WO2015106728A1 - Data processing method and system - Google Patents

Data processing method and system Download PDF

Info

Publication number
WO2015106728A1
WO2015106728A1 PCT/CN2015/071139 CN2015071139W WO2015106728A1 WO 2015106728 A1 WO2015106728 A1 WO 2015106728A1 CN 2015071139 W CN2015071139 W CN 2015071139W WO 2015106728 A1 WO2015106728 A1 WO 2015106728A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
server
information
voice information
client
Prior art date
Application number
PCT/CN2015/071139
Other languages
French (fr)
Inventor
Danqing SUN
Zhan SHU
Nongfei Pan
Original Assignee
Tencent Technology (Shenzhen) Company Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology (Shenzhen) Company Limited filed Critical Tencent Technology (Shenzhen) Company Limited
Publication of WO2015106728A1 publication Critical patent/WO2015106728A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Definitions

  • the present disclosure relates to the field of Internet communications, and in particular, to a data processing method and system.
  • a mobile phone is a most common mobile terminal; the mobile phone only has session and texting functions originally, and after development, it now has a data processing function.
  • a user may process user accounts of two users by using the data processing function of the mobile phone.
  • the two users include a first user and a second user.
  • a process in which the mobile phone processes the user account of the first user and the user account of the second user is as follows: the mobile phone sends a user identifier of the first user and order information about a to-be-processed object to a server, where the order information at least includes a user identifier of the second user and a transfer value; the server acquires the user account and a password of the first user according to the user identifier of the first user, where the user account of the first user at least includes an account value of the first user, and acquires the user account of the second user, where the user account of the second user at least includes an account value of the second user.
  • the mobile phone displays a password input interface, and the user moves a cursor to an input box in the password input interface, and opens a keyboard of the mobile phone to input a password in the input box;
  • the mobile phone acquires the password input by the user, and sends the password input by the user to the server;
  • the server receives the password sent by the user, and performs authentication by matching the acquired password and the password input by the user, and when the authentication succeeds, the server deducts the transfer value from the account value contained in the user account of the first user, and adds the deducted transfer value to the account value contained in the user account of the second user, to implement data processing.
  • the password is easy to divulge and easy to crack, which makes the user account of the first user insecure.
  • the present disclosure provides a data processing method, where the method includes:
  • the first server requesting, by the first server, voice information from the first client, where the voice information is used to perform identity authentication on the user identifier;
  • the voice information acquiring, by the first server, the voice information, and acquiring authentication voice information reserved by the user, where the authentication voice information includes voiceprint information and voice content information that are reserved by the user;
  • the present disclosure provides a data processing system, where the system includes:
  • the first client is configured to acquire a value transfer request, where the value transfer request at least includes a transfer value and a user identifier;
  • the first server is configured to request voice information from the first client, where the voice information is used to perform identity authentication on the user identifier;
  • the first client is further configured to acquire voice information of the user and send the voice information of the user to the first server, where the voice information includes voiceprint information and voice content information of the user;
  • the first server is further configured to acquire the voice information, and acquire authentication voice information reserved by the user, where the authentication voice information includes voiceprint information and voice content information that are reserved by the user;
  • the first server is further configured to match the voice information and the authentication voice information, and if the matching succeeds, perform a value transfer operation on a user account corresponding to or bound to the user identifier.
  • FIG. 2 is a flowchart of a data processing method according to Embodiment 2 of the present invention.
  • FIG. 3 is a schematic structural diagram of a data processing system according to Embodiment 3 of the present invention.
  • This embodiment of the present invention provides a data processing method. Referring to FIG. 1, the method includes:
  • Step 101 A first client acquires a value transfer request, where the value transfer request at least includes a transfer value and a user identifier.
  • Step 102 The first client sends the value transfer request to a first server, where the user identifier is used to uniquely identify a user on the first server.
  • Step 103 The first server requests voice information from the first client, where the voice information is used to perform identity authentication on the user identifier.
  • Step 104 The first client acquires voice information of the user and sends the voice information of the user to the first server, where the voice information includes voiceprint information and voice content information of the user.
  • Step 105 The first server acquires the voice information, and acquires authentication voice information reserved by the user, where the authentication voice information includes voiceprint information and voice content information that are reserved by the user.
  • a first server when processing data, acquires voice information of a user and authentication voice information reserved by the user, and performs identity authentication on a user identifier according to voiceprint information included in the voice information and voiceprint information included in the authentication voice information. Because the voiceprint information is not easy to divulge or crack, the security of data processing is enhanced.
  • This embodiment of the present invention provides a data processing method. Referring to FIG. 2, the method includes:
  • the user may set authentication information for a user account thereof by using voice.
  • the user first inputs a voice signal to the second client; the second client collects, by using a voice signal collection device, the voice signal input by the user, extracts voiceprint information of the user and voice content information of the voice signal from the voice signal input by the user, and combines the extracted voiceprint information of the user and voice content information of the voice signal to form authentication voice information.
  • the step of storing, by the second client, a correspondence between the user identifier and the authentication voice information in a first server may be as follows:
  • the second client binds the user identifier and the authentication voice information to establish a correspondence, and sends the correspondence between the user identifier and the authentication voice information to the first server; and the first server receives the correspondence between the user identifier and the authentication voice information sent by the second client, and stores the correspondence between the user identifier and the authentication voice information.
  • the second client binds the user identifier and the authentication voice information to establish a correspondence, and sends the correspondence between the user identifier and the authentication voice information to the second server, where the second server is any server except the first server; and the second server receives the correspondence between the user identifier and the authentication voice information sent by the second client, and stores the correspondence between the user identifier and the authentication voice information.
  • the first server or the second server stores the user identifier and the authentication voice information in a correspondence between user identifiers and authentication voice information as shown in table 1.
  • the user uses a personal computer (PC) terminal to access the first server, and the first server sends a page of order details to the PC terminal, where the page of order details at least includes identities (ID) of to-be-processed objects and description information.
  • the user selects a to-be-processed object on the page of order details; the PC terminal sends the ID and quantity of the to-be-processed objects selected by the user to the first server; the first server generates a transfer value according to the ID and quantity of the to-be-processed objects selected by the user.
  • the first server may generate, by using a graphic code generating algorithm, a graphic code that includes the transfer value, and displays the generated graphic code on the PC terminal, or pastes the generated graphic code on the to-be-processed object.
  • Step 203 A first client acquires a value transfer request, where the value transfer request at least includes a transfer value and a user identifier.
  • the second client generates a graphic code according to the user identifier, where the graphic code includes the user identifier.
  • the second client when the second client cannot connect to the Internet, the second client generates a graphic code according to the user identifier and by using any existing graphic code generating algorithm, and displays the graphic code, where the graphic code includes the user identifier.
  • the first client scans the graphic code displayed on the second client, and acquires the user identifier from the graphic code.
  • the first client is any client having a transfer function; for example, the first client is a point of sale (POS) .
  • POS point of sale
  • the first client acquires the transfer value, and generates the value transfer request that includes the transfer value and the user identifier.
  • Step 204 The first client sends the value transfer request to the first server.
  • Step 206 The first client acquires voice information of the user and sends the voice information of the user to the first server, where the voice information includes voiceprint information and voice content information of the user.
  • the extracting, by the second client, voiceprint information of the user and voice content information of the voice signal from the voice signal input by the user belongs to the prior art, and is not described in detail herein again.
  • the user When inputting the voice signal, the user does not need to open a keyboard, which reduces an input time and improves the processing efficiency.
  • Step 207 The first server acquires the voice information, and acquires authentication voice information reserved by the user, where the authentication voice information includes voiceprint information and voice content information that are reserved by the user.
  • the step of acquiring authentication voice information reserved by the user may be as follows:
  • the first server acquires, according to the user identifier, authentication voice information from the correspondence between user identifiers and authentication voice information, where the correspondence is stored in the first server, and uses the acquired authentication voice information as the authentication voice information reserved by the user; or
  • the first server sends the user identifier to the second server; the second server receives the user identifier sent by the first server, and acquires, according to the user identifier, authentication voice information corresponding to the user identifier from the stored correspondence between user identifiers and authentication voice information; the second server sends the authentication voice information to the first server; the first server receives the authentication voice information sent by the second server, and uses the received authentication voice information as the authentication voice information reserved by the user.
  • the first server acquires, according to a user identifier ID1 of a user, authentication voice information corresponding to user 1, namely "agree to process" , and voiceprint information 1 from the correspondence between user identifiers and authentication voice information stored in table 1.
  • Step 208 may include the following steps (1) to (3) :
  • the first server continues to determine whether the voiceprint information is the same as the reserved voiceprint information; if the voice content information is different from the voice content information, the matching fails, the user fails to pass the identity authentication performed by the first server, and the first server sends a response message to the first client, where the response message carries a matching failure indication.
  • the step of determining, by the first server, whether the voiceprint information is the same as the reserved voiceprint information may be as follows:
  • the first server calculates a sound wave matching degree between the voiceprint information and the reserved voiceprint information; if the sound wave matching degree is greater than a preset threshold, the first server determines that the voiceprint information is the same as the reserved voiceprint information; and if the sound wave matching degree is not greater than the preset threshold, the first server determines that the voiceprint information is different from the voiceprint information.
  • the matching succeeds, the user passes the identity authentication performed by the first server, and the first server performs step (3) ; if the voice content information is different from the voice content information, or the voiceprint information is different from the reserved voiceprint information, the matching fails, the user fails to pass the identity authentication performed by the first server, and the first server sends a response message to the first client, where the response message carries a matching failure indication.
  • the preset threshold may be set as needed and modified, and in this embodiment of the present invention, the preset threshold is not subject to any specific limitation.
  • the method for calculating the sound wave matching degree may be any existing method for calculating a sound wave matching degree, and in this embodiment of the present invention, the method for calculating the sound wave matching degree is not subject to any specific limitation either.
  • the first server removes a corresponding transfer value from the user account corresponding to or bound to the user identifier, and adds the corresponding transfer value to a user account corresponding to or bound to a user that corresponds to the first client.
  • the first server stores correspondence between user identifiers and user accounts in advance, and according to the user identifier of the user, the first server can acquire the user account corresponding to or bound to the user identifier of the user from the correspondence between user identifiers of users and user accounts.
  • the first server stores a correspondence between identifiers of clients and user identifiers in advance, and according to the identifier of the first client, the first server can acquire the user identifier corresponding to the identifier of the first client from the correspondence between identifiers of clients and user identifiers.
  • the user account of the user includes a value, identity information of the user, account information, and the like; the identity information includes information such as the name and/or identity card number of the user; and the account information includes a processing history and the like.
  • the identifier of the client is any identifier that can identify the client, for example, the identifier of the client is a globally unique identifier (GUID) of the client.
  • GUID globally unique identifier
  • the first server acquires, from table 2 according to the identifier of the client: client 1, the user identifier ID2 corresponding to client 1, and acquires, from table 3 according to the user identifier ID2, the user account 2 corresponding to user 2; the first server acquires, from table 3 according to the user identifier ID1 of the user, the user account corresponding to user 1, namely, the user account 1.
  • the first server removes the transfer value from the value contained in the user account 1, and adds the removed transfer value to the value contained in the user account 2; if the user does not pass the identity authentication performed by the first server, the first server does not process the user account 1 or user account 2.
  • a first server when processing data, acquires voice information of a user and authentication voice information reserved by the user, and performs identity authentication on a user identifier according to voiceprint information included in the voice information and voiceprint information included in the authentication voice information. Because the voiceprint information is not easy to divulge or crack, the security of data processing is enhanced.
  • the first client 301 is configured to acquire a value transfer request, where the value transfer request at least includes a transfer value and a user identifier.
  • the first client 301 is further configured to send the value transfer request to the first server 320, where the user identifier is used to uniquely identify a user on the first server 302.
  • the first server 302 is configured to request voice information from the first client 301, where the voice information is used to perform identity authentication on the user identifier.
  • the first server 302 is further configured to acquire the voice information, and acquire authentication voice information reserved by the user, where the authentication voice information includes voiceprint information and voice content information that are reserved by the user.
  • the first server 302 is further configured to match the voice information and the authentication voice information, and if the matching succeeds, perform a value transfer operation on a user account corresponding to or bound to the user identifier.
  • the first server 302 is further configured to remove a corresponding transfer value from the user account corresponding to or bound to the user identifier, and add the corresponding transfer value to a user account corresponding to or bound to a user that corresponds to the first client 301.
  • the first server 302 is further configured to: if the voiceprint information is the same as the reserved voiceprint information and the voice content information is the same as the reserved voice content information, determine that the matching succeeds, or otherwise, determine that the matching fails.
  • the first server 302 is further configured calculate a sound wave matching degree between the voiceprint information and the reserved voiceprint information.
  • the first server 302 is further configured to: if the sound wave matching degree is greater than a preset threshold, determine that the voiceprint information is the same as the reserved voiceprint information.
  • system further include: a second client and a second server.
  • the second client is further configured to acquire the user identifier, and store a correspondence between the user identifier and the authentication voice information in the first server 302 or in the second server, where the second server is any server except the first server 302.
  • the first server 302 is configured to acquire, according to the user identifier, authentication voice information from the correspondence between user identifiers and authentication voice information, where the correspondence is stored in the first server, and use the acquired authentication voice information as the authentication voice information reserved by the user.
  • the first server 302 is further configured to acquire, according to the user identifier, authentication voice information from the correspondence between user identifiers and authentication voice information, where the correspondence is stored in the second server, and use the acquired authentication voice information as the authentication voice information reserved by the user.
  • the second client is configured to generate a graphic code according to the user identifier, where the graphic code includes the user identifier.
  • the first client 301 is further configured to acquire the transfer value, and generate the value transfer request that includes the transfer value and the user identifier.
  • a first server when processing data, acquires voice information of a user and authentication voice information reserved by the user, and performs identity authentication on a user identifier according to voiceprint information included in the voice information and voiceprint information included in the authentication voice information. Because the voiceprint information is not easy to divulge or crack, the security of data processing is enhanced.
  • the program may be stored in a computer readable storage medium.
  • the storage medium may be a read-only memory, a magnetic disk, an optical disc, or the like.

Abstract

The present disclosure discloses a data processing method and system, which relate to the field of Internet communications. The method includes: acquiring, by a first client, a value transfer request; sending, by the first client, the value transfer request to a first server; requesting, by the first server, voice information from the first client, where the voice information is used to perform identity authentication on a user identifier; acquiring, by the first client, voice information of a user and sending the voice information of the user to the first server, where the voice information includes voiceprint information and voice content information of the user; acquiring, by the first server, the voice information, and acquiring authentication voice information reserved by the user, where the authentication voice information includes voiceprint information and voice content information that are reserved by the user; matching, by the first server, the voice information and the authentication voice information, and if the matching succeeds, performing value transfer on a user account corresponding to or bound to the user identifier. The system includes a first client and a first server. The voiceprint information is not easy to divulge or crack, and therefore, the security of data processing is enhanced.

Description

DATA PROCESSING METHOD AND SYSTEM FIELD OF THE INVENTION
The present disclosure relates to the field of Internet communications, and in particular, to a data processing method and system.
BACKGROUND OF THE INVENTION
With the rapid development of mobile terminal technologies, mobile terminals have more and more functions. For example, a mobile phone is a most common mobile terminal; the mobile phone only has session and texting functions originally, and after development, it now has a data processing function. A user may process user accounts of two users by using the data processing function of the mobile phone.
The two users include a first user and a second user. A process in which the mobile phone processes the user account of the first user and the user account of the second user is as follows: the mobile phone sends a user identifier of the first user and order information about a to-be-processed object to a server, where the order information at least includes a user identifier of the second user and a transfer value; the server acquires the user account and a password of the first user according to the user identifier of the first user, where the user account of the first user at least includes an account value of the first user, and acquires the user account of the second user, where the user account of the second user at least includes an account value of the second user. Then, the mobile phone displays a password input interface, and the user moves a cursor to an input box in the password input interface, and opens a keyboard of the mobile phone to input a password in the input box; the mobile phone acquires the password input by the user, and sends the password input by the user to the server; the server receives the password sent by the user, and performs authentication by matching the acquired password and the password input by the user, and when the authentication succeeds, the server deducts the transfer value from the account value contained in the user account of the first user, and adds the deducted transfer value to the account value contained in the user account of the second user, to implement data processing.
When implementing the present disclosure, the inventor finds that the prior art at least has the following problem:
When the first user inputs the password, the password is easy to divulge and easy to crack, which makes the user account of the first user insecure.
SUMMARY
In order to solve the problem in the prior art, the present disclosure provides a data processing method and system. The technical solutions are as follows:
According to one aspect, the present disclosure provides a data processing method, where the method includes:
acquiring, by a first client, a value transfer request, where the value transfer request at least includes a transfer value and a user identifier;
sending, by the first client, the value transfer request to a first server, where the user identifier is used to uniquely identify a user on the first server;
requesting, by the first server, voice information from the first client, where the voice information is used to perform identity authentication on the user identifier;
acquiring, by the first client, voice information of the user and sending the voice information of the user to the first server, where the voice information includes voiceprint information and voice content information of the user;
acquiring, by the first server, the voice information, and acquiring authentication voice information reserved by the user, where the authentication voice information includes voiceprint information and voice content information that are reserved by the user; and 
matching, by the first server, the voice information and the authentication voice information, and if the matching succeeds, performing a value transfer operation on a user account corresponding to or bound to the user identifier.
According to another aspect, the present disclosure provides a data processing system, where the system includes:
a first client and a first server;
the first client is configured to acquire a value transfer request, where the value transfer request at least includes a transfer value and a user identifier;
the first client is further configured to send the value transfer request to the first server, where the user identifier is used to uniquely identify a user on the first server;
the first server is configured to request voice information from the first client, where the voice information is used to perform identity authentication on the user identifier;
the first client is further configured to acquire voice information of the user and send the voice information of the user to the first server, where the voice information includes voiceprint information and voice content information of the user;
the first server is further configured to acquire the voice information, and acquire authentication voice information reserved by the user, where the authentication voice information includes voiceprint information and voice content information that are reserved by the user; and
the first server is further configured to match the voice information and the authentication voice information, and if the matching succeeds, perform a value transfer operation on a user account corresponding to or bound to the user identifier.
In embodiments of the present invention, when processing data, a first server acquires voice information of a user and authentication voice information reserved by the user, and performs identity authentication on a user identifier according to voiceprint information included in the voice information and voiceprint information included in the authentication voice information. Because the voiceprint information is not easy to divulge or crack, the security of data processing is enhanced.
BRIEF DESCRIPTION OF THE DRAWINGS
To illustrate the technical solutions in the embodiments of the present invention more clearly, the following briefly introduces the accompanying drawings required for describing the embodiments of the present invention. Apparently, the accompanying drawings in the following description show merely some embodiments of the present invention, and a person of ordinary skill in the art may still derive other drawings from these accompanying drawings without creative efforts.
FIG. 1 is a flowchart of a data processing method according to Embodiment 1 of the present invention;
FIG. 2 is a flowchart of a data processing method according to Embodiment 2 of the present invention; and 
FIG. 3 is a schematic structural diagram of a data processing system according to Embodiment 3 of the present invention.
DESCRIPTION OF EMBODIMENTS
To make the objectives, technical solutions, and advantages of the present disclosure clearer, the following describes implementation manners of the present disclosure in further detail with reference to the accompanying drawings.
Embodiment 1
This embodiment of the present invention provides a data processing method. Referring to FIG. 1, the method includes:
Step 101: A first client acquires a value transfer request, where the value transfer request at least includes a transfer value and a user identifier.
Step 102: The first client sends the value transfer request to a first server, where the user identifier is used to uniquely identify a user on the first server.
Step 103: The first server requests voice information from the first client, where the voice information is used to perform identity authentication on the user identifier.
Step 104: The first client acquires voice information of the user and sends the voice information of the user to the first server, where the voice information includes voiceprint information and voice content information of the user.
Step 105: The first server acquires the voice information, and acquires authentication voice information reserved by the user, where the authentication voice information includes voiceprint information and voice content information that are reserved by the user.
Step 106: The first server matches the voice information and the authentication voice information, and if the matching succeeds, performs a value transfer operation on a user account corresponding to or bound to the user identifier.
In this embodiment of the present invention, when processing data, a first server acquires voice information of a user and authentication voice information reserved by the user, and performs identity authentication on a user identifier according to voiceprint information included in the voice information and voiceprint information included in the authentication voice information. Because the voiceprint information is not easy to divulge or crack, the security of data processing is enhanced.
Embodiment 2
This embodiment of the present invention provides a data processing method. Referring to FIG. 2, the method includes:
Step 201: A second client receives a voice signal input by a user, extracts voiceprint information and voice content information from the voice signal, and combines the voiceprint information and the voice content information to form authentication voice information.
The user may set authentication information for a user account thereof by using voice. The user first inputs a voice signal to the second client; the second client collects, by using a voice signal collection device, the voice signal input by the user, extracts voiceprint information of the user and voice content information of the voice signal from the voice signal input by the user, and combines the extracted voiceprint information of the user and voice content information of the voice signal to form authentication voice information.
The voice signal collection device may be a microphone or the like. The second client may be any client having a processing system, for example, a mobile phone client, a tablet computer client, or a personal digital assistant (PDA) client.
It should be noted that, the extracting, by the second client, voiceprint information of the user and voice content information of the voice signal from the voice signal belongs to the prior art, and is not described in detail herein again.
Description is made by using that the second client is a mobile phone client as an example. The user inputs a voice signal by speaking to the microphone of the mobile phone, and content of the speech is "agree to process" ; the mobile phone collects, by using the microphone, the voice signal "agree to process" input by the user, extracts voiceprint information 1 and the voice content information "agree to process" from the voice signal, and combines the extracted voiceprint information 1 and voice content information "agree to process" to form authentication voice information.
Step 202: The second client acquires a user identifier, and stores a correspondence between the user identifier and the authentication voice information in a first server or in a second server.
The first server is any server having a data processing function, and the second server is any server except the first server.
The step of storing, by the second client, a correspondence between the user identifier and the authentication voice information in a first server may be as follows:
The second client binds the user identifier and the authentication voice information to establish a correspondence, and sends the correspondence between the user identifier and the authentication voice information to the first server; and the first server receives the correspondence  between the user identifier and the authentication voice information sent by the second client, and stores the correspondence between the user identifier and the authentication voice information.
The step of storing, by the second client, a correspondence between the user identifier and the authentication voice information in a second server may be as follows:
The second client binds the user identifier and the authentication voice information to establish a correspondence, and sends the correspondence between the user identifier and the authentication voice information to the second server, where the second server is any server except the first server; and the second server receives the correspondence between the user identifier and the authentication voice information sent by the second client, and stores the correspondence between the user identifier and the authentication voice information.
A user identifier is used to uniquely identify a user on the first server; a user identifier of a user may be a user identifier of the user in a social application, for example, a user identifier of a user is a registered user account of the user in a social network. The first server is any data processing server, and the second server is any server except the first server, for example, the second server is a social network server.
For example, the first server or the second server stores the user identifier and the authentication voice information in a correspondence between user identifiers and authentication voice information as shown in table 1.
Table 1
Figure PCTCN2015071139-appb-000001
Further, when a user processes data online, the user uses a personal computer (PC) terminal to access the first server, and the first server sends a page of order details to the PC terminal, where the page of order details at least includes identities (ID) of to-be-processed objects and description information. The user selects a to-be-processed object on the page of order details; the PC terminal sends the ID and quantity of the to-be-processed objects selected by the user to the first server; the first server generates a transfer value according to the ID and quantity of the to-be-processed objects selected by the user. Moreover, the first server may generate, by using a graphic code generating algorithm, a graphic code that includes the transfer value, and displays the generated graphic code on the PC terminal, or pastes the generated graphic code on the to-be-processed object.
Step 203: A first client acquires a value transfer request, where the value transfer request at least includes a transfer value and a user identifier.
Step 203 may include the following steps (1) to (3) :
(1) The second client generates a graphic code according to the user identifier, where the graphic code includes the user identifier.
Specifically, when the second client cannot connect to the Internet, the second client generates a graphic code according to the user identifier and by using any existing graphic code generating algorithm, and displays the graphic code, where the graphic code includes the user identifier.
(2) The first client scans the graphic code, and acquires the user identifier from the graphic code.
Specifically, the first client scans the graphic code displayed on the second client, and acquires the user identifier from the graphic code.
The first client is any client having a transfer function; for example, the first client is a point of sale (POS) .
(3) The first client acquires the transfer value, and generates the value transfer request that includes the transfer value and the user identifier.
Specifically, the first client scans a graphic code of a to-be-processed object, where the graphic code is loaded on a webpage displayed on a PC, and acquires a transfer value from the graphic code of the to-be-processed object; or the first client scans a graphic code of a to-be-processed object, where the graphic code is pasted on the to-be-processed object, and acquires a transfer value from the graphic code of the to-be-processed object; or the first client receives a transfer value input by the user.
Step 204: The first client sends the value transfer request to the first server.
The first client sends the value transfer request to the first server, and the first server processes data according to the value transfer request.
Step 205: The first server receives the value transfer request sent by the first client, and requests voice information from the first client, where the voice information is used to perform identity authentication on the user identifier.
Step 206: The first client acquires voice information of the user and sends the voice information of the user to the first server, where the voice information includes voiceprint information and voice content information of the user.
When receiving, from the first server, a request for voice information, the first client prompts the user to input voice information, for example, the first client may display information such as "Please enter voice information" , and in this case, the user may input a voice signal to the first client.
The user inputs a voice signal to the first client; the first client collects, by using a voice collection device, the voice signal input by the user, extract voiceprint information of the user and voice content information of the voice signal from the voice signal input by the user, combines the voiceprint information of the user and the voice content information of the voice signal to form voice information of the user, and sends the voice information of the user to the first server.
It should be noted that, the extracting, by the second client, voiceprint information of the user and voice content information of the voice signal from the voice signal input by the user belongs to the prior art, and is not described in detail herein again.
When inputting the voice signal, the user does not need to open a keyboard, which reduces an input time and improves the processing efficiency.
Step 207: The first server acquires the voice information, and acquires authentication voice information reserved by the user, where the authentication voice information includes voiceprint information and voice content information that are reserved by the user.
The step of acquiring authentication voice information reserved by the user may be as follows:
the first server acquires, according to the user identifier, authentication voice information from the correspondence between user identifiers and authentication voice information, where the correspondence is stored in the first server, and uses the acquired authentication voice information as the authentication voice information reserved by the user; or
the first server acquires, according to the user identifier, authentication voice information from the correspondence between user identifiers and authentication voice information, where the correspondence is stored in the second server, and uses the acquired authentication voice information as the authentication voice information reserved by the user.
Specifically, the first server sends the user identifier to the second server; the second server receives the user identifier sent by the first server, and acquires, according to the user  identifier, authentication voice information corresponding to the user identifier from the stored correspondence between user identifiers and authentication voice information; the second server sends the authentication voice information to the first server; the first server receives the authentication voice information sent by the second server, and uses the received authentication voice information as the authentication voice information reserved by the user.
For example, the first server acquires, according to a user identifier ID1 of a user, authentication voice information corresponding to user 1, namely "agree to process" , and voiceprint information 1 from the correspondence between user identifiers and authentication voice information stored in table 1.
Step 208: The first server matches the voice information and the authentication voice information, and if the matching succeeds, performs a value transfer operation on a user account corresponding to or bound to the user identifier.
Step 208 may include the following steps (1) to (3) :
(1) : The first server determines whether the voice content information is the same as the reserved voice content information, and if yes, performs step (2) , or if not, the matching fails, and the process is ended.
If the voice content information is the same as the voice content information, the first server continues to determine whether the voiceprint information is the same as the reserved voiceprint information; if the voice content information is different from the voice content information, the matching fails, the user fails to pass the identity authentication performed by the first server, and the first server sends a response message to the first client, where the response message carries a matching failure indication.
(2) : The first server determines whether the voice content information is the same as the reserved voice content information, and if yes, performs step (3) , or if not, the matching fails, and the process is ended.
The step of determining, by the first server, whether the voiceprint information is the same as the reserved voiceprint information may be as follows:
The first server calculates a sound wave matching degree between the voiceprint information and the reserved voiceprint information; if the sound wave matching degree is greater than a preset threshold, the first server determines that the voiceprint information is the same as the reserved voiceprint information; and if the sound wave matching degree is not greater than the preset threshold, the first server determines that the voiceprint information is different from the voiceprint information.
If the voice content information is the same as the reserved voice content information and the voiceprint information is the same as the reserved voiceprint information, the matching succeeds, the user passes the identity authentication performed by the first server, and the first server performs step (3) ; if the voice content information is different from the voice content information, or the voiceprint information is different from the reserved voiceprint information, the matching fails, the user fails to pass the identity authentication performed by the first server, and the first server sends a response message to the first client, where the response message carries a matching failure indication.
The preset threshold may be set as needed and modified, and in this embodiment of the present invention, the preset threshold is not subject to any specific limitation. The method for calculating the sound wave matching degree may be any existing method for calculating a sound wave matching degree, and in this embodiment of the present invention, the method for calculating the sound wave matching degree is not subject to any specific limitation either.
(3) The first server removes a corresponding transfer value from the user account corresponding to or bound to the user identifier, and adds the corresponding transfer value to a user account corresponding to or bound to a user that corresponds to the first client.
Specifically, the first server acquires, according to the user identifier, a user account corresponding to or bound to the user identifier, and acquires, according to an identifier of the first client, a user identifier of a user that corresponds to the first client; the first server acquires, according to the user identifier of the user that corresponds to the first client, a user account corresponding to or bound to the user that corresponds to the first client; the first server removes, according to the transfer value, the transfer value from an account value contained in the user account corresponding to or bound to the user identifier, and adds the corresponding transfer value to the user account corresponding to or bound to the user that corresponds to the first client.
The first server stores correspondence between user identifiers and user accounts in advance, and according to the user identifier of the user, the first server can acquire the user account corresponding to or bound to the user identifier of the user from the correspondence between user identifiers of users and user accounts. The first server stores a correspondence between identifiers of clients and user identifiers in advance, and according to the identifier of the first client, the first server can acquire the user identifier corresponding to the identifier of the first client from the correspondence between identifiers of clients and user identifiers.
The user account of the user includes a value, identity information of the user, account information, and the like; the identity information includes information such as the name and/or  identity card number of the user; and the account information includes a processing history and the like. The identifier of the client is any identifier that can identify the client, for example, the identifier of the client is a globally unique identifier (GUID) of the client.
For example, the correspondence between identifiers of clients and user identifiers stored in the first server is as shown in table 2.
Table 2
Identifier of client User identifier
Client 1 ID2
For example, the correspondence between user identifiers and user accounts stored in the first server is as shown in table 3.
Table 3
User identifier User account
ID1 User account 1
ID2 User account 2
The first server acquires, from table 2 according to the identifier of the client: client 1, the user identifier ID2 corresponding to client 1, and acquires, from table 3 according to the user identifier ID2, the user account 2 corresponding to user 2; the first server acquires, from table 3 according to the user identifier ID1 of the user, the user account corresponding to user 1, namely, the user account 1.
If the user passes the identity authentication performed by the first server, the first server removes the transfer value from the value contained in the user account 1, and adds the removed transfer value to the value contained in the user account 2; if the user does not pass the identity authentication performed by the first server, the first server does not process the user account 1 or user account 2.
In this embodiment of the present invention, when processing data, a first server acquires voice information of a user and authentication voice information reserved by the user, and performs identity authentication on a user identifier according to voiceprint information included in the voice information and voiceprint information included in the authentication voice information.  Because the voiceprint information is not easy to divulge or crack, the security of data processing is enhanced.
Embodiment 3
This embodiment of the present invention provides a data processing system. Referring to FIG. 3, the system includes:
first client 301 and a first server 302.
The first client 301 is configured to acquire a value transfer request, where the value transfer request at least includes a transfer value and a user identifier.
The first client 301 is further configured to send the value transfer request to the first server 320, where the user identifier is used to uniquely identify a user on the first server 302.
The first server 302 is configured to request voice information from the first client 301, where the voice information is used to perform identity authentication on the user identifier.
The first client 301 is further configured to acquire voice information of the user and send the voice information of the user to the first server 302, where the voice information includes voiceprint information and voice content information of the user.
The first server 302 is further configured to acquire the voice information, and acquire authentication voice information reserved by the user, where the authentication voice information includes voiceprint information and voice content information that are reserved by the user.
The first server 302 is further configured to match the voice information and the authentication voice information, and if the matching succeeds, perform a value transfer operation on a user account corresponding to or bound to the user identifier.
Further, the first server 302 is further configured to remove a corresponding transfer value from the user account corresponding to or bound to the user identifier, and add the corresponding transfer value to a user account corresponding to or bound to a user that corresponds to the first client 301.
Further, the first server 302 is further configured to: if the voiceprint information is the same as the reserved voiceprint information and the voice content information is the same as the reserved voice content information, determine that the matching succeeds, or otherwise, determine that the matching fails.
The first server 302 is further configured calculate a sound wave matching degree between the voiceprint information and the reserved voiceprint information.
The first server 302 is further configured to: if the sound wave matching degree is greater than a preset threshold, determine that the voiceprint information is the same as the reserved voiceprint information.
The first server 302 is further configured to: if the sound wave matching degree is not greater than the preset threshold, determine that the voiceprint information is different from the reserved voiceprint information.
Further, the system further include: a second client and a second server.
The second client is configured to receive a voice signal input by a user, extract voiceprint information and voice content information from the voice signal, and combine the voiceprint information and the voice content information to form authentication voice information.
The second client is further configured to acquire the user identifier, and store a correspondence between the user identifier and the authentication voice information in the first server 302 or in the second server, where the second server is any server except the first server 302.
Further, the first server 302 is configured to acquire, according to the user identifier, authentication voice information from the correspondence between user identifiers and authentication voice information, where the correspondence is stored in the first server, and use the acquired authentication voice information as the authentication voice information reserved by the user.
The first server 302 is further configured to acquire, according to the user identifier, authentication voice information from the correspondence between user identifiers and authentication voice information, where the correspondence is stored in the second server, and use the acquired authentication voice information as the authentication voice information reserved by the user.
Further, the second client is configured to generate a graphic code according to the user identifier, where the graphic code includes the user identifier.
The first client 301 is further configured to scan the graphic code, and acquire the user identifier from the graphic code.
The first client 301 is further configured to acquire the transfer value, and generate the value transfer request that includes the transfer value and the user identifier.
In this embodiment of the present invention, when processing data, a first server acquires voice information of a user and authentication voice information reserved by the user, and performs identity authentication on a user identifier according to voiceprint information included in  the voice information and voiceprint information included in the authentication voice information. Because the voiceprint information is not easy to divulge or crack, the security of data processing is enhanced.
It should be noted that, when the data processing system provided in the forgoing embodiment processes data, division of the foregoing functional modules is merely an example for description. In an actual application, the foregoing functions may be assigned to and completed by different modules as needed, that is, the internal structure of the system is divided into different functional modules to implement all or some of the functions described above. In addition, the data processing system provided in the foregoing embodiment belongs to the same thinking as the embodiment of the data processing method. Refer to the method embodiment for details of the specific implementation manner of the data processing system, details are not described herein again.
A person of ordinary skill in the art may understand that all or some of the steps of the foregoing embodiments may be implemented by using hardware, or may be implemented by a program instructing relevant hardware. The program may be stored in a computer readable storage medium. The storage medium may be a read-only memory, a magnetic disk, an optical disc, or the like.
The foregoing descriptions are merely preferred embodiments of the present invention, but are not intended to limit the present disclosure. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present disclosure shall fall within the protection scope of the present disclosure.

Claims (14)

  1. A data processing method, wherein the method comprises:
    acquiring, by a first client, a value transfer request, wherein the value transfer request at least comprises a transfer value and a user identifier;
    sending, by the first client, the value transfer request to a first server, wherein the user identifier is used to uniquely identify a user on the first server;
    requesting, by the first server, voice information from the first client, wherein the voice information is used to perform identity authentication on the user identifier;
    acquiring, by the first client, voice information of the user and sending the voice information of the user to the first server, wherein the voice information comprises voiceprint information and voice content information of the user;
    acquiring, by the first server, the voice information, and acquiring authentication voice information reserved by the user, wherein the authentication voice information comprises voiceprint information and voice content information that are reserved by the user; and 
    matching, by the first server, the voice information and the authentication voice information, and if the matching succeeds, performing a value transfer operation on a user account corresponding to or bound to the user identifier.
  2. The method according to claim 1, wherein the performing a value transfer operation on a user account corresponding to or bound to the user identifier comprises:
    removing, by the first server, a corresponding transfer value from the user account corresponding to or bound to the user identifier, and adding the corresponding transfer value to a user account corresponding to or bound to a user that corresponds to the first client.
  3. The method according to claim 1, wherein the matching, by the first server, the voice information and the authentication voice information comprises:
    if the voiceprint information is the same as the reserved voiceprint information and the voice content information is the same as the reserved voice content information, the matching succeeds, or otherwise, the matching fails.
  4. The method according to claim 3, wherein the method further comprises:
    calculating, by the first server, a sound wave matching degree between the voiceprint information and the reserved voiceprint information;
    if the sound wave matching degree is greater than a preset threshold, determining, by the first server, that the voiceprint information is the same as the reserved voiceprint information; and
    if the sound wave matching degree is not greater than the preset threshold, determining, by the first server, that the voiceprint information is different from the reserved voiceprint information.
  5. The method according to claim 1, wherein, before the acquiring, by a first client, a value transfer request, the method further comprises:
    receiving, by a second client, a voice signal input by the user, extracting voiceprint information and voice content information from the voice signal, and combining the voiceprint information and the voice content information to form authentication voice information; and
    acquiring, by the second client, the user identifier, and storing a correspondence between the user identifier and the authentication voice information in the first server or in a second server, wherein the second server is any server except the first server.
  6. The method according to claim 5, wherein the acquiring, by the first server, authentication voice information reserved by the user comprises:
    acquiring, by the first server according to the user identifier, authentication voice information from the correspondence between user identifiers and authentication voice information, wherein the correspondence is stored in the first server, and using the acquired authentication voice information as the authentication voice information reserved by the user; or 
    acquiring, by the first server according to the user identifier, authentication voice information from the correspondence between user identifiers and authentication voice information, wherein the correspondence is stored in the second server, and using the acquired authentication voice information as the authentication voice information reserved by the user.
  7. The method according to claim 1, wherein, the acquiring, by a first client, a value transfer request comprises:
    generating, by a second client, a graphic code according to the user identifier, wherein the graphic code comprises the user identifier;
    scanning, by the first client, the graphic code, and acquiring the user identifier from the graphic code; and
    acquiring, by the first client, the transfer value, and generating the value transfer request that comprises the transfer value and the user identifier.
  8. A data processing system, wherein the system comprises a first client and a first server; 
    the first client is configured to acquire a value transfer request, wherein the value transfer request at least comprises a transfer value and a user identifier;
    the first client is further configured to send the value transfer request to the first server, wherein the user identifier is used to uniquely identify a user on the first server;
    the first server is configured to request voice information from the first client, wherein the voice information is used to perform identity authentication on the user identifier;
    the first client is further configured to acquire voice information of the user and send the voice information of the user to the first server, wherein the voice information comprises voiceprint information and voice content information of the user;
    the first server is further configured to acquire the voice information, and acquire authentication voice information reserved by the user, wherein the authentication voice information comprises voiceprint information and voice content information that are reserved by the user; and 
    the first server is further configured to match the voice information and the authentication voice information, and if the matching succeeds, perform a value transfer operation on a user account corresponding to or bound to the user identifier.
  9. The system according to claim 8, wherein
    the first server is further configured to remove a corresponding transfer value from the user account corresponding to or bound to the user identifier, and add the corresponding transfer value to a user account corresponding to or bound to a user that corresponds to the first client.
  10. The system according to claim 8, wherein
    the first server is further configured to: if the voiceprint information is the same as the reserved voiceprint information and the voice content information is the same as the reserved voice content information, determine that the matching succeeds, or otherwise, determine that the matching fails.
  11. The system according to claim 10, wherein
    the first server is further configured calculate a sound wave matching degree between the voiceprint information and the reserved voiceprint information;
    the first server is further configured to: if the sound wave matching degree is greater than a preset threshold, determine that the voiceprint information is the same as the reserved voiceprint information; and
    the first server is further configured to: if the sound wave matching degree is not greater than the preset threshold, determine that the voiceprint information is different from the reserved  voiceprint information.
  12. The system according to claim 8, wherein the system further comprises a second client and a second server;
    the second client is configured to receive a voice signal input by the user, extract voiceprint information and voice content information from the voice signal, and combine the voiceprint information and the voice content information to form authentication voice information; and
    the second client is further configured to acquire the user identifier, and store a correspondence between the user identifier and the authentication voice information in the first server or in the second server, wherein the second server is any server except the first server.
  13. The system according to claim 12, wherein
    the first server is further configured to acquire, according to the user identifier, authentication voice information from the correspondence between user identifiers and authentication voice information, wherein the correspondence is stored in the first server, and use the acquired authentication voice information as the authentication voice information reserved by the user; and
    the first server is further configured to acquire, according to the user identifier, authentication voice information from the correspondence between user identifiers and authentication voice information, wherein the correspondence is stored in the second server, and use the acquired authentication voice information as the authentication voice information reserved by the user.
  14. The system according to claim 8, wherein
    the second client is further configured to generate a graphic code according to the user identifier, wherein the graphic code comprises the user identifier;
    the first client is further configured to scan the graphic code, and acquire the user identifier from the graphic code; and
    the first client is further configured to acquire the transfer value, and generate the value transfer request that comprises the transfer value and the user identifier.
PCT/CN2015/071139 2014-01-20 2015-01-20 Data processing method and system WO2015106728A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410026414.1 2014-01-20
CN201410026414.1A CN104092653B (en) 2014-01-20 2014-01-20 Data processing method and system

Publications (1)

Publication Number Publication Date
WO2015106728A1 true WO2015106728A1 (en) 2015-07-23

Family

ID=51640335

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/071139 WO2015106728A1 (en) 2014-01-20 2015-01-20 Data processing method and system

Country Status (2)

Country Link
CN (1) CN104092653B (en)
WO (1) WO2015106728A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104092653B (en) * 2014-01-20 2017-01-25 腾讯科技(深圳)有限公司 Data processing method and system
CN104899491B (en) * 2015-05-28 2017-11-14 广东欧珀移动通信有限公司 A kind of data transfering method and its device
CN106710593B (en) * 2015-11-17 2020-07-14 腾讯科技(深圳)有限公司 Method, terminal and server for adding account
CN105554037B (en) * 2016-02-24 2019-01-08 中国联合网络通信集团有限公司 Authentication processing method and service platform
CN108319829B (en) * 2017-01-11 2022-05-06 中兴通讯股份有限公司 Voiceprint verification method and device
CN108806693A (en) * 2018-06-13 2018-11-13 广州势必可赢网络科技有限公司 A kind of method and device preventing interconnection gauze brush list
CN110474902B (en) * 2019-08-14 2022-05-03 中国工商银行股份有限公司 Account binding method, system, computing device and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007016114A2 (en) * 2005-07-27 2007-02-08 Shea Writer Methods and systems for improved security for financial transactions through a trusted third party entity
WO2008014554A1 (en) * 2006-08-01 2008-02-07 Qpay Holdings Limited Transaction authorisation system & method
CN102238189A (en) * 2011-08-01 2011-11-09 安徽科大讯飞信息科技股份有限公司 Voiceprint password authentication method and system
CN104092653A (en) * 2014-01-20 2014-10-08 腾讯科技(深圳)有限公司 Data processing method and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101311953A (en) * 2007-05-25 2008-11-26 上海电虹软件有限公司 Network payment method and system based on voiceprint authentication
CN101964125B (en) * 2009-07-24 2014-05-21 黄金富 Mobile phone payment system authenticated by double communication paths and corresponding method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007016114A2 (en) * 2005-07-27 2007-02-08 Shea Writer Methods and systems for improved security for financial transactions through a trusted third party entity
WO2008014554A1 (en) * 2006-08-01 2008-02-07 Qpay Holdings Limited Transaction authorisation system & method
CN102238189A (en) * 2011-08-01 2011-11-09 安徽科大讯飞信息科技股份有限公司 Voiceprint password authentication method and system
CN104092653A (en) * 2014-01-20 2014-10-08 腾讯科技(深圳)有限公司 Data processing method and system

Also Published As

Publication number Publication date
CN104092653A (en) 2014-10-08
CN104092653B (en) 2017-01-25

Similar Documents

Publication Publication Date Title
WO2015106728A1 (en) Data processing method and system
US10554655B2 (en) Method and system for verifying an account operation
RU2708508C1 (en) Method and a computing device for detecting suspicious users in messaging systems
US9979721B2 (en) Method, server, client and system for verifying verification codes
KR101571741B1 (en) User-based identification system for social networks
US20180247304A1 (en) Electronic certificate processing method and electronic certificate processing apparatus
WO2015101334A1 (en) Method, terminal and system for associating user resource information
US9825929B2 (en) Systems and methods for importing relation chain and providing contact information
US11106767B2 (en) Decentralized name verification using recursive attestation
CN106909811B (en) Method and device for processing user identification
CN104980402B (en) Method and device for identifying malicious operation
WO2018045977A1 (en) Shared resource display method, device and storage medium
CN107688733B (en) Service interface calling method, device, user terminal and readable storage medium
WO2016003802A1 (en) Dual channel identity authentication
US10284565B2 (en) Security verification method, apparatus, server and terminal device
CN106572074B (en) Verification method and device for verification code
US20180357404A1 (en) Information processing method and apparatus, and electronic device
CN104486310A (en) Method and system for authenticating finger veins and finger vein information acquisition instrument
US11037146B2 (en) Managing product returns associated with a user device
WO2015101057A1 (en) Data processing method and related device and system
CN113810394B (en) Service processing method, device, electronic equipment and storage medium
US11418501B2 (en) Automatic identity management with third party service providers
CN106161365B (en) Data processing method and device and terminal
WO2016202045A1 (en) Card exchange method, device and system
WO2020082833A1 (en) Transfer method and apparatus, and device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15737085

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 02/01/2017)

122 Ep: pct application non-entry in european phase

Ref document number: 15737085

Country of ref document: EP

Kind code of ref document: A1