publication number
CN112597465A
CN112597465A CN202011045806.4A CN202011045806A CN112597465A CN 112597465 A CN112597465 A CN 112597465A CN 202011045806 A CN202011045806 A CN 202011045806A CN 112597465 A CN112597465 A CN 112597465A
Authority
CN
China
Prior art keywords
sound
verification
password
knocking
voice password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011045806.4A
Other languages
Chinese (zh)
Inventor
胡丙良
何玉华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Quantong Jinxin Holdings Guangdong Co ltd
Original Assignee
Quantong Jinxin Holdings Guangdong Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Quantong Jinxin Holdings Guangdong Co ltd filed Critical Quantong Jinxin Holdings Guangdong Co ltd
Priority to CN202011045806.4A priority Critical patent/CN112597465A/en
Publication of CN112597465A publication Critical patent/CN112597465A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The invention provides a voice password verification method and a voice password verification device, wherein the voice password verification method is characterized by comprising the following steps: the method comprises the following steps: according to the verification password, knocking to generate knocking sound and knocking rhythm; the terminal collects the knocking sound to form a sound wave frequency spectrum; and identifying wave crests, the number of continuous wave crests and the interval time period threshold number between the wave crests in the sound wave frequency spectrum, and converting the wave crests into character information to be verified. The voice password authentication method has the advantages that the user does not need to speak in the open, the problem of embarrassment in public environment or environment with other people nearby is avoided, the user does not need to speak towards the mobile internet terminal suddenly, or particularly, the problem of difficulty in opening the open mobile internet terminal is solved when the user is famous, and meanwhile, the privacy is prevented from being revealed.

Description

Voice password verification method and verification device
Technical Field
The invention relates to information technology, in particular to a voice password verification method and a voice password verification device.
Background
The verification code technology is used for preventing malicious password cracking, ticket swiping and automatic system operation, and can effectively prevent a hacker from making continuous login attempts on a specific registered user in a brute force cracking mode of a specific program. At present, the verification code technology is applied to mobile internet terminal equipment, and common implementation modes include: 1. displaying the corresponding character verification code, and inputting the same character content by a user for verification; 2. moving the local image on the picture to a designated position for verification; 3. displaying a curve on the graph, and copying the curve by a user; 4. the user receives the relevant password and reads out the password by voice for verification.
The voice verification is carried out, and the embarrassing problem exists in the public environment or the environment with other people nearby, namely, a user needs to talk to the mobile internet terminal suddenly, or the user is difficult to open the mobile internet terminal especially when the user is famous.
Disclosure of Invention
The invention mainly aims to overcome the defects of the prior art and provides a voice password verification method and a voice password verification device.
The voice password verification method is characterized by comprising the following steps: the method comprises the following steps:
according to the verification password, knocking to generate knocking sound and knocking rhythm;
the terminal collects the knocking sound to form a sound wave frequency spectrum;
and identifying wave crests, the number of continuous wave crests and the interval time period threshold number between the wave crests in the sound wave frequency spectrum, and converting the wave crests into character information to be verified.
An authentication apparatus, comprising:
the verification information prompting module is used for prompting voice password verification operation;
the audio acquisition module is used for acquiring a sample of the voice password and acquiring the knocking sound of the user to form a sound wave frequency spectrum;
the audio identification module is used for extracting wave crests, the times of continuous wave crests and interval time periods among discontinuous wave crests according to the collected sound wave frequency spectrum;
the verification information conversion module is used for converting the information identified by the audio identification module into character information of a password to be verified;
and the comparison module is used for comparing the pre-recorded or preset password.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the structures shown in the drawings without creative efforts.
FIG. 1 is a diagram of an application scenario of a voice password authentication method in a preferred embodiment;
FIG. 2 is one of the process flow diagrams in a preferred embodiment;
FIG. 3 is a second flow chart of a method in a preferred embodiment;
fig. 4 is a block diagram of the structure of an authentication device in a preferred embodiment.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present specification. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the specification, as detailed in the appended claims.
The terminology used in the description herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the description. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information, without departing from the scope of the present specification. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
Referring to fig. 1, the voice password authentication method provided in the present application may be applied to an application environment shown in fig. 1. In which a terminal 110 communicates with a server 120 through a network, and a user 100 operates the terminal 110 through an input device. The terminal 110 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 120 may be implemented by an independent server or a server cluster formed by a plurality of servers.
In an embodiment, as shown in fig. 2, a voice password authentication method is provided, which is described by taking the method as an example applied to the terminal in fig. 1, but the method is not limited to be implemented only on the terminal, and specifically includes the following steps: s01, displaying verification prompt information
The prompt message may be a message that is verified in voice verification, such as a number less than ten, and a message that is also used to prompt the user to perform an operation, such as "please click on a displayed number".
In one embodiment, an online verification mode and an identification mode are verified; the terminal firstly identifies the identification mode of the current verification, and if the identification mode is a simple online verification mode, namely the verification purpose is only manual operation confirmation, a number within ten is displayed; if the identification is identification, prompting 'please tap the digital password in sequence' or 'please tap the digital password with the prompt' and the like.
S02, according to the verification password, the user taps to generate tapping sound and tapping rhythm
In the internet access verification mode, the user can knock the terminal on a screen, a back shell and the like according to the verification prompt information for a plurality of times to generate knocking sound. Of course, the operation is not limited to the terminal, and the sound can be generated by knocking other objects, such as a desk and the like.
In the identity recognition mode, a user can generate knocking sound on a screen, a back shell and the like of the terminal according to the verification prompt information by knocking times, and the knocking sound forms rhythm at intervals of numbers and certain time. For example: if the verification prompt message is 'please tap the second and third bits of the numeric password in sequence', if the second bit is '3' and the third bit is '1', the user only needs to tap 3 continuously, then tap 1 after stopping, and then the operation can be completed.
S03, recording, obtaining the sound frequency of the knocking sound, and identifying the knocking number and the knocking rhythm
The terminal collects the knocking sound of the user to form a sound wave frequency spectrum. The collected sound wave frequency spectrum corresponds to every knocking, and a wave crest can appear in the sound wave frequency spectrum, so that the identification is simple, and the accuracy rate is high. In the identification process, only the number of the continuous wave peaks is identified, and the number which needs to be input by the user can be identified. In addition, for the input with more than two numbers, in the identification process, an interval time period threshold value between wave peaks is preset, and if the interval time period threshold value is exceeded, the input of another verification code number can be considered to be started. Therefore, the user does not need to speak in the open, the problem that the user is embarrassed in the public environment or the environment with other people nearby is solved, the user does not need to speak towards the mobile internet terminal suddenly, or the user is difficult to open particularly when the user is famous, and meanwhile the privacy is prevented from being revealed.
S04, converting the information into character information to be verified, and verifying to obtain verification result
And the terminal collects the knocking sound of the user to form a sound wave frequency spectrum, converts the sound wave frequency spectrum into character information to be verified, and verifies the character information. And in the online verification mode, if the verification is passed, the corresponding page is automatically skipped. If the authentication passes in the identification mode, the identity is confirmed, allowing the user to do further operations.
Referring to fig. 3, in one embodiment, further includes:
s00, collecting specimen of voice password
And the terminal starts a recording function, collects a sample of the voice password and forms an original sound wave frequency spectrum corresponding to the user. The user can customize the number of taps and the tempo change. For example: if the user is customized to a total of 10 taps, the tempo changes to: 1-3-3- -2-1, only corresponding times need to be knocked in sequence when the samples of the voice passwords are collected, and rhythms are formed according to corresponding intervals. Where each number represents the number of consecutive taps and "-" represents the time unit of the interval. Each user can customize the personalized number and rhythm of taps. Preferably, when the total number of taps is large, such as 15, more rhythm changes can be customized: "5-10", or "1-3-5-3- - -3", etc., each user may define himself. The terminal collects the knocking sound, extracts information such as wave crests, continuous times, wave crest interval time intervals and the like after forming a sound wave frequency spectrum, converts the information into character information representing the user password, such as 1-3-3-2-1, and the character information is locally cached or sent to a server to serve as an original password or a secret key of the user.
S01, displaying verification prompt information
If the user records the sample of the voice password, a prompt of 'please click the recorded voice password and rhythm' or a related approximate prompt is displayed.
S02, according to the verification password, the user taps to generate tapping sound and tapping rhythm
In the internet access authentication mode or the identity recognition mode, a user only needs to knock on a screen, a back shell or a nearby object of the terminal according to a pre-recorded password and rhythm to generate knocking sound, the number of wave crests of the knocking sound is the same as that of the original recording, and the change trend of the rhythm and the original recording is the same.
S03, recording, obtaining the sound frequency of the knocking sound, and identifying the knocking number and the knocking rhythm
The terminal collects the knocking sound of the user to form a sound wave frequency spectrum.
S04, converting the information into character information to be verified, and verifying to obtain verification result
The terminal collects a sound wave frequency spectrum formed according to the collected knocking sound of the user, extracts information such as wave crests, the times of continuous wave crests and interval time periods among discontinuous wave crests, converts the information into character information of a password to be verified, and verifies the character information. For example, if the voice command stored by the user at the server is "1-3-3-2-1", the voice command is converted into the character information to be verified, which is also "1-3-3-2-1", and the verification is passed. In an optimization, the verification process can set fault-tolerant rules, such as completely identical knocking times and differences of local rhythms, for example, "1-3-3-2-1"; local identity exceeding a threshold, such as "1-3-3-2", "3-3-2-1", etc., may be considered to be the same instruction, thus increasing the validation pass rate. The specific implementation can be customized and configured according to the actual situation.
In one embodiment, S03, recording, obtaining the audio of the tapping sound, identifying the number of taps and the tapping rhythm, and detecting the vibration of the terminal to acquire the vibration variation curve. The terminal not only generates tapping sound but also inevitably generates vibration by tapping at each time, a vibration curve is formed by detecting the vibration caused by each tapping, and the vibration curve is converted into second character information to be verified according to the wave crest of the curve, the quantity of the wave crest and the time interval of the wave crest, so that the accuracy rate of voice password verification can be improved. When the environment is noisy or the voice acquisition fails, the vibration detection can be used as an auxiliary verification means so as to improve the identification accuracy and expand the application occasions. The vibration detection and conversion into the character information to be verified is similar to the processing of the knocking sound, and the processing is not repeated. Therefore, when the verification is carried out through the voice password verification method, a user only needs to knock a terminal screen, a back shell or peripheral objects to generate knocking sound, and the user can carry out verification by knocking the body with a preset rhythm, so that the problem that the user is difficult to open in public places and the like is effectively solved, the operation is convenient, and brand-new use experience can be brought to the user.
In one embodiment, as shown in fig. 4, there is provided an authentication apparatus including: verification information prompt module, audio acquisition module, audio identification module, verification information conversion module, comparison module, wherein: and the verification information prompt module is used for prompting voice password verification operation. The audio acquisition module is used for starting a recording function, acquiring a sample of the voice password, forming an original sound wave spectrum corresponding to the user and further completing the sample acquisition of the voice password; and collecting the knocking sound of the user to form a sound wave frequency spectrum. The audio identification module is used for extracting information such as wave crests, continuous wave crest times, interval time periods between discontinuous wave crests and the like according to the collected sound wave frequency spectrum. And the verification information conversion module is used for converting the information identified by the audio identification module into character information of the password to be verified. The comparison module is used for comparing the pre-recorded or preset password for verification. For the specific limitations of the authentication device, reference may be made to the above limitations of the voice password authentication method, which will not be described herein again.
In the above embodiments, it should be understood that the message Processor may be based on a Central Processing Unit (CPU), and may also be a Processor with Specific service Processing or execution capability formed by combining software modules, such as other general-purpose processors, Digital Signal Processors (DSP), Application Specific Integrated Circuits (ASIC), and the like. Alternatively the general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. Because the method is basically similar to the method embodiment, the description is simple, and the relevant points can be referred to partial description of the method embodiment.
Other embodiments of the present disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This specification is intended to cover any variations, uses, or adaptations of the specification following, in general, the principles of the specification and including such departures from the present disclosure as come within known or customary practice within the art to which the specification pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the specification being indicated by the following claims.
It will be understood that the present description is not limited to the precise arrangements described above and shown in the drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the present description is limited only by the appended claims.

Claims (7)

1. A voice password authentication method, characterized by: the method comprises the following steps:
according to the verification password, knocking to generate knocking sound and knocking rhythm;
the terminal collects the knocking sound to form a sound wave frequency spectrum;
and identifying wave crests, the number of continuous wave crests and the interval time period threshold number between the wave crests in the sound wave frequency spectrum, and converting the wave crests into character information to be verified.
2. The voice password authentication method of claim 1, wherein in the process of generating the tapping sound and the tapping rhythm by tapping according to the authentication password, the user taps on a screen, or a back shell, or a frame of the terminal, or objects around the terminal to generate the tapping sound with the rhythm and quantity corresponding to the authentication password.
3. The voice password authentication method according to claim 1, further comprising a step of collecting a sample of the voice password, wherein the sample is used for the first time, a user taps to generate a tapping sound and a tapping rhythm, and the tapping sound is collected by the terminal to form a sound wave spectrum; and converting the sound wave frequency spectrum into character information to be used as an original password or a secret key of a user.
4. The voice password authentication method as claimed in claim 1, further comprising a vibration detection step of detecting vibration caused by each tap to form a vibration curve, and converting the vibration curve into second character information to be authenticated according to a peak, the number of peaks, and a time interval of the peaks of the curve.
5. The voice password authentication method of claim 1, wherein the method further comprises: and displaying verification prompt information.
6. The voice password authentication method according to claim 5, wherein in the step of displaying the authentication prompt information, the corresponding prompt information is displayed according to an internet access authentication mode and an identification mode, respectively.
7. An authentication apparatus, comprising:
the verification information prompting module is used for prompting voice password verification operation;
the audio acquisition module is used for acquiring a sample of the voice password and acquiring the knocking sound of the user to form a sound wave frequency spectrum;
the audio identification module is used for extracting wave crests, the times of continuous wave crests and interval time periods among discontinuous wave crests according to the collected sound wave frequency spectrum;
the verification information conversion module is used for converting the information identified by the audio identification module into character information of a password to be verified;
and the comparison module is used for comparing the pre-recorded or preset password.
CN202011045806.4A 2020-09-29 2020-09-29 Voice password verification method and verification device Pending CN112597465A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011045806.4A CN112597465A (en) 2020-09-29 2020-09-29 Voice password verification method and verification device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011045806.4A CN112597465A (en) 2020-09-29 2020-09-29 Voice password verification method and verification device

Publications (1)

Publication Number Publication Date
CN112597465A true CN112597465A (en) 2021-04-02

Family

ID=75180314

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011045806.4A Pending CN112597465A (en) 2020-09-29 2020-09-29 Voice password verification method and verification device

Country Status (1)

Country Link
CN (1) CN112597465A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114760142A (en) * 2022-04-26 2022-07-15 湖南大学 Double-factor authentication method for heterogeneous Internet of things equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114760142A (en) * 2022-04-26 2022-07-15 湖南大学 Double-factor authentication method for heterogeneous Internet of things equipment
CN114760142B (en) * 2022-04-26 2023-04-07 湖南大学 Double-factor authentication method for heterogeneous Internet of things equipment

Similar Documents

Publication Publication Date Title
CN110178179B (en) Voice signature for authenticating to electronic device users
JP4390122B2 (en) User authentication system using biometric information
EP3309783B1 (en) Communication method, and electronic device therefor
CN110677260B (en) Authentication method, device, electronic equipment and storage medium
US7949535B2 (en) User authentication system, fraudulent user determination method and computer program product
WO2004038639A2 (en) Verification of identity and continued presence of computer users
JP3967914B2 (en) Biometrics authentication system and method
CN107533598B (en) Input method and device of login password of application program and terminal
CN113177850A (en) Method and device for multi-party identity authentication of insurance
CN109117622B (en) Identity authentication method based on audio fingerprints
CN108322770B (en) Video program identification method, related device, equipment and system
CN109032554A (en) A kind of audio-frequency processing method and electronic equipment
CN112597465A (en) Voice password verification method and verification device
KR102080994B1 (en) Method for user authentication using data extracting
WO2021244471A1 (en) Real-name authentication method and device
JP2006260461A (en) Access control system and information processing system using the same
CN112417412A (en) Bank account balance inquiry method, device and system
KR20180074152A (en) Security enhanced speech recognition method and apparatus
KR20180049422A (en) Speaker authentication system and method
GB2547885A (en) Establishing a communication session
CN111181981A (en) Processing method and device and computer equipment
CN114582078B (en) Self-service deposit and withdrawal method and self-service deposit and withdrawal system
Shrestha et al. Sound-based two-factor authentication: Vulnerabilities and redesign
KR101978795B1 (en) Apparatus for user authentication using sound of input device and method thereof
TW201944320A (en) Payment authentication method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination