CN113378134A - Identity authentication method and device - Google Patents

Identity authentication method and device Download PDF

Info

Publication number
CN113378134A
CN113378134A CN202110637506.3A CN202110637506A CN113378134A CN 113378134 A CN113378134 A CN 113378134A CN 202110637506 A CN202110637506 A CN 202110637506A CN 113378134 A CN113378134 A CN 113378134A
Authority
CN
China
Prior art keywords
authenticated
user
voice
random number
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110637506.3A
Other languages
Chinese (zh)
Inventor
李京
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guokezhengxin Technology Beijing Co ltd
Original Assignee
Guokezhengxin Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guokezhengxin Technology Beijing Co ltd filed Critical Guokezhengxin Technology Beijing Co ltd
Priority to CN202110637506.3A priority Critical patent/CN113378134A/en
Publication of CN113378134A publication Critical patent/CN113378134A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/08Speech classification or search
    • G10L15/10Speech classification or search using distance or distortion measures between unknown speech and reference templates
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/26Speech to text systems
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification

Abstract

The disclosure provides an identity authentication method and device, and relates to the field of information security. The method comprises the following steps: generating a random number in response to a trigger operation of the identity authentication; acquiring voice to be authenticated, which is read by a user to be authenticated based on the random number; performing voiceprint recognition on the voice to be authenticated so as to recognize the identity of the user to be authenticated; performing voice recognition on the voice to be authenticated so as to recognize the content read by the user to be authenticated; and judging whether the user to be authenticated passes the authentication or not according to the identity recognition result and the reading content recognition result of the user to be authenticated. The safety of identity authentication is improved by a multiple association authentication method of random number, voiceprint recognition and voice recognition, and even if part of information is leaked, the authentication is difficult to pass. For example, voiceprint information of the user is leaked, but as long as the user leaks reading voice which is not a random number, an illegal user may fail the entire authentication due to the failure of voiceprint authentication when reading the random number.

Description

Identity authentication method and device
Technical Field
The present disclosure relates to the field of information security, and in particular, to an identity authentication method and apparatus.
Background
Identity authentication techniques are an effective solution to the process of validating the identity of an operator in a computer network. All information in the computer network world including identity information of users is represented by a specific group of data, computers can only identify the digital identities of the users, and all authorization of the users is also authorization for the digital identities of the users. The identity authentication technology can solve the problem of how to ensure that an operator operating with a digital identity is the legal owner of the digital identity, that is, the physical identity of the operator is ensured to correspond to the digital identity.
Some related identity authentication technologies, such as password authentication, fingerprint authentication, etc., practice proves that security vulnerabilities exist, such as password leakage, fingerprint embezzlement, etc.
Disclosure of Invention
It is an object of embodiments of the present disclosure to: the security of identity authentication is improved.
Some embodiments of the present disclosure provide an identity authentication method, including:
generating a random number in response to a trigger operation of the identity authentication;
acquiring voice to be authenticated, which is read by a user to be authenticated based on the random number;
performing voiceprint recognition on the voice to be authenticated so as to recognize the identity of the user to be authenticated;
performing voice recognition on the voice to be authenticated so as to recognize the content read by the user to be authenticated;
and judging whether the user to be authenticated passes the authentication or not according to the identity recognition result and the reading content recognition result of the user to be authenticated.
In some embodiments, obtaining the voice to be authenticated, which is read by the user to be authenticated based on the random number, includes: acquiring the voice to be authenticated of the user to be authenticated who reads the random number; the step of judging whether the user to be authenticated is authenticated comprises the following steps: if the identified identity of the user to be authenticated is a legal user and the read content of the user to be authenticated is matched with the random number, the user to be authenticated passes authentication; and if the identified identity of the user to be authenticated is an illegal user or the content read by the user to be authenticated is not matched with the random number, the authentication of the user to be authenticated fails.
In some embodiments, obtaining the voice to be authenticated, which is read by the user to be authenticated based on the random number, includes: acquiring voice to be authenticated, which is used by a user to be authenticated to read the transformed random number aloud, wherein the transformed random number is obtained by confusing the random number by using a preset security code; the step of judging whether the user to be authenticated is authenticated comprises the following steps: if the identified identity of the user to be authenticated is a legal user and the read content of the user to be authenticated is matched with the converted random number, the user to be authenticated passes authentication; and if the identified identity of the user to be authenticated is an illegal user or the content read by the user to be authenticated is not matched with the converted random number, the authentication of the user to be authenticated fails.
In some embodiments, the obfuscation process includes:
inserting the preset security code into a preset position of the random number to obtain the transformed random number;
or, performing preset operation on the random number and the preset security code to obtain the transformed random number.
In some embodiments, the method further comprises:
generating a second random number in response to a registration operation of the identity authentication;
acquiring the voice to be registered of the user to be registered reading the second random number;
and carrying out voiceprint recognition on the voice to be registered, binding the recognized voiceprint characteristics of the voice to be registered with the identity information of the user to be registered, and storing the voiceprint characteristics and the identity information into a voiceprint library.
In some embodiments, the voice to be authenticated is subjected to voiceprint recognition to identify the identity of the user to be authenticated comprises: and carrying out voiceprint recognition on the voice to be authenticated, matching the voiceprint characteristics of the recognized voice to be authenticated with the voiceprint characteristics in the voiceprint library, and taking the identity information corresponding to the matched voiceprint characteristics in the voiceprint library as the identity of the user to be authenticated.
In some embodiments, performing voice recognition on the voice to be authenticated to identify the content read by the user to be authenticated comprises: and performing voice recognition on the voice to be authenticated, comparing the similarity of the voice characteristic of each character in the recognized voice to be authenticated with the voice characteristic of each character in the template library, and recognizing each character in the template library with the highest similarity as each character in the voice to be authenticated.
In some embodiments, the random number comprises at least one of text or pictures.
Some embodiments of the present disclosure provide an identity authentication apparatus, including:
a memory; and
a processor coupled to the memory, the processor configured to perform the identity authentication method of any of the embodiments based on instructions stored in the memory.
Some embodiments of the present disclosure provide a non-transitory computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements the steps of the identity authentication method of any of the embodiments.
The embodiment of the disclosure improves the safety of identity authentication by a multiple association authentication method of random number, voiceprint recognition and voice recognition, and even if part of information is leaked, the authentication is difficult to pass. For example, voiceprint information of the user is leaked, but as long as the user leaks reading voice which is not a random number, an illegal user may fail the entire authentication due to the failure of voiceprint authentication when reading the random number.
Drawings
The drawings that will be used in the description of the embodiments or the related art will be briefly described below. The present disclosure can be understood more clearly from the following detailed description, which proceeds with reference to the accompanying drawings.
It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without undue inventive faculty.
Fig. 1 illustrates a flow diagram of an identity authentication method of some embodiments of the present disclosure.
Fig. 2 illustrates a random number schematic diagram of some embodiments of the present disclosure.
FIG. 3 illustrates a process diagram for voiceprint registration and voiceprint recognition in some embodiments of the present disclosure.
Fig. 4 is a flow chart illustrating an identity authentication method according to further embodiments of the present disclosure.
Fig. 5 is a flow chart illustrating an identity authentication method according to further embodiments of the present disclosure.
Fig. 6 illustrates a flow diagram of an identity authentication device according to some embodiments of the present disclosure.
Detailed Description
The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure.
Unless otherwise specified, "first", "second", and the like in the present disclosure are described to distinguish different objects, and are not intended to mean size, timing, or the like.
Fig. 1 illustrates a flow diagram of an identity authentication method of some embodiments of the present disclosure. The method may be performed by an identity authentication device, for example.
As shown in fig. 1, the method of this embodiment includes: step 110-.
In step 110, a random number is generated in response to a triggering operation of the identity authentication.
In some embodiments, the random number comprises at least one of text or pictures. Words include, but are not limited to, numbers, letters, kanji, words (e.g., english words, etc.). The pictures include, for example, flowers, grass, cars, houses, and the like. Reading the picture, namely speaking the content of the picture by voice. The process requires the processing of human brain intelligence activities and can well cope with various machine security attacks.
The triggering operation of the identity authentication includes, but is not limited to, distance information sensed by the distance sensor, weight information sensed by the weight sensor, and a triggering operation such as clicking on an input device such as a mouse, a button, a screen, and the like.
The authentication device generates a random number and prompts the user to read it, as shown in fig. 2.
In step 120, a voice to be authenticated is obtained, which is read by the user to be authenticated based on the random number.
In some embodiments, the user to be authenticated may read the random number itself, or read the transformed random number, which respectively corresponds to two specific identity authentication methods, and subsequently, the two specific identity authentication methods are respectively described in the embodiments shown in fig. 4 and fig. 5.
The random number conversion process is performed by a processor of the identity authentication device according to the conversion logic.
In step 130, voiceprint recognition is performed on the voice to be authenticated to identify the identity of the user to be authenticated.
The voiceprint is a set of acoustic feature maps, which is obtained by drawing the characteristics of sound waves into spectrum patterns through a special electro-acoustic conversion instrument (a sonographer, a voice spectrograph, and the like). Voiceprints are a biological feature by which different biological individuals can be distinguished by voiceprint recognition techniques. Human vocalization is produced by a complex process of action between the human speech center and vocal organs, and the vocal organs (tongue, teeth, larynx, lung, nasal cavity, etc.) of a human are very different from each other in terms of size and shape, and strictly speaking, the vocal print maps of any two people are different, and different biological individuals can be distinguished by using the difference.
In some embodiments, voiceprint recognition is performed on the voice to be authenticated, voiceprint features of the recognized voice to be authenticated are matched with voiceprint features registered in a voiceprint library, and identity information corresponding to the voiceprint features matched in the voiceprint library is used as the identity of the user to be authenticated.
The process that the user registers the voiceprint characteristics of the user into the voiceprint library comprises the following steps: the identity authentication device responds to the registration operation of the identity authentication initiated by the user and generates a second random number; acquiring the voice to be registered of the user to be registered reading the second random number; and performing voiceprint recognition on the voice to be registered, binding the recognized voiceprint characteristics of the voice to be registered with the identity information of the user to be registered, and storing the voiceprint characteristics and the identity information into a voiceprint library.
A schematic diagram of the process of voiceprint registration and voiceprint recognition is shown in fig. 3.
Wherein the voiceprint characteristics of the speech can be obtained by referring to the correlation technique. For example, a Gaussian Mixture Model (GMM) -Universal Background Model (UBM), a Gaussian Mixture Model based on a Universal Background Model, is used to obtain the voiceprint characteristics of the input speech; the GMM-vector model can also be used for acquiring the voiceprint characteristics of the input voice; the voiceprint characteristics of the input voice can be obtained by utilizing a Deep Neural Networks (DNN) driver model; other voiceprint feature extraction models can also be used to obtain the voiceprint features of the input speech, which are not listed here.
In step 140, voice recognition is performed on the voice to be authenticated to identify the content read by the user to be authenticated.
In some embodiments, performing voice recognition on the voice to be authenticated to identify the content read by the user to be authenticated comprises: and performing voice recognition on the voice to be authenticated, comparing the similarity of the voice characteristic of each character in the recognized voice to be authenticated with the voice characteristic of each character in the template library, and recognizing each character in the template library with the highest similarity as each character in the voice to be authenticated.
The method for forming the template library comprises the following steps: the user speaks each character in the character list in turn, and the voice characteristics of each character obtained through voice recognition are stored in the template library as templates. The speech recognition technology is mature, and reference can be made to the related technology, which is not described herein again.
It should be noted that the voiceprint feature in the voiceprint library requires each legitimate user of the identity authentication apparatus to register with their own unique voice, and the voice feature of the characters in the template library is independent of the individual voice difference of different users, and can be formed by any user (even any legitimate user that is not the identity authentication apparatus, such as the manufacturer's staff).
In step 150, it is determined whether the user to be authenticated passes the authentication according to the identification result of the user to be authenticated and the reading content identification result.
If the user is identified as a legal user and the reading content is correct, the user to be authenticated can be judged to pass the authentication, otherwise, if the user is identified as an illegal user or the reading content is incorrect, the authentication of the user to be authenticated can be judged to fail.
The embodiment improves the safety of identity authentication by a multiple association authentication method of random number, voiceprint recognition and voice recognition, and even if part of information is leaked, the authentication is difficult to pass. For example, voiceprint information of the user is leaked, but as long as the user leaks reading voice which is not a random number, an illegal user may fail the entire authentication due to the failure of voiceprint authentication when reading the random number.
Fig. 4 is a flow chart illustrating an identity authentication method according to further embodiments of the present disclosure. The method may be performed, for example, by an identity authentication device, and the content presented by the user is the random number itself.
As shown in fig. 4, the method of this embodiment includes: step 410-.
At step 410, a random number is generated in response to a triggering operation of the identity authentication.
In step 420, the voice to be authenticated, in which the user to be authenticated reads the random number, is obtained.
In step 430, voiceprint recognition is performed on the voice to be authenticated to identify the identity of the user to be authenticated.
In step 440, voice recognition is performed on the voice to be authenticated to identify the content read by the user to be authenticated.
In step 450, whether the user to be authenticated passes the authentication is determined according to the identity recognition result and the reading content recognition result of the user to be authenticated.
In step 450a, if the identified identity of the user to be authenticated is a legal user and the content read by the user to be authenticated is matched with the random number, the user to be authenticated passes authentication;
in step 450b, if the identified identity of the user to be authenticated is an illegal user, or the content read by the user to be authenticated does not match the random number, the authentication of the user to be authenticated fails.
It should be noted that the present embodiment focuses on describing different parts from the foregoing embodiment, and the same parts (such as steps or terms) may refer to the foregoing embodiment and are not described again here.
The embodiment improves the safety of identity authentication by a multiple association authentication method of random number, voiceprint recognition and voice recognition, and even if part of information is leaked, the authentication is difficult to pass. For example, voiceprint information of the user is leaked, but as long as the user leaks reading voice which is not a random number, an illegal user may fail the entire authentication due to the failure of voiceprint authentication when reading the random number.
Fig. 5 is a flow chart illustrating an identity authentication method according to further embodiments of the present disclosure. The method can be executed by an identity authentication device, and the content read by the user is the transformed random number, so that the security of identity authentication is further improved.
As shown in fig. 5, the method of this embodiment includes: step 510-.
At step 510, a random number is generated in response to a triggering operation of the identity authentication.
In step 520, the voice to be authenticated is obtained, where the user to be authenticated reads the transformed random number.
The transformed random number is obtained by confusing the random number by using a preset security code.
In some embodiments, obfuscation processing includes, for example: inserting a preset security code into a preset position of the random number to obtain a converted random number; or, performing preset operation on the random number and a preset security code to obtain a transformed random number; or other obfuscation processes that may achieve obfuscation purposes.
For the conversion processing of the random number, the user is subjected to logical thinking conversion processing in mind according to the conversion logic.
In step 530, voiceprint recognition is performed on the voice to be authenticated to identify the identity of the user to be authenticated.
In step 540, voice recognition is performed on the voice to be authenticated to identify the content read by the user to be authenticated.
In step 550, it is determined whether the user to be authenticated passes the authentication according to the identification result of the user to be authenticated and the reading content identification result.
For the identity authentication device, the processor of the identity authentication device performs the transformation process according to the transformation logic.
In step 550a, if the identified identity of the user to be authenticated is a legal user and the content read by the user to be authenticated is matched with the transformed random number, the user to be authenticated passes authentication;
in step 550b, if the identified identity of the user to be authenticated is an illegal user, or the content read by the user to be authenticated does not match the transformed random number, the authentication of the user to be authenticated fails.
It should be noted that the present embodiment focuses on describing different parts from the foregoing embodiment, and the same parts (such as steps or terms) may refer to the foregoing embodiment and are not described again here.
The embodiment improves the safety of identity authentication by a multiple association authentication method of random number, voiceprint recognition and voice recognition, and even if part of information is leaked, the authentication is difficult to pass. For example, voiceprint information of the user is leaked, but as long as the user leaks reading voice which is not a random number, an illegal user may fail the entire authentication due to the failure of voiceprint authentication when reading the random number. Moreover, the user reads the random number after the confusion transformation processing aloud, and an illegal user is difficult to obtain the security code participating in the confusion transformation processing, so the security of the identity authentication is further improved. Therefore, the man-machine combination of the integration of the instruction reading and sounding content, which is seen by the eyes of the user, thought by the brain and organized, is formed to realize safe and convenient identity authentication.
Fig. 6 illustrates a flow diagram of an identity authentication device according to some embodiments of the present disclosure.
As shown in fig. 6, the apparatus 600 of this embodiment includes: a memory 610 and a processor 620 coupled to the memory 610, the processor 620 being configured to perform the method of identity authentication in any of the embodiments described above based on instructions stored in the memory 610.
For example, in response to a trigger operation of the identity authentication, a random number is generated; acquiring the voice to be authenticated, which is used by the user to be authenticated to read based on the random number, wherein the voice to be authenticated comprises the following steps: the random number is read aloud voice to be authenticated, or the converted random number is read aloud voice to be authenticated; performing voiceprint recognition on the voice to be authenticated so as to recognize the identity of the user to be authenticated; performing voice recognition on the voice to be authenticated so as to recognize the content read by the user to be authenticated; and judging whether the user to be authenticated passes the authentication or not according to the identity recognition result and the reading content recognition result of the user to be authenticated.
Memory 610 may include, for example, system memory, fixed non-volatile storage media, and the like. The system memory stores, for example, an operating system, an application program, a Boot Loader (Boot Loader), and other programs.
The apparatus 600 may also include an input-output interface 630, a network interface 640, a storage interface 650, and the like. These interfaces 630, 640, 650 and the connections between the memory 610 and the processor 620 may be, for example, via a bus 660. The input/output interface 630 provides a connection interface for input/output devices such as a display, a mouse, a keyboard, and a touch screen. The network interface 640 provides a connection interface for various networking devices. The storage interface 650 provides a connection interface for external storage devices such as an SD card and a usb disk.
Some embodiments of the present disclosure provide a non-transitory computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements the steps of the identity authentication method of any of the embodiments.
The identity authentication method, the corresponding identity authentication device, the storage medium, and the like of the embodiments of the present disclosure can be applied to the following scenarios, for example, but are not limited to the following scenarios.
(1) Login application
When logging in the application, reading the random code generated randomly and carrying out the multiple association authentication. And logging in the application after the authentication is passed.
(2) Work attendance machine
And when the user approaches the attendance machine for a certain distance, the infrared induction trigger generates a random number, reads the random code generated randomly, and performs the multiple association authentication. And recording the attendance after the authentication is passed.
(3) Household intelligent door lock
And when the user approaches the intelligent door lock for a certain distance, the infrared induction trigger generates a random number, reads the random code generated randomly, and performs the multiple association authentication. And unlocking after passing the authentication.
(4) Opening or starting of vehicles
And when the user approaches the automobile for a certain distance, the infrared induction trigger generates a random number, reads the random code generated randomly, and performs the multiple association authentication. And opening the door after the authentication is passed.
When a user sits at a driving position, the weight sensor senses and triggers to generate a random number, reads the random code generated randomly and carries out the multiple association authentication. And starting the engine after the authentication is passed.
(5) Mobile phone
And the sensor senses that the mobile phone is lifted up by the user, triggers to generate a random number, reads the random code generated randomly and carries out the multiple association authentication. And after the authentication is passed, the mobile phone system is opened.
(6) Payment
The voiceprint pos machine generates a random number after inputting the amount of money to be collected, and the user reads the last four digits (which can be used as a security code) of the bank card and the random number and carries out the multiple association authentication. And payment is carried out after the authentication is passed.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more non-transitory computer-readable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only exemplary of the present disclosure and is not intended to limit the present disclosure, so that any modification, equivalent replacement, or improvement made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (10)

1. An identity authentication method, comprising:
generating a random number in response to a trigger operation of the identity authentication;
acquiring voice to be authenticated, which is read by a user to be authenticated based on the random number;
performing voiceprint recognition on the voice to be authenticated so as to recognize the identity of the user to be authenticated;
performing voice recognition on the voice to be authenticated so as to recognize the content read by the user to be authenticated;
and judging whether the user to be authenticated passes the authentication or not according to the identity recognition result and the reading content recognition result of the user to be authenticated.
2. The method of claim 1,
acquiring the voice to be authenticated, which is read by the user to be authenticated based on the random number, comprises the following steps: acquiring the voice to be authenticated of the user to be authenticated who reads the random number;
the step of judging whether the user to be authenticated is authenticated comprises the following steps: if the identified identity of the user to be authenticated is a legal user and the read content of the user to be authenticated is matched with the random number, the user to be authenticated passes authentication; and if the identified identity of the user to be authenticated is an illegal user or the content read by the user to be authenticated is not matched with the random number, the authentication of the user to be authenticated fails.
3. The method of claim 1,
acquiring the voice to be authenticated, which is read by the user to be authenticated based on the random number, comprises the following steps: acquiring voice to be authenticated, which is used by a user to be authenticated to read the transformed random number aloud, wherein the transformed random number is obtained by confusing the random number by using a preset security code;
the step of judging whether the user to be authenticated is authenticated comprises the following steps: if the identified identity of the user to be authenticated is a legal user and the read content of the user to be authenticated is matched with the converted random number, the user to be authenticated passes authentication; and if the identified identity of the user to be authenticated is an illegal user or the content read by the user to be authenticated is not matched with the converted random number, the authentication of the user to be authenticated fails.
4. The method of claim 3, wherein the obfuscation process comprises:
inserting the preset security code into a preset position of the random number to obtain the transformed random number;
or, performing preset operation on the random number and the preset security code to obtain the transformed random number.
5. The method of claim 1, further comprising:
generating a second random number in response to a registration operation of the identity authentication;
acquiring the voice to be registered of the user to be registered reading the second random number;
and carrying out voiceprint recognition on the voice to be registered, binding the recognized voiceprint characteristics of the voice to be registered with the identity information of the user to be registered, and storing the voiceprint characteristics and the identity information into a voiceprint library.
6. The method of claim 5, wherein performing voiceprint recognition on the voice to be authenticated to identify the identity of the user to be authenticated comprises:
and carrying out voiceprint recognition on the voice to be authenticated, matching the voiceprint characteristics of the recognized voice to be authenticated with the voiceprint characteristics in the voiceprint library, and taking the identity information corresponding to the matched voiceprint characteristics in the voiceprint library as the identity of the user to be authenticated.
7. The method according to claim 1, wherein performing voice recognition on the voice to be authenticated to identify the content read by the user to be authenticated comprises:
and performing voice recognition on the voice to be authenticated, comparing the similarity of the voice characteristic of each character in the recognized voice to be authenticated with the voice characteristic of each character in the template library, and recognizing each character in the template library with the highest similarity as each character in the voice to be authenticated.
8. The method according to any one of claims 1 to 7,
the random number includes at least one of a text or a picture.
9. An identity authentication apparatus comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform the identity authentication method of any of claims 1-8 based on instructions stored in the memory.
10. A non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of the identity authentication method of any one of claims 1-8.
CN202110637506.3A 2021-06-08 2021-06-08 Identity authentication method and device Pending CN113378134A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110637506.3A CN113378134A (en) 2021-06-08 2021-06-08 Identity authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110637506.3A CN113378134A (en) 2021-06-08 2021-06-08 Identity authentication method and device

Publications (1)

Publication Number Publication Date
CN113378134A true CN113378134A (en) 2021-09-10

Family

ID=77576507

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110637506.3A Pending CN113378134A (en) 2021-06-08 2021-06-08 Identity authentication method and device

Country Status (1)

Country Link
CN (1) CN113378134A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114978546A (en) * 2022-05-24 2022-08-30 中国银行股份有限公司 User identity authentication method and device

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1851788A (en) * 2006-03-30 2006-10-25 周忠杰 Password setting metod
CN102457845A (en) * 2010-10-14 2012-05-16 阿里巴巴集团控股有限公司 Method, equipment and system for authenticating identity by wireless service
CN102609646A (en) * 2012-01-20 2012-07-25 华为终端有限公司 Information protection method, information protection device and terminal equipment
CN104767863A (en) * 2014-01-06 2015-07-08 腾讯科技(深圳)有限公司 Terminal screen unlocking method and terminal
CN105450657A (en) * 2015-12-16 2016-03-30 广州天懋信息系统有限公司 Dynamic password authentication method and system based on preset value and dynamic verification code combination
CN105897417A (en) * 2016-04-01 2016-08-24 广东欧珀移动通信有限公司 Encrypted data input method and encrypted data input device
CN106961418A (en) * 2017-02-08 2017-07-18 北京捷通华声科技股份有限公司 Identity identifying method and identity authorization system
CN109327446A (en) * 2018-10-23 2019-02-12 中国银行股份有限公司 Identity identifying method, server, client and system
CN112751838A (en) * 2020-12-25 2021-05-04 中国人民解放军陆军装甲兵学院 Identity authentication method, device and system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1851788A (en) * 2006-03-30 2006-10-25 周忠杰 Password setting metod
CN102457845A (en) * 2010-10-14 2012-05-16 阿里巴巴集团控股有限公司 Method, equipment and system for authenticating identity by wireless service
CN102609646A (en) * 2012-01-20 2012-07-25 华为终端有限公司 Information protection method, information protection device and terminal equipment
CN104767863A (en) * 2014-01-06 2015-07-08 腾讯科技(深圳)有限公司 Terminal screen unlocking method and terminal
CN105450657A (en) * 2015-12-16 2016-03-30 广州天懋信息系统有限公司 Dynamic password authentication method and system based on preset value and dynamic verification code combination
CN105897417A (en) * 2016-04-01 2016-08-24 广东欧珀移动通信有限公司 Encrypted data input method and encrypted data input device
CN106961418A (en) * 2017-02-08 2017-07-18 北京捷通华声科技股份有限公司 Identity identifying method and identity authorization system
CN109327446A (en) * 2018-10-23 2019-02-12 中国银行股份有限公司 Identity identifying method, server, client and system
CN112751838A (en) * 2020-12-25 2021-05-04 中国人民解放军陆军装甲兵学院 Identity authentication method, device and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114978546A (en) * 2022-05-24 2022-08-30 中国银行股份有限公司 User identity authentication method and device

Similar Documents

Publication Publication Date Title
KR100703693B1 (en) System and method for face recognition
Patel et al. Continuous user authentication on mobile devices: Recent progress and remaining challenges
Ghayoumi A review of multimodal biometric systems: Fusion methods and their applications
JP6567040B2 (en) Voiceprint login method and device based on artificial intelligence
Tolosana et al. BioTouchPass2: Touchscreen password biometrics using time-aligned recurrent neural networks
Wang et al. Attacks and defenses in user authentication systems: A survey
Ortega-Garcia et al. Authentication gets personal with biometrics
US20140297528A1 (en) Method and system for validating personalized account identifiers using biometric authentication and self-learning algorithms
KR102401170B1 (en) Method and device for complex authentication
CN111091837A (en) Time-varying voiceprint authentication method and system based on online learning
Folorunso et al. A review of voice-base person identification: state-of-the-art
KR101754954B1 (en) Certification system and method using autograph and voice
CN113378134A (en) Identity authentication method and device
Le Lan et al. Securing smartphone handwritten pin codes with recurrent neural networks
CN102089766A (en) Method and apparatus for improving biometric identification systems
CN116453196A (en) Face recognition method and system
CN107491759B (en) Mixed mode registration method and device
CN109918883A (en) A kind of auth method of the biocompatibility characteristics based on Freehandhand-drawing track
CN110930154A (en) Identity verification method and device
Orság et al. Biometric Security Systems: Fingerprint and Speech Technology.
JP2022522251A (en) Handwritten signature authentication method and device based on multiple verification algorithms
Nainan et al. Speech controlled automobile with three-level biometric security system
JP2020154061A (en) Speaker identification apparatus, speaker identification method and program
Elmir et al. Design and Implementation of Embedded Biometric-Based Access Control System with Electronic Lock using Raspberry Pi
Rani et al. Genetic algorithm using speech and signature of biometrics

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210910