CN115174163A - Authentication login method and device, computer equipment and readable storage medium - Google Patents
Authentication login method and device, computer equipment and readable storage medium Download PDFInfo
- Publication number
- CN115174163A CN115174163A CN202210699773.8A CN202210699773A CN115174163A CN 115174163 A CN115174163 A CN 115174163A CN 202210699773 A CN202210699773 A CN 202210699773A CN 115174163 A CN115174163 A CN 115174163A
- Authority
- CN
- China
- Prior art keywords
- user terminal
- login
- server
- analysis code
- account
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 74
- 238000004458 analytical method Methods 0.000 claims abstract description 115
- 230000004044 response Effects 0.000 claims description 8
- 238000005516 engineering process Methods 0.000 description 11
- 230000006870 function Effects 0.000 description 10
- 238000004891 communication Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 238000011840 criminal investigation Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000008451 emotion Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the application discloses an authentication login method, an authentication login device, computer equipment and a readable storage medium, wherein the authentication login method comprises the following steps: the method comprises the steps that a first user terminal responds to a triggering operation of an account number obtaining login request and sends the login request to a server; the first user terminal receives a play address corresponding to the signal audio sent by the server; the first user terminal responds to the trigger operation of the playing address, plays the signal audio, so that the second user terminal receives and analyzes the signal audio to obtain an operation analysis code, and sends the operation analysis code to the server; and the first user terminal receives a login permission instruction returned by the server to realize the account login. According to the method and the device, when the user logs in the account which is successfully logged in at other user terminals, the user can authenticate the login without inputting the account and the password repeatedly, so that the account login experience of the user is improved, and the account login process is efficient and convenient.
Description
Technical Field
The present application relates to the field of computers, and in particular, to an authentication login method, an authentication login device, a computer device, and a readable storage medium.
Background
Voiceprint recognition, a type of biometric identification technology, also known as speaker recognition, includes speaker identification and speaker verification. Voiceprint recognition is the conversion of acoustic signals into electrical signals, which are then recognized by a computer. Different tasks and applications may use different voiceprint recognition techniques, such as recognition techniques may be required to narrow criminal investigation, and validation techniques may be required for banking transactions.
The voiceprint recognition of a speaker has some defects, such as changeability of the voice of a person, and susceptibility to physical condition, age, emotion and the like; such as different microphones and channels having an impact on the recognition performance; such as ambient noise interfering with identification; for example, the voiceprint characteristics of a person are not easy to extract under the condition of a mixed speaker; 8230and 8230, etc. Therefore, in an application scenario, voiceprint recognition techniques are typically applied to unnatural, synthesized, or transformed sounds.
Currently, many systems used by users include a mobile phone client, a PC client, and an ipad client. The same account of the customer sometimes needs to be logged in at different user terminals. However, the user is usually required to repeatedly input the account and the password at different user terminals, which is a very tedious operation process for the user, and thus the user experience of the system is poor.
Disclosure of Invention
The embodiment of the application provides a method, a device, a computer device and a readable storage medium, which can enable a user to perform authentication login without repeatedly inputting an account password through a voiceprint recognition technology, thereby greatly improving user experience.
The embodiment of the application provides a method, which is applied to a first user terminal and comprises the following steps:
the method comprises the steps that a first user terminal responds to triggering operation of an account number obtaining login request, and sends the login request to a server, wherein the account number corresponding to the login request is successfully logged in a second user terminal;
the first user terminal receives a playing address corresponding to a signal audio sent by the server, wherein the signal audio is generated by the server according to a target analysis code, and the target analysis code is generated by the server according to the login request;
the first user terminal responds to the trigger operation of the playing address, plays the signal audio, so that the second user terminal receives and analyzes the signal audio to obtain an operation analysis code, and sends the operation analysis code to the server;
and the first user terminal receives a login permission instruction returned by the server to realize the login of the account, wherein the login permission instruction is determined by the server according to the comparison result of the operation analysis code and the target analysis code.
Optionally, before the first user terminal sends the login request to the server in response to a triggering operation of obtaining the login request by the account, the method further includes:
the account is received in response to an account name entered by a user.
Optionally, the account is any one of an email box and a mobile phone number.
The embodiment of the present application further provides a method, applied to a server, including:
the server receives the login request sent by a first user terminal, wherein the login request is generated by the first user terminal responding to the triggering operation of obtaining the login request by an account number, and the account number is successfully logged in a second user terminal;
the server generates a target analysis code according to the login request, generates a signal audio based on the target analysis code, and generates a playing address corresponding to the signal audio;
the server sends the playing address corresponding to the signal audio to the first user terminal;
the server receives an operation analysis code sent by the second user terminal, wherein the operation analysis code is generated by the second user terminal according to a signal audio played by the first user terminal, and the signal audio played by the first user terminal is obtained by the first user terminal from the playing address;
the server compares the operation analysis code with the target analysis code to obtain a comparison result;
the server acquires a login permission instruction according to the comparison result;
and the server sends a login permission instruction to the first user terminal to realize the successful login of the account at the first user terminal.
In the above embodiment, before the server sends the play address corresponding to the signal audio to the first user terminal, the method includes:
and the server generates bill information according to the login request, wherein the bill information is used for representing the information of the account.
In the above embodiment, the signal tone is a DTMF signal tone.
In the foregoing embodiment, the sending, by the server, a login permission instruction to the first user terminal to implement successful login of the account at the first user terminal includes:
the server acquires the login validity period of the account on the second user terminal and the login authority of the account according to the bill information;
the server acquires the relation between the target analysis code and the operation analysis code according to the target analysis code and the operation analysis code;
and if the generation time of the target analysis code is within the login validity period of the second user terminal, the target analysis code is the same as the operation analysis code, and the account number has login authority to log in the first user terminal, the server sends the login permission instruction to the first user terminal.
An embodiment of the present application further provides an authentication login apparatus, including:
the login request unit is used for the first user terminal to respond to the triggering operation of the account number acquisition login request and send the login request to the server, wherein the account number corresponding to the login request is successfully logged in the second user terminal;
a signal audio unit, configured to receive, by the first user terminal, a play address corresponding to a signal audio sent by the server, where the signal audio is generated by the server according to a target analysis code, and the target analysis code is generated by the server according to the login request;
the analysis unit is used for responding to the trigger operation of the playing address by the first user terminal, playing the signal audio so that the second user terminal receives and analyzes the signal audio to obtain an operation analysis code, and sending the operation analysis code to the server;
and the login instruction unit is used for receiving a login permission instruction returned by the server by the first user terminal to realize login of the account, wherein the login permission instruction is determined by the server according to a comparison result of the operation analysis code and the target analysis code.
The embodiment of the application also provides computer equipment, which comprises a processor and a memory, wherein the memory stores a plurality of instructions; the processor loads instructions from the memory to perform the steps of the method of authenticated login.
The embodiment of the present application further provides a computer-readable storage medium, where multiple instructions are stored, and the instructions are suitable for being loaded by a processor to perform the steps in the authentication login method.
According to the method and the device, the user can perform authentication login without repeatedly inputting the account number and the password through the voiceprint recognition technology, and the user experience is greatly improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the description below are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic view of an application scenario of an authentication login method according to an embodiment of the present application;
fig. 2 is a flowchart illustrating an authentication login method applied to a first user terminal according to an embodiment of the present application;
fig. 3 is a schematic flowchart of an authentication login method applied to a server according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an authentication login apparatus provided in an embodiment of the present application;
fig. 5 is a schematic structural diagram of a computer device provided in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in this application are used for distinguishing between different objects and not for describing a particular order. Also, the terms "comprises" and "comprising," as well as any variations thereof, are intended to cover non-exclusive inclusions.
The embodiment of the application provides an authentication login method, an authentication login device, computer equipment and a readable storage medium.
The authentication login device may be specifically integrated in a computer device, and the computer device may be a terminal, a server, or other devices. The terminal can be a mobile phone, a tablet Computer, an intelligent bluetooth device, a notebook Computer, or a Personal Computer (PC), and the like; the server may be a single server or a server cluster composed of a plurality of servers.
In some embodiments, the authentication login apparatus may also be integrated in multiple computer devices, for example, the authentication login apparatus may be integrated in multiple servers, and the multiple servers implement the authentication login method of the present application.
In some embodiments, the server may also be implemented in the form of a terminal.
Referring to fig. 1, fig. 1 shows an application scenario of an authentication login method provided in a specific implementation manner of an embodiment of the present application, and assuming that a user needs to log in an account of the user at a mobile client of an online bank and the account has successfully logged in at a tablet client, the user performs the following steps:
the method comprises the steps that a first user terminal responds to triggering operation of an account number obtaining login request, and sends the login request to a server, wherein the account number corresponding to the login request is successfully logged in a second user terminal. In this embodiment, the first user terminal is a mobile phone client of the internet bank, the second user terminal is the tablet computer client, and the user inputs an account number to the first user terminal by inputting an account number name corresponding to the account number, inputting a mobile phone number corresponding to the account number, or inputting a mailbox address corresponding to the account number, and clicks a login request button to trigger the login request. And the mobile phone client responds to the triggering operation of the login request and sends the login request to a server.
And the first user terminal receives a playing address corresponding to a signal audio sent by the server, wherein the signal audio is generated by the server according to a target analysis code, and the target analysis code is generated by the server according to the login request. In this embodiment, the server generates a target analysis code according to the login request, generates the signal audio according to the target analysis code, and sends a play address corresponding to the signal audio to the mobile phone client.
And the first user terminal responds to the trigger operation of the playing address, plays the signal audio, so that the second user terminal receives and analyzes the signal audio to obtain an operation analysis code, and sends the operation analysis code to the server. In this embodiment, the user clicks the play address at the mobile phone client, so that the mobile phone corresponding to the mobile phone client plays the signal audio through the speaker, and the tablet computer corresponding to the tablet computer client receives and analyzes the signal audio to obtain an operation analysis code, and sends the operation analysis code to the server.
And the first user terminal receives a login permission instruction returned by the server to realize the login of the account, wherein the login permission instruction is determined by the server according to the comparison result of the operation analysis code and the target analysis code. In this embodiment, the server determines the login permission instruction according to the comparison result between the operation analysis code and the target analysis code, and returns the login permission instruction to the mobile phone client, so that the account is successfully logged in the mobile phone client.
In the embodiment of the application, the user can perform authentication login without repeatedly inputting the account number and the password by the voiceprint recognition technology, and the user experience is greatly improved.
The following are detailed below. The numbers in the following examples are not intended to limit the order of preference of the examples.
In this embodiment, an authentication login method involving a voiceprint authentication technology is provided, as shown in fig. 2, where the authentication login method is applied to a first user terminal, and a specific flow of the authentication login method includes steps 110 to 140:
110. the method comprises the steps that a first user terminal responds to triggering operation of an account number obtaining login request, and sends the login request to a server, wherein the account number corresponding to the login request is successfully logged in a second user terminal.
A Terminal (Terminal) is also called a Terminal device, and is a device located at the outermost periphery of a network in a computer network, and is mainly used for inputting user information and outputting a processing result. With the development of mobile networks, mobile terminals (such as mobile phones and PADs) are widely used. In this case, the terminal can not only undertake input and output operations, but also perform certain operations and processing to implement partial system functions.
A Server (Server) is a type of computer that runs faster, is more heavily loaded, and is more expensive than a regular computer. The server provides calculation or application services for other clients (such as terminals like PC, smart phone, ATM and the like and even large equipment like train system and the like) in the network. The server has high-speed CPU computing capability, long-time reliable operation, strong I/O external data throughput capability and better expansibility. Generally, a server has the capability of responding to a service request, supporting a service, and guaranteeing the service according to the service provided by the server. The server is used as an electronic device, and the internal structure of the server is very complex, but the difference with the internal structure of a common computer is not great, such as: cpu, hard disk, memory, system bus, etc.
In connection with embodiments of the present application, the server refers to a dedicated computer that provides a certain service to the client terminal in a network environment.
The account number (account number) is a representative of the digital age, that is, a number of numbers that each person represents in a particular item, etc. The account number may sometimes consist of chinese or english, or even some symbols.
In some embodiments of the present application, the first user terminal may be any one of a plurality of hardware terminals, such as a mobile phone client, a PC client, and an ipad client, and the second user terminal may be any one of different client terminals from the first user terminal.
In some embodiments of the present application, before the first user terminal sends the login request to a server in response to a triggering operation of acquiring the login request by an account, the authentication login method further includes:
the account is received in response to an account name entered by a user.
Optionally, the account is any one of an email box and a mobile phone number.
Specifically, the user inputs an account to the first user terminal by inputting an account name corresponding to the account, inputting a mobile phone number corresponding to the account, or inputting an email corresponding to the account, and clicks a login request button to trigger the login request. And the first user terminal responds to the triggering operation of the login request and sends the login request to the server.
And meanwhile, the account number is successfully logged in the second user terminal.
120. And the first user terminal receives a playing address corresponding to a signal audio sent by the server, wherein the signal audio is generated by the server according to a target analysis code, and the target analysis code is generated by the server according to the login request.
In some embodiments of the application, the server generates a target analysis code according to the login request, generates the signal audio according to the target analysis code, and sends a play address corresponding to the signal audio to the mobile phone client.
In some embodiments of the present application, the target resolution code is a 6-bit dynamic code, and the signal tone is a DTMF signal tone.
DTMF (dual Tone multiple frequency) is a technology for realizing fast and reliable transmission of telephone numbers, and has strong anti-interference capability and high transmission speed, so that it can be widely used in telephone communication systems. But most are used as audio dialling for telephones. In addition, it can also be widely used in data communication systems to realize remote transmission of information such as various data streams and voice.
DTMF technology is an encoding technology that uses two specific single-tone combined signals to represent a digital signal to achieve its function. The two tones differ in frequency, and in the number represented or function implemented. The telephone set typically has 16 keys, of which there are 10 numeric keys 0-9 and 6 function keys, #, a, B, C, D. Since there are generally 8 different single audio signals according to the principle of combination. Therefore, 8 kinds of frequencies can be used, so it is called multifrequency, and it is called "2 in 8" coding technique because it uses 2 kinds arbitrarily extracted from 8 kinds of frequencies to code.
Based on the above-mentioned DTMF technique, a 6-bit dynamic code is converted into a segment of DTMF signal audio, i.e. the signal audio.
And the server stores the signal audio and simultaneously sends a playing address corresponding to the signal audio to the first user terminal so as to facilitate a subsequent user to click the playing address.
130. And the first user terminal responds to the trigger operation of the playing address to play the signal audio so that the second user terminal receives and analyzes the signal audio to obtain an operation analysis code, and sends the operation analysis code to the server.
In some embodiments of the present application, the user clicks the play address, so as to trigger the first user terminal to play the signal audio through a play device, and the second user terminal receives the signal audio through a receiving device, and obtains the operation analysis code by analyzing the signal audio.
Continuing with the above example, when the target analysis code is a 6-bit dynamic code, the operation analysis code is a 6-bit dynamic code. And after obtaining the analysis dynamic code, the second user terminal sends the analysis dynamic code to the server.
140. And the first user terminal receives a login permission instruction returned by the server to realize the login of the account, wherein the login permission instruction is determined by the server according to the comparison result of the operation analysis code and the target analysis code.
In some embodiments of the application, the target analysis code includes related information such as generation time of the login request, login permission of the account, and login validity period of the account on the second user terminal, and the comparison result is obtained by comparing the operation analysis code with the target analysis code.
Specifically, if the operation analysis code is the same as the target analysis code, the information included in the target analysis code is verified, so that a login-permitting instruction is obtained. And the server returns the login allowing instruction to the first user terminal.
In some embodiments of the present application, the login permission instruction is Session information.
Session, in computers, and especially in network applications, is called "Session control". The Session object stores the attributes and configuration information needed for a particular user Session. Thus, when a user jumps between Web pages of an application, the variables stored in the Session object will not be lost, but will persist throughout the user Session. When a user requests a Web page from an application, the Web server will automatically create a Session object if the user has not already a Session. When a session expires or is abandoned, the server will terminate the session. One of the most common uses of Session objects is to store user preferences. For example, if the user indicates that the user does not like to view graphics, this information may be stored in the Session object. Note that the session state is only preserved in browsers that support cookies.
Continuing with the above example, the Session information is Session information used to represent that the user successfully logs in the first user terminal.
According to the method and the device, the user can perform authentication login without repeatedly inputting the account number and the password through the voiceprint recognition technology, and the user experience is greatly improved.
Optionally, the present application further provides an authentication login method involving a voiceprint authentication technology, as shown in fig. 3, where the authentication login method is applied to a server, and a specific flow of the authentication login method includes steps 210 to 270:
210. the server receives the login request sent by a first user terminal, wherein the login request is generated by the first user terminal responding to the triggering operation of obtaining the login request by an account, and the account is successfully logged in a second user terminal.
220. And the server generates a target analysis code according to the login request, generates a signal audio based on the target analysis code, and generates a playing address corresponding to the signal audio.
In some embodiments of the present application, the target resolution code is a dynamic code, and the signal tone is a DTMF signal tone corresponding to the dynamic code. The DTMF tone has been described above, and will not be described herein.
230. And the server sends the playing address corresponding to the signal audio to the first user terminal.
In some embodiments of the application, before the server sends the play address corresponding to the signal audio to the first user terminal, the method includes:
and the server generates bill information according to the login request, wherein the bill information is used for representing the information of the account.
In some embodiments of the present application, the server establishes a mapping relationship between the target parsing code and the ticket information, so that the target parsing code can be used to characterize the information of the account.
240. And the server receives an operation analysis code sent by the second user terminal, wherein the operation analysis code is generated by the second user terminal according to the signal audio played by the first user terminal, and the signal audio played by the first user terminal is acquired by the first user terminal from the playing address.
250. And the server compares the operation analysis code with the target analysis code to obtain a comparison result.
260. And the server acquires a login permission instruction according to the comparison result.
270. And the server sends a login permission instruction to the first user terminal to realize the successful login of the account at the first user terminal.
Continuing with the above example, the sending, by the server, a login permission instruction to the first user terminal to implement successful login of the account at the first user terminal includes:
the server acquires the login validity period of the account on the second user terminal and the login authority of the account according to the bill information;
the server acquires the relation between the dynamic code and the operation analysis code according to the dynamic code and the operation analysis code;
and if the generation time of the dynamic code is within the login validity period of the second user terminal, the dynamic code is the same as the operation analysis code and the account number has login authority for logging in the first user terminal, the server sends the login permission instruction to the first user terminal.
Specifically, the information of the account at least includes a login validity period of the account on the second user terminal and a login authority of the account, the server obtains the generation time of the dynamic code through a built-in time system, and the server confirms whether the account is the same account through comparison between the dynamic code and the operation analysis code.
Continuing to explain with the example above, if the generation time of the dynamic code is within the login validity period of the second user terminal, the dynamic code is the same as the operation analysis code, and the account number has the login authority to log in the first user terminal, it is indicated that the login request is approved by the server, and the server sends the login permission instruction to the first user terminal, so as to realize the successful login of the account number in the first user terminal.
According to the method and the device, the user can perform authentication login without repeatedly inputting the account number and the password through the voiceprint recognition technology, and the user experience is greatly improved.
In order to better implement the method, the embodiment of the present application further provides an authentication login apparatus, which may be specifically integrated in a computer device, where the computer device may be a terminal, a server, or the like. The terminal can be a mobile phone, a tablet computer, an intelligent Bluetooth device, a notebook computer, a personal computer and other devices; the server may be a single server or a server cluster composed of a plurality of servers.
For example, as shown in fig. 4, the authentication login means may include:
a login request unit 401, configured to send, by a first user terminal, a login request to a server in response to a trigger operation of obtaining the login request by an account, where an account corresponding to the login request is successfully logged in a second user terminal;
a signal audio unit 402, configured to receive, by the first user terminal, a play address corresponding to a signal audio sent by the server, where the signal audio is generated by the server according to a target analysis code, and the target analysis code is generated by the server according to the login request;
the analysis unit 403 is configured to play the signal audio in response to a trigger operation on the play address by the first user terminal, so that the second user terminal receives and analyzes the signal audio to obtain an operation analysis code, and sends the operation analysis code to the server;
a login instruction unit 404, configured to receive, by the first user terminal, a login permission instruction returned by the server, and implement login of the account, where the login permission instruction is determined by the server according to a comparison result between the operation analysis code and the target analysis code.
In specific implementation, the above modules may be implemented as independent entities, or may be combined arbitrarily to be implemented as the same or several entities, and specific implementation of the above modules may refer to the foregoing method embodiments, which are not described herein again.
The embodiment of the application provides an authentication login device, which is based on the method embodiment, not only solves the problems of time and labor consumption in the implementation process of the method embodiment, but also solves the error problem existing in manual operation in the method embodiment through the setting of the functional unit, and saves the manual implementation time while ensuring the accuracy and refinement of the implementation process through the systematic operation of the functional unit, thereby improving the implementation efficiency of the technical scheme protected by the application.
The embodiment of the application further provides a computer device, which can be a terminal, a server and other devices. The terminal can be a mobile phone, a tablet computer, an intelligent Bluetooth device, a notebook computer, a personal computer and the like; the server may be a single server, a server cluster composed of a plurality of servers, and the like.
In some embodiments, the authentication login apparatus may also be integrated into multiple computer devices, for example, the authentication login apparatus may be integrated into multiple servers, and the multiple servers implement the authentication login method of the present application.
For example, as shown in fig. 5, a schematic structural diagram of a computer device according to an embodiment of the present application is shown, specifically:
the computer device may include components such as a processor 501 of one or more processing cores, memory 502 of one or more computer-readable storage media, a power supply 503, an input module 504, and a communication module 505. Those skilled in the art will appreciate that the computer device configuration illustrated in FIG. 4 does not constitute a limitation of the computer device, and may include more or fewer components than illustrated, or some components may be combined, or a different arrangement of components. Wherein:
the processor 501 is a control center of the computer device, connects various parts of the entire computer device using various interfaces and lines, and performs various functions of the computer device and processes data by running or executing software programs and/or modules stored in the memory 502 and calling data stored in the memory 502. In some embodiments, processor 501 may include one or more processing cores; in some embodiments, processor 501 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 501.
The memory 502 may be used to store software programs and modules, and the processor 501 executes various functional applications and data processing by operating the software programs and modules stored in the memory 502. The memory 502 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data created according to use of the computer device, and the like. Further, the memory 502 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 502 may also include a memory controller to provide the processor 501 with access to the memory 502.
The computer device also includes a power supply 503 for supplying power to the various components, and in some embodiments, the power supply 503 may be logically coupled to the processor 501 via a power management system, such that the power management system may manage charging, discharging, and power consumption. The power supply 503 may also include any component of one or more dc or ac power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, and the like.
The computer device may also include an input module 504, where the input module 504 may be used to receive entered numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control.
The computer device may also include a communication module 505, and in some embodiments the communication module 505 may include a wireless module by which the computer device may wirelessly transmit over short distances to provide wireless broadband internet access to a user. For example, the communication module 505 can be used to assist a user in emailing, browsing web pages, accessing streaming media, and the like.
Although not shown, the computer device may further include a display unit and the like, which are not described in detail herein. Specifically, in this embodiment, the processor 501 in the computer device loads the executable file corresponding to the process of one or more application programs into the memory 502 according to the following instructions, and the processor 501 runs the application programs stored in the memory 502, thereby implementing various functions as follows:
the method comprises the steps that a first user terminal responds to a triggering operation of an account number obtaining login request, and sends the login request to a server, wherein the account number corresponding to the login request is successfully logged in a second user terminal;
the first user terminal receives a playing address corresponding to a signal audio sent by the server, wherein the signal audio is generated by the server according to a target analysis code, and the target analysis code is generated by the server according to the login request;
the first user terminal responds to the trigger operation of the playing address, plays the signal audio, so that the second user terminal receives and analyzes the signal audio to obtain an operation analysis code, and sends the operation analysis code to the server;
and the first user terminal receives a login permission instruction returned by the server to realize the login of the account, wherein the login permission instruction is determined by the server according to the comparison result of the operation analysis code and the target analysis code.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
It will be understood by those skilled in the art that all or part of the steps of the methods of the above embodiments may be performed by instructions or by associated hardware controlled by the instructions, which may be stored in a computer readable storage medium and loaded and executed by a processor.
To this end, embodiments of the present application provide a computer-readable storage medium, in which a plurality of instructions are stored, where the instructions can be loaded by a processor to execute the steps in any one of the authentication login methods provided in the embodiments of the present application. For example, the instructions may perform the steps of:
the method comprises the steps that a first user terminal responds to triggering operation of an account number obtaining login request, and sends the login request to a server, wherein the account number corresponding to the login request is successfully logged in a second user terminal;
the first user terminal receives a playing address corresponding to a signal audio sent by the server, wherein the signal audio is generated by the server according to a target analysis code, and the target analysis code is generated by the server according to the login request;
the first user terminal responds to the trigger operation of the playing address, plays the signal audio, so that the second user terminal receives and analyzes the signal audio to obtain an operation analysis code, and sends the operation analysis code to the server;
and the first user terminal receives a login permission instruction returned by the server to realize the login of the account, wherein the login permission instruction is determined by the server according to the comparison result of the operation analysis code and the target analysis code.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
Wherein the storage medium may include: read Only Memory (ROM), random Access Memory (RAM), magnetic or optical disks, and the like.
Since the instructions stored in the storage medium may execute the steps of any authentication login method provided in the embodiments of the present application, beneficial effects that any authentication login method provided in the embodiments of the present application can achieve may be achieved, for details, see the foregoing embodiments, and are not described herein again.
The authentication login method, the authentication login device, the computer device and the readable storage medium provided in the embodiments of the present application are described in detail above, and specific examples are applied in the present application to explain the principles and embodiments of the present application, and the description of the above embodiments is only used to help understand the method and the core idea of the present application; meanwhile, for those skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.
Claims (10)
1. An authentication login method applied to a first user terminal, the method comprising:
the method comprises the steps that a first user terminal responds to triggering operation of an account number obtaining login request, and sends the login request to a server, wherein the account number corresponding to the login request is successfully logged in a second user terminal;
the first user terminal receives a playing address corresponding to a signal audio sent by the server, wherein the signal audio is generated by the server according to a target analysis code, and the target analysis code is generated by the server according to the login request;
the first user terminal responds to the trigger operation of the playing address, plays the signal audio, so that the second user terminal receives and analyzes the signal audio to obtain an operation analysis code, and sends the operation analysis code to the server;
and the first user terminal receives a login permission instruction returned by the server to realize the login of the account, wherein the login permission instruction is determined by the server according to the comparison result of the operation analysis code and the target analysis code.
2. The method according to claim 1, wherein before the first user terminal sends the login request to the server in response to a triggering operation of acquiring the login request by an account, the method further comprises:
the account is received in response to the account name entered by the user.
3. The method according to claim 1, wherein the account is any one of an email box and a mobile phone number.
4. An authentication login method is applied to a server, and the method comprises the following steps:
the server receives the login request sent by a first user terminal, wherein the login request is generated by the first user terminal responding to the triggering operation of obtaining the login request by an account, and the account is successfully logged in a second user terminal;
the server generates a target analysis code according to the login request, generates a signal audio based on the target analysis code, and generates a playing address corresponding to the signal audio;
the server sends the playing address corresponding to the signal audio to the first user terminal;
the server receives an operation analysis code sent by the second user terminal, wherein the operation analysis code is generated by the second user terminal according to a signal audio played by the first user terminal, and the signal audio played by the first user terminal is obtained by the first user terminal from the playing address;
the server compares the operation analysis code with the target analysis code to obtain a comparison result;
the server acquires a login permission instruction according to the comparison result;
and the server sends a login permission instruction to the first user terminal to realize the successful login of the account at the first user terminal.
5. The method according to claim 4, wherein before the server sends the playing address corresponding to the signal audio to the first user terminal, the method comprises:
and the server generates bill information according to the login request, wherein the bill information is used for representing the information of the account.
6. The method of claim 5, wherein the signal tones are DTMF signal tones.
7. The method according to claim 6, wherein the server sends a login permission instruction to the first user terminal to enable the account to successfully log in at the first user terminal, and the login permission instruction comprises:
the server acquires the login validity period of the account on the second user terminal and the login authority of the account according to the bill information;
the server acquires the relation between the target analysis code and the operation analysis code according to the target analysis code and the operation analysis code;
and if the generation time of the target analysis code is within the login validity period of the second user terminal, the target analysis code is the same as the operation analysis code, and the account number has login authority to log in the first user terminal, the server sends the login permission instruction to the first user terminal.
8. An authentication login apparatus, comprising:
the login request unit is used for responding to triggering operation of obtaining a login request by an account number by a first user terminal and sending the login request to a server, wherein the account number corresponding to the login request is successfully logged in a second user terminal;
a signal audio unit, configured to receive, by the first user terminal, a play address corresponding to a signal audio sent by the server, where the signal audio is generated by the server according to a target analysis code, and the target analysis code is generated by the server according to the login request;
the analysis unit is used for responding to the trigger operation of the playing address by the first user terminal, playing the signal audio so that the second user terminal receives and analyzes the signal audio to obtain an operation analysis code, and sending the operation analysis code to the server;
and the login instruction unit is used for receiving a login permission instruction returned by the server by the first user terminal to realize the login of the account, wherein the login permission instruction is determined by the server according to the comparison result of the operation analysis code and the target analysis code.
9. A computer device comprising a processor and a memory, the memory storing a plurality of instructions; the processor loads instructions from the memory to perform the steps of a method of authenticated login according to any of claims 1-7.
10. A computer readable storage medium storing instructions adapted to be loaded by a processor to perform the steps of a method of authenticating a login as claimed in any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210699773.8A CN115174163A (en) | 2022-06-20 | 2022-06-20 | Authentication login method and device, computer equipment and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210699773.8A CN115174163A (en) | 2022-06-20 | 2022-06-20 | Authentication login method and device, computer equipment and readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115174163A true CN115174163A (en) | 2022-10-11 |
Family
ID=83487434
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210699773.8A Pending CN115174163A (en) | 2022-06-20 | 2022-06-20 | Authentication login method and device, computer equipment and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115174163A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150341356A1 (en) * | 2014-05-26 | 2015-11-26 | Netease Information Technology(Beijing) Co., Ltd. | Login method and apparatus |
CN106921650A (en) * | 2016-12-21 | 2017-07-04 | 阿里巴巴集团控股有限公司 | The login method of striding equipment, system and device |
US20170366917A1 (en) * | 2015-10-16 | 2017-12-21 | Tencent Technology (Shenzhen) Company Limited | Method for logging in to application, server, terminal, and nonvolatile computer readable storage medium |
CN110392054A (en) * | 2019-07-23 | 2019-10-29 | 网易(杭州)网络有限公司 | Log in method of calibration, device, system, equipment and readable storage medium storing program for executing |
CN112580014A (en) * | 2020-12-24 | 2021-03-30 | 维沃移动通信有限公司 | Verification code obtaining method and device |
-
2022
- 2022-06-20 CN CN202210699773.8A patent/CN115174163A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150341356A1 (en) * | 2014-05-26 | 2015-11-26 | Netease Information Technology(Beijing) Co., Ltd. | Login method and apparatus |
US20170366917A1 (en) * | 2015-10-16 | 2017-12-21 | Tencent Technology (Shenzhen) Company Limited | Method for logging in to application, server, terminal, and nonvolatile computer readable storage medium |
CN106921650A (en) * | 2016-12-21 | 2017-07-04 | 阿里巴巴集团控股有限公司 | The login method of striding equipment, system and device |
CN110392054A (en) * | 2019-07-23 | 2019-10-29 | 网易(杭州)网络有限公司 | Log in method of calibration, device, system, equipment and readable storage medium storing program for executing |
CN112580014A (en) * | 2020-12-24 | 2021-03-30 | 维沃移动通信有限公司 | Verification code obtaining method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111556006B (en) | Third-party application system login method, device, terminal and SSO service platform | |
JP5852730B2 (en) | Device access using voice authentication | |
US20140359736A1 (en) | Dynamic voiceprint authentication | |
CN110351269A (en) | The method for logging in open platform by third-party server | |
US10979423B1 (en) | Bi-directional voice authentication | |
CN112199652B (en) | Login method, terminal, server, system, medium and equipment of application program | |
US20120204225A1 (en) | Online authentication using audio, image and/or video | |
CN114139135B (en) | Equipment login management method, device and storage medium | |
US20240194195A1 (en) | Authentication of impaired voices | |
US20180357404A1 (en) | Information processing method and apparatus, and electronic device | |
CN111787054B (en) | Cloud game input method, device, equipment and medium | |
CN111191200B (en) | Three-party linkage authentication page display method and device and electronic equipment | |
CN112380552A (en) | Data processing method and device, storage medium and computer equipment | |
US20120053937A1 (en) | Generalizing text content summary from speech content | |
AU2011349110B2 (en) | Voice authentication system and methods | |
US8050930B2 (en) | Telephone voice command enabled computer administration method and system | |
CN105491153A (en) | Sharing method and device and mobile terminal | |
CN106373016A (en) | Method and apparatus for establishing online social relations | |
CN115174163A (en) | Authentication login method and device, computer equipment and readable storage medium | |
CN113413590B (en) | Information verification method, device, computer equipment and storage medium | |
US20200242220A1 (en) | Authentication using user device microphone inputs | |
CN114095266A (en) | Login authentication method and device, electronic equipment and readable storage medium | |
CN115174161B (en) | Account login method and device, electronic equipment and storage medium | |
CN115664686A (en) | Login method, login device, computer equipment and storage medium | |
CN112597465A (en) | Voice password verification method and verification device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20221011 |