CN114614980A - Service processing method and device, electronic equipment and computer readable medium - Google Patents
Service processing method and device, electronic equipment and computer readable medium Download PDFInfo
- Publication number
- CN114614980A CN114614980A CN202210143017.7A CN202210143017A CN114614980A CN 114614980 A CN114614980 A CN 114614980A CN 202210143017 A CN202210143017 A CN 202210143017A CN 114614980 A CN114614980 A CN 114614980A
- Authority
- CN
- China
- Prior art keywords
- voice
- verification code
- verification
- voice file
- basic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title abstract description 24
- 238000012795 verification Methods 0.000 claims abstract description 184
- 238000012545 processing Methods 0.000 claims abstract description 82
- 238000000034 method Methods 0.000 claims abstract description 48
- 238000004590 computer program Methods 0.000 claims description 20
- 230000008569 process Effects 0.000 claims description 20
- 230000003993 interaction Effects 0.000 claims description 16
- 230000004044 response Effects 0.000 claims description 12
- 230000001960 triggered effect Effects 0.000 claims description 8
- 238000010586 diagram Methods 0.000 description 16
- 230000006870 function Effects 0.000 description 13
- 238000004891 communication Methods 0.000 description 7
- 238000004422 calculation algorithm Methods 0.000 description 5
- 239000003086 colorant Substances 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 4
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 206010011878 Deafness Diseases 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 208000016354 hearing loss disease Diseases 0.000 description 2
- 230000001771 impaired effect Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 201000009487 Amblyopia Diseases 0.000 description 1
- 201000004569 Blindness Diseases 0.000 description 1
- 206010034972 Photosensitivity reaction Diseases 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 230000001149 cognitive effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 231100000895 deafness Toxicity 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000006735 deficit Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 231100000888 hearing loss Toxicity 0.000 description 1
- 230000010370 hearing loss Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 201000003723 learning disability Diseases 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000036211 photosensitivity Effects 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L13/00—Speech synthesis; Text to speech systems
- G10L13/08—Text analysis or generation of parameters for speech synthesis out of text, e.g. grapheme to phoneme translation, prosody generation or stress or intonation determination
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for authentication of entities using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Computational Linguistics (AREA)
- Telephonic Communication Services (AREA)
Abstract
The application discloses a business processing method, a business processing device, electronic equipment and a computer readable medium, which relate to the technical field of cloud computing security service, wherein one specific implementation mode comprises the steps of receiving a business processing request and acquiring a corresponding language identifier and a corresponding terminal identifier; generating a verification code, and then calling a basic voice library to generate a voice file based on the verification code and the language identification; calling a voice broadcast interface corresponding to the terminal identification to perform corresponding voice broadcast based on the voice file; and receiving verification information returned by the user based on the broadcasted voice, and further processing corresponding services based on the verification information. The method can support multi-language voice broadcast, so that the vision-impaired client can accurately perform safety verification of the graphic verification code, better service is provided for the vision-impaired client, and the vision-impaired client can complete transaction service by self.
Description
Technical Field
The present application relates to the technical field of cloud computing security services, and in particular, to a method and an apparatus for processing a service, an electronic device, and a computer-readable medium.
Background
Currently, most websites require a user to identify a graphical verification code when logging in or performing an accounting transaction, so as to avoid an attack by a hacker or a third party. This strategy may make online transactions more secure, but at the same time sacrifice some convenience. The verification code picture is usually complex and fuzzy in order to avoid being recognized by a machine, even if a normal client is in use, the input can be ensured to be correct once, and the verification code picture is more difficult to recognize for a vision-impaired client.
In the process of implementing the present application, the inventor finds that at least the following problems exist in the prior art:
the colors and the ground colors of verification codes in the existing graphic verification codes are very close, and the shape difference of the verification codes is large, so that visually impaired customers can hardly recognize the true contents of the verification codes, and websites and transactions needing to be subjected to the safety verification of the graphic verification codes cannot provide normal services for the customers.
Disclosure of Invention
In view of this, embodiments of the present application provide a service processing method, an apparatus, an electronic device, and a computer readable medium, which can solve the problems that colors and bottom colors of verification codes in existing graphical verification codes are very close, and shapes of the verification codes are very different, so that it is difficult for visually impaired customers to identify the true contents of the verification codes, which results in that websites and transactions requiring security verification of the graphical verification codes cannot provide normal services for such customers.
In order to achieve the above object, according to an aspect of the embodiments of the present application, there is provided a service processing method, including:
receiving a service processing request, and acquiring a corresponding language identifier and a terminal identifier;
generating a verification code, and then calling a basic voice library to generate a voice file based on the verification code and the language identification;
calling a voice broadcast interface corresponding to the terminal identification to perform corresponding voice broadcast based on the voice file;
and receiving verification information returned by the user based on the broadcasted voice, and further processing corresponding services based on the verification information.
Optionally, before generating the verification code, the method further comprises:
in response to detecting a user interaction event with the authentication dialog, an authentication process is triggered.
Optionally, after generating the verification code, the method further comprises:
and encrypting the verification code to generate an encrypted string.
Optionally, generating the voice file based on the verification code and the language identification includes:
acquiring a basic voice file in a basic voice library corresponding to the language identification;
and matching the encrypted string with the basic voice files, and assembling all the basic voice files obtained through matching to generate a complete voice file.
Optionally, before calling the voice broadcast interface corresponding to the terminal identifier, the method further includes:
and generating a verification code picture corresponding to the voice file based on the encrypted string.
Optionally, the corresponding voice broadcast is performed based on a voice file, including:
and responding to the detected interaction event of the user to the verification code picture, and carrying out voice broadcasting on the voice file corresponding to the verification code picture.
Optionally, processing the corresponding service based on the verification information includes:
matching the verification information with the verification code, and executing the service processing corresponding to the service processing request in response to successful matching;
and responding to the matching failure, and returning request failure information.
In addition, the present application also provides a service processing apparatus, including:
the receiving unit is configured to receive the service processing request and acquire a corresponding language identifier and a terminal identifier;
a voice file generating unit configured to generate a verification code, and further to invoke a basic voice library to generate a voice file based on the verification code and the language identification;
the voice broadcasting unit is configured to call a voice broadcasting interface corresponding to the terminal identifier so as to perform corresponding voice broadcasting based on the voice file;
and the service processing unit is configured to receive verification information returned by the user based on the broadcasted voice, and further process the corresponding service based on the verification information.
Optionally, the receiving unit is further configured to:
in response to detecting a user interaction event with the authentication dialog, an authentication process is triggered.
Optionally, the apparatus further comprises an encryption unit configured to:
and encrypting the verification code to generate an encrypted string.
Optionally, the voice file generating unit is further configured to:
acquiring a basic voice file in a basic voice library corresponding to the language identification;
and matching the encrypted string with the basic voice files, and assembling all the basic voice files obtained through matching to generate a complete voice file.
Optionally, the apparatus further comprises a verification code picture generation unit configured to:
and generating a verification code picture corresponding to the voice file based on the encrypted string.
Optionally, the voice broadcasting unit is further configured to:
and responding to the detected interaction event of the user to the verification code picture, and performing voice broadcasting on the voice file corresponding to the verification code picture.
Optionally, the service processing unit is further configured to:
matching the verification information with the verification code, and executing the service processing corresponding to the service processing request in response to the successful matching;
and responding to the matching failure, and returning request failure information.
In addition, the present application also provides a service processing electronic device, including: one or more processors; a storage device for storing one or more programs which, when executed by one or more processors, cause the one or more processors to implement the business process method as described above.
In addition, the present application also provides a computer readable medium, on which a computer program is stored, which when executed by a processor implements the service processing method as described above.
To achieve the above object, according to still another aspect of embodiments of the present application, there is provided a computer program product.
A computer program product according to an embodiment of the present application includes a computer program, and when the computer program is executed by a processor, the computer program implements a service processing method according to an embodiment of the present application.
One embodiment of the above invention has the following advantages or benefits: the method comprises the steps of receiving a service processing request to obtain a corresponding language identifier and a corresponding terminal identifier; generating a verification code, and then calling a basic voice library to generate a voice file based on the verification code and the language identification; calling a voice broadcast interface corresponding to the terminal identification to perform corresponding voice broadcast based on the voice file; and receiving verification information returned by the user based on the broadcasted voice, and further processing corresponding services based on the verification information. The method can support multi-language voice broadcast, so that the vision-impaired client can accurately perform safety verification of the graphic verification code, better service is provided for the vision-impaired client, and the vision-impaired client can complete transaction service by self.
Further effects of the above-mentioned non-conventional alternatives will be described below in connection with the embodiments.
Drawings
The drawings are included to provide a further understanding of the application and are not to be construed as limiting the application. Wherein:
fig. 1 is a schematic diagram of a main flow of a business processing method according to a first embodiment of the present application;
fig. 2 is a schematic diagram of a main flow of a service processing method according to a second embodiment of the present application;
fig. 3 is a schematic diagram of a main flow of a service processing method according to a third embodiment of the present application;
fig. 4 is a schematic view of an application scenario of a service processing method according to a fourth embodiment of the present application;
fig. 5 is a schematic diagram of the main elements of a traffic processing apparatus according to an embodiment of the present application;
FIG. 6 is an exemplary system architecture diagram to which embodiments of the present application may be applied;
fig. 7 is a schematic structural diagram of a computer system suitable for implementing the terminal device or the server according to the embodiment of the present application.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness. According to the technical scheme, the data acquisition, storage, use, processing and the like meet relevant regulations of national laws and regulations.
Fig. 1 is a schematic diagram of a main flow of a service processing method according to a first embodiment of the present application, and as shown in fig. 1, the service processing method includes:
step S101, receiving a service processing request, and acquiring a corresponding language identifier and a terminal identifier.
In this embodiment, an execution main body (for example, a server) of the service processing method may receive the service processing request through a wired connection or a wireless connection. The service processing request may be, for example, a login service, a registration service, and the like. And triggering the business processing process by triggering the login button control or the registration button control on the current page by the user, and sending a business processing request to the execution main body. The execution main body receives the service processing request, and can acquire the language identifier and the terminal identifier carried in the request. The language identification corresponds to a language selection button control on the current page clicked by the user. The user selects the language by clicking on the language selection button control. The terminal identifier is an identifier corresponding to a carrier on which the current page depends, and may be, for example, an identifier corresponding to a PC terminal of a personal computer, an identifier corresponding to a browser of a mobile phone, an identifier corresponding to a client of the mobile phone, an identifier corresponding to a tablet PC terminal, and the like.
Specifically, before generating the verification code, the method further comprises:
in response to detecting a user interaction event with the authentication dialog, an authentication process is triggered.
The user may interact with the execution subject by clicking on the verification dialog. And when the execution main body detects that the user clicks the verification dialog box, namely the execution main body detects that the interaction event corresponding to the verification dialog box is triggered, triggering the verification process. Specifically, the verification process may present a graphical verification code to the user for the execution subject, and determine whether to process the service processing request initiated by the user by verifying whether the graphical verification code input by the user is consistent with the verification code copy retained in the background. And if so, processing the service processing request initiated by the user, such as allowing the user to log in or allowing the user to register. And if not, returning request failure information to the user.
Step S102, generating a verification code, and then calling a basic voice library to generate a voice file based on the verification code and the language identification.
As shown in fig. 4, after the verification process passes the verification, the execution main body may invoke a verification code program (verification code servlet) to generate a verification code encryption string with 5 bits (for example only, 6 bits, n bits, and the like may also be used, and the number of bits of the verification code is not specifically limited in this embodiment of the present application, and the verification code may be a pure letter, a pure number, or a combination of a letter and a number, and the form of the verification code is not limited in this embodiment of the present application), and then invoke a voice program (voice servlet) to decrypt the encryption string, and match the voice file in the basic voice library, thereby generating a complete verification code voice file. For example, the server randomly generates a 5-bit (the number of bits is not limited in this embodiment of the present application) verification code (including numbers and letters), and encrypts the character string. The encryption string can be simultaneously applied to voice streams and image streams, and the consistency of verification code pictures and voice broadcast contents can be ensured. The voice servlet decrypts the verification code encrypted string and obtains 5-bit verification code information. And matching the voice files corresponding to the five characters in the basic voice library (capable of distinguishing multiple languages), and integrating the voice files into a complete voice stream to be output. The front-end system calls the voice servlet and uploads the corresponding voice identification, so that the corresponding verification code voice file can be obtained, and the barrier-free broadcasting function can be realized.
And step S103, calling a voice broadcast interface corresponding to the terminal identification so as to perform corresponding voice broadcast based on the voice file.
After generating a complete verification code voice file, the execution main body can initiate a page request through a front-end calling party, call a voice servlet to obtain the voice file, and play the sound of the voice file when detecting that the voice file is triggered by the outside world so as to perform voice broadcast on the voice file.
And step S104, receiving verification information returned by the user based on the broadcasted voice, and processing corresponding services based on the verification information.
After hearing the verification information corresponding to the voice file broadcasted by the voice, the user can input the heard verification information in the verification dialog box, so that the execution main body can verify the verification information based on the received verification information input by the user.
Specifically, processing a corresponding service based on the verification information includes:
matching the verification information with a verification code (namely a verification code text copy stored in a background), and executing the processing of the service corresponding to the service processing request in response to the successful matching; and responding to the matching failure, and returning request failure information.
After receiving the verification information returned by the user based on the broadcasted voice, the execution main body can verify the verification information and the verification code text copy stored in the background, judge whether the verification information and the verification code text copy are consistent, and if the verification information and the verification code text copy are consistent, perform corresponding business processing, such as executing registration business processing, executing login business processing and the like. If not, returning request failure information, such as returning registration failure information, returning login failure information, etc.
In the embodiment, the corresponding language identifier and the terminal identifier are acquired by receiving the service processing request; generating a verification code, and then calling a basic voice library to generate a voice file based on the verification code and the language identification; calling a voice broadcast interface corresponding to the terminal identification to perform corresponding voice broadcast based on the voice file; and receiving verification information returned by the user based on the broadcasted voice, and further processing corresponding services based on the verification information. The method can support multi-language voice broadcast, so that the vision-impaired client can accurately perform safety verification of the graphic verification code, better service is provided for the vision-impaired client, and the vision-impaired client can complete transaction service by self.
Fig. 2 is a schematic main flow diagram of a service processing method according to a second embodiment of the present application, and as shown in fig. 2, the service processing method includes:
step S201, receiving a service processing request, and acquiring a corresponding language identifier and a terminal identifier.
Step S202, generating a verification code, encrypting the verification code and generating an encryption string.
Specifically, the execution principal may encrypt the verification code by a Message-Digest Algorithm (MD 5) to generate an encrypted string (i.e., a hash value). The principle of the MD5 algorithm is: the MD5 code processes incoming information (i.e., the authentication code) in 512-bit packets, and each packet is divided into 16 32-bit sub-packets, and after a series of processing, the output of the algorithm is composed of four 32-bit packets, and the four 32-bit packets are concatenated to generate a 128-bit hash value.
Step S203, calling a basic voice library to generate a voice file based on the verification code and the language identification.
And after the execution main body obtains the encryption string corresponding to the verification code, the execution main body can call the basic voice library. And positioning each basic voice corresponding to the language identifier in the basic voice library according to the language identifier carried in the service processing request, and if the language identifier corresponds to English (or Chinese, the type of the language corresponding to the language identifier is not specifically limited in the embodiment of the application), matching the English (or Chinese) basic voice in the basic voice library with each byte code in the encrypted string.
Specifically, generating a voice file based on the verification code and the language identification includes: acquiring a basic voice file in a basic voice library corresponding to the language identification; and matching the encrypted string with the basic voice files, and assembling all the basic voice files obtained through matching to generate a complete voice file.
Step S204, generating a verification code picture corresponding to the voice file based on the encrypted string.
The execution main body generates a voice file based on the encryption string and the basic voice library, and simultaneously generates a verification code picture corresponding to the generated voice file so as to ensure that the voice file of the voice broadcast is consistent with the content of the verification code picture displayed to the user.
Step S205, in response to detecting the interaction event of the user with the verification code picture, calling a voice broadcast interface corresponding to the terminal identifier, and performing voice broadcast on the voice file corresponding to the verification code picture.
When the click operation for the verification code picture is detected, the execution main body can determine that the interaction between the user and the verification code picture triggers an interaction event, and the execution main body can call a voice broadcast interface corresponding to the terminal identifier (if the terminal identifier corresponds to the mobile phone terminal, a playing device of the mobile phone terminal is called, for example, a microphone of the mobile phone terminal) to perform voice broadcast on the voice file.
And step S206, receiving verification information returned by the user based on the broadcasted voice, and further processing corresponding services based on the verification information.
The execution main body can receive the verification information input by the user in the verification dialog box, match the verification information with the verification code text copy reserved in the background, and execute the corresponding service processing according to the matching result.
The embodiment of the application provides a method for generating verification code voice broadcast based on file stream in service processing, which can be realized by the following three steps: 1. the server randomly generates a 5-bit verification code (comprising numbers and letters) and generates an encryption string; 2. the servlet of the voice verification code acquires the verification code encryption string, decrypts the verification code encryption string and generates a corresponding voice file; 3. the front end calls the request voice servlet, so that the voice file can be obtained and broadcasted through the player of the front end. Among other things, servlets provide a number of utility routines such as automatically parsing and decoding HTML form data, reading and setting HTTP headers, processing cookies, tracking session state, and the like. servlets are able to interact directly with a Web server. servlets are also able to share data among programs, making functions such as a pool of database connections easy to implement. servlets are small programs that run on a server, typically intended to run on a client, resulting in services such as computing for the user or positioning graphics based on user interactions.
In the embodiment of the application, js is named JavaScript, and is a lightweight, interpreted or just-in-time compiled programming language with function priority; it is a high-level script language belonging to network, mainly used for Web, and is commonly used for adding various dynamic functions to Web page. And (4) pattern verification code: the abbreviation for CAPTCHA (CAPTCHA), which is "complete Automated piping test to tell Computers and Humans" is a Public, fully Automated program that distinguishes between a user and a computer or a human. It is possible to prevent: the password is cracked maliciously, the ticket is swiped, and the forum is irrigated, so that a hacker is effectively prevented from making continuous login attempts for a certain specific registered user in a brute force cracking mode of a specific program. And (3) barrier-free: the Web Content Accessibility guide wcag (Web Content Accessibility guides) covers various suggestions that make Web Content more accessible. Following these criteria will make it easier for more disabled people to access web site content, including those with blindness and amblyopia, deafness and hearing loss, limited movement, speech impairment, photosensitivity and a combination of multiple disabilities, as well as those with learning disabilities and cognitive limitations; but will not meet all of the needs of these disabled users.
The voice broadcast function of the embodiment of the application can be called in a js loading or target link (a user can trigger voice broadcast by clicking the target link), can be flexibly used in a plurality of scenes such as a PC (personal computer) end browser, a mobile phone browser and a mobile phone client, and improves the application capability of the system. Meanwhile, the function well makes up the defect of barrier-free function, provides better service for the vision-impaired customers and embodies the humanistic spirit of the system. The embodiment of the application synthesizes the voice file through the voice file, can support multiple languages to play, and supports multiple combination modes of letters and arrays. And various devices are supported, and the voice stream can be obtained through the request string without the limitation of a platform. The independent servlet generates an encrypted voice stream, and the background reserves a text copy of the verification code for verification, so that the method is safe and reliable. Provides better service for the vision-impaired customers and embodies the humanistic spirit of the system.
Fig. 3 is a schematic main flow diagram of a service processing method according to a third embodiment of the present application, and as shown in fig. 3, the service processing method includes:
step S301, receiving a service processing request, and acquiring a corresponding language identifier and a terminal identifier.
The service processing request may be, for example, a login authentication request or a registration authentication request, and the specific content of the service processing request is not limited in this embodiment of the application.
The service processing request may carry a language identifier and a terminal identifier. The language identification is used for representing the language type based on the business processing. The number of the terminal identifications can be one or more, when the number of the terminal identifications is multiple, the service processing method can be used for service processing requests initiated by the multiple terminals through the same interface, namely the service processing method can be suitable for various terminals and has strong universality.
Step S302, generating a verification code, encrypting the verification code and generating an encryption string.
The generation of the verification code may be randomly generated by the execution agent. The verification code can be encrypted by adopting a symmetric encryption algorithm (AES, DES and 3DES), wherein the symmetric encryption algorithm is that the encryption and decryption adopt the same key and are reversible (namely, can decrypt) to generate an encryption string.
Step S303, a basic voice library is called, and a basic voice file in the basic voice library corresponding to the language identifier is obtained.
The basic speech library may store basic speech of various languages, basic speech of various sound colors, basic speech of various accents, and the like.
And step S304, matching the encrypted string with the basic voice files, and assembling the matched basic voice files to generate a complete voice file.
For example, after matching the basic speech in english (or chinese) in the basic speech library with each bytecode in the encrypted string, the execution body may assemble the matched basic speech in english (or chinese) in the basic speech library based on the arrangement order of the bytecodes in the encrypted string to obtain a final speech file, such as ASJ 3.
Step S305, calling a voice broadcast interface corresponding to the terminal identification so as to perform corresponding voice broadcast based on the voice file.
And step S306, receiving verification information returned by the user based on the broadcast voice, and processing corresponding services based on the verification information.
As another implementation manner of the embodiment of the present application, the execution main body may further obtain an accent identifier in the service processing request, determine a matched basic voice from the basic voice library according to the accent identifier, and further assemble each basic voice file obtained by matching to generate a complete voice file. Therefore, the scheme of the application can be suitable for clients with various accents, the clients can more accurately determine the corresponding picture verification codes through the voice files broadcasted through the voice, and the verification dialog box is input to conduct verification, so that the user experience is greatly improved.
Fig. 5 is a schematic diagram of main units of a service processing apparatus according to an embodiment of the present application. As shown in fig. 5, the service processing apparatus 500 includes a receiving unit 501, a voice file generating unit 502, a voice broadcasting unit 503, and a service processing unit 504.
A receiving unit 501, configured to receive a service processing request, and obtain a corresponding language identifier and a terminal identifier;
a voice file generating unit 502 configured to generate a verification code, thereby calling a basic voice library to generate a voice file based on the verification code and a language identification;
the voice broadcasting unit 503 is configured to call a voice broadcasting interface corresponding to the terminal identifier, so as to perform corresponding voice broadcasting based on the voice file;
a service processing unit 504 configured to receive verification information returned by the user based on the broadcasted voice, and further process the corresponding service based on the verification information
In some embodiments, the receiving unit 501 is further configured to: in response to detecting a user interaction event with the authentication dialog, an authentication process is triggered.
In some embodiments, the apparatus further comprises an encryption unit, not shown in fig. 5, configured to: and encrypting the verification code to generate an encrypted string.
In some embodiments, the speech file generating unit 502 is further configured to: acquiring a basic voice file in a basic voice library corresponding to the language identification; and matching the encrypted string with the basic voice files, and assembling all the basic voice files obtained through matching to generate a complete voice file.
In some embodiments, the apparatus further comprises a verification code picture generation unit, not shown in fig. 5, configured to: and generating a verification code picture corresponding to the voice file based on the encrypted string.
In some embodiments, the voice announcement unit 503 is further configured to: and responding to the detected interaction event of the user to the verification code picture, and carrying out voice broadcasting on the voice file corresponding to the verification code picture.
In some embodiments, the traffic processing unit 504 is further configured to: matching the verification information with the verification code, and executing the service processing corresponding to the service processing request in response to successful matching; and responding to the matching failure, and returning request failure information.
It should be noted that, in the present application, the service processing method and the service processing apparatus have corresponding relation in the specific implementation content, so the repeated content is not described again.
Fig. 6 shows an exemplary system architecture 600 to which the service processing method or the service processing apparatus according to the embodiment of the present application can be applied.
As shown in fig. 6, the system architecture 600 may include terminal devices 601, 602, 603, a network 604, and a server 605. The network 604 serves to provide a medium for communication links between the terminal devices 601, 602, 603 and the server 605. Network 604 may include various types of connections, such as wire, wireless communication links, or fiber optic cables, to name a few.
A user may use the terminal devices 601, 602, 603 to interact with the server 605 via the network 604 to receive or send messages or the like. The terminal devices 601, 602, 603 may have installed thereon various communication client applications, such as shopping applications, web browser applications, search applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 601, 602, 603 may be various electronic devices having a business process screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 605 may be a server providing various services, such as a background management server (for example only) providing support for tasks submitted by users using the terminal devices 601, 602, 603. The background management server can receive the service processing request and acquire the corresponding language identification and the terminal identification; generating a verification code, and then calling a basic voice library to generate a voice file based on the verification code and the language identification; calling a voice broadcast interface corresponding to the terminal identification to perform corresponding voice broadcast based on the voice file; and receiving verification information returned by the user based on the broadcasted voice, and further processing corresponding services based on the verification information. The method can support multi-language voice broadcast, so that the vision-impaired client can accurately perform safety verification of the graphic verification code, better service is provided for the vision-impaired client, and the vision-impaired client can complete transaction service by self.
It should be noted that the service processing method provided in the embodiment of the present application is generally executed by the server 605, and accordingly, the service processing apparatus is generally disposed in the server 605.
It should be understood that the number of terminal devices, networks, and servers in fig. 6 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to FIG. 7, shown is a block diagram of a computer system 700 suitable for use in implementing a terminal device of an embodiment of the present application. The terminal device shown in fig. 7 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 7, the computer system 700 includes a Central Processing Unit (CPU)701, which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. In the RAM703, various programs and data necessary for the operation of the computer system 700 are also stored. The CPU701, the ROM702, and the RAM703 are connected to each other via a bus 704. An input/output (I/O) interface 705 is also connected to bus 704.
The following components are connected to the I/O interface 705: an input portion 706 including a keyboard, a mouse, and the like; an output section 707 including a display such as a Cathode Ray Tube (CRT), a liquid crystal credit authorization query processor (LCD), and the like, and a speaker and the like; a storage section 708 including a hard disk and the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. A drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read out therefrom is mounted into the storage section 708 as necessary.
In particular, according to embodiments disclosed herein, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, embodiments disclosed herein include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 709, and/or installed from the removable medium 711. The computer program executes the above-described functions defined in the system of the present application when executed by the Central Processing Unit (CPU) 701.
It should be noted that the computer readable medium shown in the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may include, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software or hardware. The described units may also be provided in a processor, and may be described as: a processor includes a receiving unit, a voice file generating unit, a voice broadcast and a service processing unit. Wherein the names of the elements do not in some way constitute a limitation on the elements themselves.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs, and when the one or more programs are executed by one of the devices, the device receives a service processing request and acquires a corresponding language identifier and a corresponding terminal identifier; generating a verification code, and then calling a basic voice library to generate a voice file based on the verification code and the language identification; calling a voice broadcast interface corresponding to the terminal identification to perform corresponding voice broadcast based on the voice file; and receiving verification information returned by the user based on the broadcasted voice, and further processing corresponding services based on the verification information.
The computer program product of the present application includes a computer program, and the computer program realizes the service processing method in the embodiment of the present application when being executed by a processor.
According to the technical scheme of the embodiment of the application, multi-language voice broadcasting can be supported, so that vision-impaired clients can accurately perform safety verification on the graphic verification codes, better service is provided for the vision-impaired clients, and the vision-impaired clients can complete transaction services by themselves.
The above-described embodiments should not be construed as limiting the scope of the present application. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may occur depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.
Claims (16)
1. A method for processing a service, comprising:
receiving a service processing request, and acquiring a corresponding language identifier and a terminal identifier;
generating a verification code, and then calling a basic voice library to generate a voice file based on the verification code and the language identification;
calling a voice broadcast interface corresponding to the terminal identification to perform corresponding voice broadcast based on the voice file;
and receiving verification information returned by the user based on the broadcasted voice, and processing corresponding services based on the verification information.
2. The method of claim 1, wherein prior to said generating the verification code, the method further comprises:
in response to detecting a user interaction event with the authentication dialog, an authentication process is triggered.
3. The method of claim 1, wherein after the generating the verification code, the method further comprises:
and encrypting the verification code to generate an encrypted string.
4. The method of claim 3, wherein generating a voice file based on the verification code and the language identification comprises:
acquiring a basic voice file in the basic voice library corresponding to the language identifier;
and matching the encrypted string with the basic voice files, and assembling the matched basic voice files to generate a complete voice file.
5. The method according to claim 3, wherein before the calling the voice broadcast interface corresponding to the terminal identifier, the method further comprises:
and generating a verification code picture corresponding to the voice file based on the encrypted string.
6. The method according to claim 5, wherein the performing the corresponding voice broadcast based on the voice file comprises:
and responding to the detected interaction event of the user to the verification code picture, and carrying out voice broadcasting on the voice file corresponding to the verification code picture.
7. The method according to any one of claims 1 to 6, wherein the processing the corresponding service based on the verification information comprises:
matching the verification information with the verification code, and executing the service processing corresponding to the service processing request in response to the successful matching;
and responding to the matching failure, and returning request failure information.
8. A traffic processing apparatus, comprising:
the receiving unit is configured to receive the service processing request and acquire a corresponding language identifier and a terminal identifier;
a voice file generating unit configured to generate a verification code and further call a basic voice library to generate a voice file based on the verification code and the language identification;
the voice broadcasting unit is configured to call a voice broadcasting interface corresponding to the terminal identifier so as to perform corresponding voice broadcasting based on the voice file;
and the service processing unit is configured to receive verification information returned by the user based on the broadcasted voice and further process the corresponding service based on the verification information.
9. The apparatus of claim 8, wherein the receiving unit is further configured to:
in response to detecting a user interaction event with the authentication dialog, an authentication process is triggered.
10. The apparatus of claim 8, further comprising an encryption unit configured to:
and encrypting the verification code to generate an encrypted string.
11. The apparatus of claim 10, wherein the voice file generating unit is further configured to:
acquiring a basic voice file in the basic voice library corresponding to the language identifier;
and matching the encrypted string with the basic voice files, and assembling the matched basic voice files to generate a complete voice file.
12. The apparatus according to claim 10, wherein the apparatus further comprises a verification code picture generation unit configured to:
and generating a verification code picture corresponding to the voice file based on the encrypted string.
13. The apparatus of claim 12, wherein the voice announcement unit is further configured to:
and responding to the detected interaction event of the user to the verification code picture, and carrying out voice broadcasting on the voice file corresponding to the verification code picture.
14. A transaction processing electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-7.
15. A computer-readable medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-7.
16. A computer program product comprising a computer program, wherein the computer program, when executed by a processor, implements the method of any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210143017.7A CN114614980A (en) | 2022-02-16 | 2022-02-16 | Service processing method and device, electronic equipment and computer readable medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210143017.7A CN114614980A (en) | 2022-02-16 | 2022-02-16 | Service processing method and device, electronic equipment and computer readable medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114614980A true CN114614980A (en) | 2022-06-10 |
Family
ID=81859695
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210143017.7A Pending CN114614980A (en) | 2022-02-16 | 2022-02-16 | Service processing method and device, electronic equipment and computer readable medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114614980A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101420305A (en) * | 2008-11-28 | 2009-04-29 | 重庆大学 | Speech identifying code implementing method |
US20150188915A1 (en) * | 2013-12-30 | 2015-07-02 | Tencent Technology (Shenzhen) Company Limited | System And Method For Verifying Identity Information Using A Social Networking Application |
CN105024816A (en) * | 2014-04-25 | 2015-11-04 | 腾讯科技(深圳)有限公司 | Information verification method based on audio frequency and device |
CN112948788A (en) * | 2021-04-13 | 2021-06-11 | 网易(杭州)网络有限公司 | Voice verification method, device, computing equipment and medium |
-
2022
- 2022-02-16 CN CN202210143017.7A patent/CN114614980A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101420305A (en) * | 2008-11-28 | 2009-04-29 | 重庆大学 | Speech identifying code implementing method |
US20150188915A1 (en) * | 2013-12-30 | 2015-07-02 | Tencent Technology (Shenzhen) Company Limited | System And Method For Verifying Identity Information Using A Social Networking Application |
CN105024816A (en) * | 2014-04-25 | 2015-11-04 | 腾讯科技(深圳)有限公司 | Information verification method based on audio frequency and device |
CN112948788A (en) * | 2021-04-13 | 2021-06-11 | 网易(杭州)网络有限公司 | Voice verification method, device, computing equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107249004B (en) | Identity authentication method, device and client | |
CN109214196B (en) | Data interaction method, device and equipment | |
US10033741B2 (en) | Scalable and dynamic content obfuscation | |
US11303596B2 (en) | Method and a device for processing information | |
KR102279582B1 (en) | Conferencing apparatus and method for switching access terminal thereof | |
CN112187702A (en) | Method and device for verifying client | |
CN114266033A (en) | Verification code generation method and device, verification code login system and electronic equipment | |
US9830599B1 (en) | Human interaction detection | |
US8892647B1 (en) | System and method for associating a cookie with a device identifier | |
EP3667527A1 (en) | Client server system | |
US20200110868A1 (en) | Augmented push authentication | |
CN113761566A (en) | Data processing method and device | |
CN112598810A (en) | Exhibition entrance processing method and device | |
CN116112172B (en) | Android client gRPC interface security verification method and device | |
CN106254226A (en) | A kind of information synchronization method and device | |
JP2022528366A (en) | Computer systems and methods including the HTML browser approval approach | |
CN108549808B (en) | Password management method and device | |
CN113422758B (en) | Data encryption method and device, internet of things system, electronic equipment and storage medium | |
JP7276737B2 (en) | Identity verification system and identity verification method | |
CN114614980A (en) | Service processing method and device, electronic equipment and computer readable medium | |
WO2023003699A1 (en) | Publisher permissioned activation in cookieless authentication environment | |
CN111416711B (en) | Transaction message processing method and device | |
CN114915462B (en) | Cross-station request forgery attack defense method and device, electronic equipment and medium | |
CN117240618B (en) | Household cloud box access method, device, equipment and storage medium | |
US10963559B1 (en) | Smart property archive for safeguarding software configuration |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |