WO2017211013A1 - Dispositif et procédé d'authentification - Google Patents

Dispositif et procédé d'authentification Download PDF

Info

Publication number
WO2017211013A1
WO2017211013A1 PCT/CN2016/097712 CN2016097712W WO2017211013A1 WO 2017211013 A1 WO2017211013 A1 WO 2017211013A1 CN 2016097712 W CN2016097712 W CN 2016097712W WO 2017211013 A1 WO2017211013 A1 WO 2017211013A1
Authority
WO
WIPO (PCT)
Prior art keywords
random
authentication
content
voice information
interface
Prior art date
Application number
PCT/CN2016/097712
Other languages
English (en)
Chinese (zh)
Inventor
石磊
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017211013A1 publication Critical patent/WO2017211013A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue

Definitions

  • the present invention relates to the field of communications, and in particular to an authentication method and apparatus.
  • the terminal unlocking technology in the related art is relatively simple, the security is strong and the interest is insufficient, and the security of the interesting foot is not enough.
  • most terminal implementation methods are unlocked first, then choose to enter the corresponding program, and the efficiency is low. Now users pay more and more attention to the security and convenience of mobile phones, and a solution is needed to better enhance the user experience. .
  • the terminal unlocking technology in the related art is relatively single, the security is not interesting enough, and the security of the interesting foot is not enough. Now most terminals enter the encrypted file or the privacy space of the user too much and is cumbersome, which is not conducive to the user. .
  • users are paying more and more attention to the security and convenience of mobile phones, and there is a need to have a solution to better enhance the user experience.
  • in terms of terminal unlocking only the pressure sensor is pressed and unlocked, and the pressing force is unlocked when the password is input.
  • the problem caused by this is that the one-way unlocking method is easy to be cracked, and the way of pressing the password is too cumbersome. The user has to remember the password and remember the pressing force. There is no convenience and fun, just for the sake of security. Experience.
  • the embodiment of the invention provides an authentication method and device, so as to at least solve the problem that the related technology is insufficient in portability and interest in the authentication process.
  • an authentication method including: displaying a random element, the random element is used to represent random content; receiving voice information; determining whether content of the voice information is related to the random element Whether the characterized random content is consistent; when the voice information matches the pre-stored voiceprint feature data, and the content of the voice information is consistent with the random content represented by the random element, the authentication is determined to be successful.
  • the random element includes at least one of the following: a text, a picture, a number, and a character.
  • the method before determining whether the content of the voice information is consistent with the random content represented by the random element, the method further includes: determining whether the voice information matches the pre-stored voiceprint feature data; When the voice information matches the pre-stored voiceprint feature data, it is determined whether the content of the voice information is consistent with the random content represented by the random element.
  • displaying the random element comprises: displaying one or more of the random elements at a preset position of the authentication interface.
  • the authentication interface includes one of the following: a lock screen interface of the terminal, and an authentication interface of the application.
  • determining that the authentication succeeds includes: when the authentication interface includes a lock screen interface of the terminal, if the voice information is The content is consistent with the random content characterized by one or more of the plurality of random elements, then enters the unlocked desktop or opens the corresponding application.
  • displaying the random element comprises: receiving pressure information of the pressure sensor; displaying the random element according to the pressure information.
  • the method further includes one of: entering an unlocked desktop; opening a corresponding application; opening a corresponding file; and entering a corresponding storage space.
  • an authentication apparatus including: a display module configured to display a random element, the random element is used to represent random content; and a receiving module configured to receive voice information; a module, configured to determine whether the content of the voice information is consistent with the random content represented by the random element; the determining module is configured to match the voice information with the pre-stored voiceprint feature data, and the voice information is Content and the random element When the characterized random contents are consistent, it is determined that the authentication is successful.
  • the device further includes: a second determining module, configured to determine the voice information before the first determining module determines whether the content of the voice information is consistent with the random content represented by the random element Matches the pre-stored voiceprint feature data.
  • a second determining module configured to determine the voice information before the first determining module determines whether the content of the voice information is consistent with the random content represented by the random element Matches the pre-stored voiceprint feature data.
  • the device further includes: a first processing module, configured to enter an unlocked desktop after the determining module determines that the authentication succeeds; and the second processing module is configured to determine an authentication at the determining module After the success, the corresponding application is started; the third processing module is configured to: after the determining module determines that the authentication succeeds, the corresponding file is started; and the fourth processing module is configured to: after the determining module determines that the authentication is successful, enter the corresponding storage.
  • a first processing module configured to enter an unlocked desktop after the determining module determines that the authentication succeeds
  • the second processing module is configured to determine an authentication at the determining module After the success, the corresponding application is started
  • the third processing module is configured to: after the determining module determines that the authentication succeeds, the corresponding file is started
  • the fourth processing module is configured to: after the determining module determines that the authentication is successful, enter the corresponding storage.
  • the random element includes at least one of the following: a text, a picture, a number, and a character.
  • displaying the random element comprises: displaying one or more of the random elements at a preset position of the authentication interface.
  • the authentication interface includes one of the following: a lock screen interface of the terminal, and an authentication interface of the application.
  • the determining module further includes: a determining unit, configured to: when the authentication interface includes a lock screen interface of the terminal And if the content of the voice information is consistent with the random content represented by one or more of the plurality of random elements, then enter the unlocked desktop or open the corresponding application.
  • a storage medium is also provided.
  • the storage medium is arranged to store program code for performing the following steps:
  • a storage medium is also provided.
  • the storage medium is arranged to store program code for performing the following steps:
  • the storage medium is further arranged to store program code for performing the following steps:
  • the method further includes: determining whether the voice information matches the pre-stored voiceprint feature data; and pre-storing the voice information and the voice information When the voiceprint feature data is matched, it is determined whether the content of the voice information is consistent with the random content represented by the random element.
  • Displaying the random element includes displaying one or more of the random elements at a preset position of the authentication interface.
  • the authentication interface includes one of the following: a lock screen interface of the terminal, and an authentication interface of the application program.
  • determining the authentication success includes: if the authentication interface includes a lock screen interface of the terminal, if the content of the voice information is related to the If the random content represented by one or more of the plurality of random elements is consistent, then the unlocked desktop or the corresponding application is opened.
  • a random element is displayed, where the random element is used to represent random content, and then the voice information is received, and it is determined whether the content of the voice information is consistent with the random content represented by the random element, When the content of the voice information is consistent with the random content represented by the random element, the authentication is determined to be successful, and the judgment of the displayed random element increases the interest and portability while ensuring security, and thus can be solved.
  • the related technology has insufficient portability and interestingness in the authentication process, and has achieved the effect of improving the user experience.
  • FIG. 1 is a block diagram showing the hardware structure of a mobile terminal according to an authentication method according to an embodiment of the present invention
  • FIG. 2 is a flow chart of an authentication method according to an embodiment of the present invention.
  • FIG. 3 is a structural block diagram of an authentication apparatus according to an embodiment of the present invention.
  • FIG. 4 is a block diagram 1 of an optional structure of an authentication apparatus according to an embodiment of the present invention.
  • FIG. 5 is a block diagram 2 of an optional structure of an authentication apparatus according to an embodiment of the present invention.
  • FIG. 6 is a schematic flow chart of a method for setting a unit according to an embodiment of the present invention.
  • FIG. 7 is a schematic flowchart of a method of a voice processing unit according to an embodiment
  • FIG. 8 is a schematic flow chart of a method of a display unit according to an embodiment of the present invention.
  • FIG. 9 is a schematic flowchart of a method of a control unit according to an embodiment of the present invention.
  • FIG. 1 is a block diagram showing a hardware structure of a mobile terminal according to an authentication method according to an embodiment of the present invention.
  • the mobile terminal 10 may include one or more (only one shown) processor 102 (the processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA).
  • FIG. 1 is merely illustrative and does not limit the structure of the above electronic device.
  • the mobile terminal 10 may also include more or fewer components than those shown in FIG. 1, or have a different configuration than that shown in FIG.
  • the memory 104 can be used to store software programs and modules of application software, such as program instructions/modules corresponding to the authentication method in the embodiment of the present invention, and the processor 102 executes various programs by running software programs and modules stored in the memory 104. Functional application and data processing, that is, the above method is implemented.
  • Memory 104 may include high speed random access memory, and may also include non-volatile memory such as one or more magnetic storage devices, flash memory, or other non-volatile solid state memory.
  • memory 104 may further include memory remotely located relative to processor 102, which may be connected to mobile terminal 10 over a network. Examples of such networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • Transmission device 106 is for receiving or transmitting data via a network.
  • the above-described network specific example may include a wireless network provided by a communication provider of the mobile terminal 10.
  • the transmission device 106 includes a Network Interface Controller (NIC) that can be connected to other network devices through a base station to communicate with the Internet.
  • the transmission device 106 can be a Radio Frequency (RF) module for communicating with the Internet wirelessly.
  • NIC Network Interface Controller
  • RF Radio Frequency
  • FIG. 2 is a flowchart of an authentication method according to an embodiment of the present invention. As shown in FIG. 2, the process includes the following steps:
  • Step S202 displaying a random element, and the random element is used to represent the random content
  • Step S204 receiving voice information
  • Step S206 determining whether the content of the voice information is consistent with the random content represented by the random element
  • Step S208 determining that the authentication succeeds when the content of the voice information is consistent with the random content represented by the random element.
  • the display random element in this embodiment is switched according to a certain period, and the received voice information may be after a period of time (eg, one minute) after displaying a certain random element.
  • the received voice information is valid, and the valid time may be the same as the switching period of the random element.
  • a random element is displayed, and the random element is used to represent the random content, and then the voice information is received, and whether the content of the voice information is consistent with the random content represented by the random element, and the content of the voice information and the random element are represented.
  • the random content is consistent, it is determined that the authentication is successful.
  • the execution body of the foregoing steps may be a terminal or the like, such as a mobile phone or a tablet, but is not limited thereto.
  • the random elements can be, but are not limited to, text, pictures, letters, Chinese characters, numbers, and the like.
  • the method further includes: determining whether the voice information matches the pre-stored voiceprint feature data;
  • S11 and S12 may also be exchanged, that is, whether the content of the voice information is consistent with the random content represented by the random element, and whether the voice information matches the pre-stored voiceprint feature data. Or judge at the same time, there is no limit here.
  • Displaying the random element includes displaying one or more of the random elements at a preset position of the authentication interface.
  • the method may include: displaying a random element at a first position of the authentication interface; displaying a plurality of random elements at a plurality of locations of the authentication interface.
  • the optional authentication interface can be, but is not limited to, a lock screen interface of the terminal, an authentication interface of the application, such as a program interface of a folder or a space.
  • the unlocked desktop is opened or the corresponding application is started. If the authentication of two random elements passes at the same time, enter the "camera” application, or, if the random element "A” is authenticated, unlock, and the random element "B” is authenticated, then enter the "camera” application. .
  • displaying the random element includes: receiving pressure information of the pressure sensor; displaying the random element according to the pressure information.
  • different interfaces or applications may be accessed.
  • the desktop may be unlocked, the corresponding application is started, and the application is started.
  • Corresponding files enter the corresponding storage space, and so on.
  • the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware, but in many cases, the former is A better implementation.
  • the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
  • the optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods of various embodiments of the present invention.
  • module may implement a combination of software and/or hardware of a predetermined function.
  • apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
  • FIG. 3 is a structural block diagram of an authentication apparatus according to an embodiment of the present invention, which may be disposed on a terminal, such as a mobile phone or a tablet. As shown in FIG. 3, the device includes:
  • the display module 30 is configured to display a random element, and the random element is used to represent the random content
  • the receiving module 32 is configured to receive voice information
  • the first determining module 34 is configured to determine whether the content of the voice information is consistent with the random content represented by the random element
  • the determining module 36 is configured to determine that the authentication succeeds when the content of the voice information coincides with the random content characterized by the random element.
  • FIG. 4 is a block diagram of an optional structure of an authentication apparatus according to an embodiment of the present invention. As shown in FIG. 4, the apparatus includes:
  • the second determining module 40 is configured to determine that the voice information matches the pre-stored voiceprint feature data before the first determining module 34 determines whether the content of the voice information is consistent with the random content represented by the random element. .
  • FIG. 5 is a block diagram of an optional structure of an authentication device according to an embodiment of the present invention. As shown in FIG. 5, the device includes:
  • the first processing module 50 is configured to enter the unlocked desktop after the determining module determines that the authentication succeeds;
  • the second processing module 52 is configured to: after the determining module determines that the authentication succeeds, start the corresponding application;
  • the third processing module 54 is configured to: after the determining module determines that the authentication succeeds, open the corresponding file;
  • the fourth processing module 56 is configured to enter the corresponding storage space after the determining module determines that the authentication is successful.
  • the random elements can be, but are not limited to, text, pictures, letters, Chinese characters, numbers, and the like.
  • the display module may display only one random element, or may display multiple random elements at the same time, corresponding to different authentications.
  • the display module includes: a display unit configured to display one or more of the random elements at a preset position of the authentication interface.
  • the method may include: displaying a random element at a first position of the authentication interface; displaying a plurality of random elements at a plurality of locations of the authentication interface.
  • the selected authentication interface may be, but is not limited to, a lock screen interface of the terminal, an authentication interface of the application, such as a program interface of a folder or a space.
  • the determining module further includes: a determining unit, configured to: when the authentication interface includes a lock screen interface of the terminal And if the content of the voice information is consistent with the random content represented by one or more of the plurality of random elements, then enter the unlocked desktop or open the corresponding application.
  • each of the above modules may be implemented by software or hardware.
  • the foregoing may be implemented by, but not limited to, the foregoing modules are all located in the same processor; or, the above modules are in any combination.
  • the forms are located in different processors.
  • the embodiment provides a method for safely and conveniently unlocking and directly entering a program.
  • the terminal shown in this embodiment includes a setting unit, a voice processing unit, a control unit, and a display unit, where
  • Setting unit Set the function area or specific coordinate point, you can choose to set an unlocking area or specific coordinate point, which is unlocked when the user locks the screen. You can also set an area or coordinate point directly into the corresponding program for unlocking and enter the corresponding program. This setting is optional. If the user does not set, the default unlock function will be activated. After unlocking, enter the standby main interface. .
  • the content selection of the random elements of the interface is also completed by the setting module, prompting the user to select the content of the random elements randomly appearing in the interface, for example: the appearance of the element content, the occurrence of the element type, the appearance of the element size, and the like.
  • Voice processing unit This unit is divided into two main parts. The first part is the input part. The terminal owner performs voice input to establish the voice feature and voiceprint feature library. The second part is the authentication part. Speech recognition and voiceprint authentication. It is used to determine whether the user is the owner of the machine and the name of the random element spoken is correct.
  • Control unit After receiving the result of the voice processing unit, perform flow control. If the authentication of the voice processing unit passes, the control unit will perform unlocking and directly enter the corresponding program action. in case If the authentication fails, the unlocking and entering the program will not continue.
  • Display unit mainly responsible for the display function, displaying random element information in different areas of the lock screen interface or specific coordinate points.
  • the randomly displayed element information and the area or specific coordinate point are obtained from the setting module, and are selected by the user in the setting module. Area or specific coordinate point and set random element content.
  • a safe and convenient way to unlock and access the program directly includes the following steps:
  • Step 1 The terminal owner enters the setting module to set the options to be set.
  • the main options include but are not limited to:
  • Step 2 Establish a speech feature and a voiceprint feature library: the sound processing unit forms a customized voice feature data into a voice model and forms a voiceprint feature data into a voiceprint model, and stores the voice model and the voiceprint model locally. In the storage unit. The sound processing unit associates the voice model and the voiceprint model with the unlocking and the specific application, and associates the voice model and the voiceprint model with the associated information of the specific application into the local storage unit.
  • Step 3 randomly display the various random elements set on the lock screen interface. Each time the user lights up the screen, the random elements appearing are different. The rules appear according to the settings of the user in the setting module. Each time the screen is bright, the user has to set a good area or a specific point must have a random element. This random element is different each time, according to the setting rules. If the user does not specify the area or the coordinate point, the part is randomly displayed, and it is not necessary to display all of them.
  • Step 4 The user sees a random element that implements the set area or the coordinate point position on the lock screen interface, reads out the name of the random element and reads the right element, and the sound processing unit authenticates. If the user only sets the unlocking area or the coordinate point in advance, then only one element name is read out. If the user sets two unlocking areas or coordinate points in advance, the user only needs to read the names of the two random elements in order. Just fine.
  • Step 5 After receiving the random element name read by the user, the sound processing unit starts the authentication comparison. First, the voice of the terminal is judged by the voiceprint comparison. If the authentication fails, the user is prompted to perform the operation without random. The speech recognition judgment of the content of the element name. If the voiceprint authentication is passed, the next voice recognition is performed to determine whether the random element name spoken by the user is the actually displayed name. If the double authentication is passed, go to the next step. Otherwise the user is prompted with an error message.
  • Step 6 After the voice processing unit passes the authentication, the control unit unlocks and directly enters the corresponding application operation, the unlocking operation is mandatory, and directly entering the corresponding program is optional.
  • the embodiment also provides a method for unlocking and entering an encryption space and a file, which are divided into two main types of usage scenarios.
  • the first type of user terminal is unlocked by the standby interface. In the standby interface, the user presses any position of the touch screen, and the user pops up. Random random element, when the user reads the random element name that pops up randomly on the screen, judges whether the terminal owner operates by voice pattern, and judges whether the correct random element name is read by voice recognition. After the authentication is passed, the authentication is passed. The terminal is unlocked.
  • the second type of usage scenario is used in a specific program, and is applicable to various programs that have encrypted hidden files.
  • a blank area is pressed, and random elements are randomly popped up, and the user randomly reads the screen.
  • the name of the random element that pops up is judged by the voiceprint to determine whether the terminal owner operates by itself.
  • the voice recognition is used to judge whether the name of the random element appears correctly.
  • the terminal corresponding to the method for unlocking and entering the encryption space and the file in this embodiment may also include a setting unit, a voice processing unit, a control unit, and a display unit.
  • Setting unit Set the content of random elements randomly displayed after pressing, for example, small pictures, numbers, icons, text, and so on. Set the pressure of the pressure sensor to save the user settings.
  • Voice processing unit This unit is divided into two main parts. The first part is the input part. The terminal owner performs voice input to establish the voice feature and voiceprint feature library. The second part is the authentication part. Speech recognition and voiceprint authentication. It is used to determine whether the user is the owner of the machine and the name of the random element spoken is correct.
  • Control unit After receiving the result of the voice processing unit, perform flow control, according to two different usage scenarios, to determine whether the authentication is passed, whether to unlock or directly enter the encrypted folder or hidden Private space.
  • Display unit mainly responsible for display functions, according to different usage scenarios
  • the random element information is displayed on the lock screen interface according to the area pressed by the user or the specific coordinate point, and the randomly displayed element information content is acquired from the setting module.
  • the program interface specifically including the encrypted folder or the privacy space displays random element information according to the area pressed by the user or the specific coordinate point, and the randomly displayed element information content is acquired from the setting module.
  • the present invention is a method of unlocking and entering an encrypted space and a file, the method comprising the steps of:
  • Use scenario 1 How to unlock the terminal standby interface
  • Step 1 The terminal owner enters the setting module to set the options to be set.
  • the main options include but are not limited to:
  • the pressing force of the screen pressure sensor enters the pressing force of the user, and is used to press the screen to determine the authentication use when unlocking later.
  • Step 2 Establish a speech feature and a voiceprint feature library: the sound processing unit forms a customized voice feature data into a voice model and forms a voiceprint feature data into a voiceprint model, and stores the voice model and the voiceprint model locally. In the storage unit. The sound processing unit associates the voice model and the voiceprint model with the unlocking and the specific application, and associates the voice model and the voiceprint model with the associated information of the specific application into the local storage unit.
  • Step 3 In the terminal standby interface, each time the user presses any position on the screen, a random element will appear on the screen, and the random elements appearing are different.
  • the appearance rules are subject to the setting of the setting module by the user.
  • Step 4 The user reads out the name of the random element from the microphone according to the random element that appears, and the voice processing unit authenticates. After the sound processing unit receives the random element name read by the user, The authentication comparison is started. First, the voice of the terminal is judged by the voiceprint comparison. If the authentication fails, the user is prompted to operate non-self, and the voice recognition judgment of the content of the random element name is no longer performed. If the voiceprint authentication is passed, the next voice recognition is performed to determine whether the random element name spoken by the user is the actually displayed name. If the double authentication is passed, go to the next step. Otherwise the user is prompted with an error message.
  • Step 5 After the voice processing unit passes the authentication, the control unit performs an unlocking operation.
  • the user presses the blank space of the interface, and random elements appear on the screen, and the random elements appearing are different, and the rules appear according to the setting of the setting module by the user.
  • the setup process and the authentication process are the same as the scenario 1. After the authentication is passed, the authentication folder or the privacy space is directly entered.
  • FIG. 6 is a schematic flowchart of a method for setting a unit according to the embodiment, specifically:
  • Step 1 Set the selected area or the specific coordinate point. You can choose to set an unlocking area or a specific coordinate point. It can be unlocked when the user locks the screen. You can also set an area or coordinate point directly into the corresponding program for When unlocking, enter the corresponding program. This setting is optional. If the user does not set, the default unlock function will be activated. After unlocking, enter the standby main interface.
  • Step 2 Set the content of the random element to appear, prompting the user to select the content of the random element that appears randomly on the interface, for example: the content of the element appears, the type of the element appears, the size of the element appears, and so on.
  • Step 3 Save the user area or specific coordinate point information, and save the content of the random element set by the user.
  • FIG. 7 is A schematic flowchart of a method for a voice processing unit in this embodiment is specifically:
  • This unit is divided into two parts.
  • the first part is: establishing a phonetic feature and a voiceprint feature library.
  • the specific process is as follows:
  • the sound receiving unit is activated to receive the user-defined sound information, and the voice acquiring unit obtains the customized voice feature data from the customized sound information, and the voiceprint acquiring unit obtains the customized voiceprint feature data from the sound information;
  • the sound processing unit forms the customized voice feature data into a voice model and forms the voiceprint feature data into a voiceprint model, and stores the voice model and the voiceprint model into a local storage unit; wherein the voice model is derived from a voice feature code extracted from the voice feature data, and the voiceprint model is composed of acoustic features extracted from the voiceprint feature data;
  • the correct pronunciation of the random element name is also stored in the local storage unit for the sound content comparison of the speech recognition authentication part.
  • the second part is the detailed steps of the process when the user uses the voice feature and the voiceprint feature library.
  • Step 1 In the standby lock screen state, receiving the user's voice information, and acquiring the voice feature data and the voiceprint feature data from the user voice information;
  • Step 2 Identifying whether there is voiceprint model information consistent with the voiceprint feature data in the voiceprint feature library, wherein the specific process is: extracting the acoustic feature from the voiceprint feature data through the voice processing unit;
  • Step 3 Align the obtained acoustic features with the stored voiceprint models in the speech feature library and determine the similarity between the two, and identify the information associated with the specific model by the speech model and the voiceprint model. If the match is unsuccessful, the user is not prompted to operate.
  • Step 4 After the matching is successful, continue to compare the content of the voice feature data with the content of the stored random element name, and determine whether the random element name spoken by the user is correct through voice recognition, and correctly, after unlocking or unlocking according to the setting of the setting module. Direct access to the corresponding module operation, incorrect Then prompt the user to return the unlocking interface with a random element name description error.
  • FIG. 8 is a schematic flowchart of a method for displaying a display unit according to the embodiment.
  • Step 1 According to the content set by the user in the setting unit, divide the lock screen into different areas or specific coordinate points.
  • Step 2 Extract the random element content to be displayed according to user settings
  • Step 3 According to the specific random display function calculation, ensure that more than 2 different random elements are displayed on the screen, ensuring that the random elements displayed on the bright screen are different, the function area set by the user or the specific coordinate point The location must be guaranteed to have different random elements appearing each time.
  • FIG. 9 is a schematic flowchart of the method for controlling the control unit according to the embodiment.
  • Step 1 Obtain the voiceprint authentication result from the voice processing unit, the authentication fails, and the user is prompted not to operate and return to the unlocking interface.
  • Step 2 Acquire a voice recognition authentication result from the voice processing unit, and use the prompt if the authentication fails
  • the user prompts the user to randomly name the description of the element to return to the unlock interface.
  • Step 3 After the dual authentication is passed, according to the setting of the setting module, unlock or directly enter the corresponding program.
  • Step 4 Direct access to the corresponding program is determined by the setting module user settings.
  • the user can view the random elements appearing at the location according to the preset area or the specific coordinate point, and say the name of the random element to the mobile phone screen. After the authentication is passed, the user can directly unlock it. To unlock and directly enter the corresponding program, you only need to read the element names appearing in the two positions in order according to the two positions set in advance, then you can unlock and directly enter the corresponding program. This greatly enhances the terminal unlocking and use. effectiveness.
  • Double authentication and unlocking in the unlocking interface can be realized, and the corresponding application can be accessed while unlocking, which improves the unlocking and use efficiency.
  • the random display of different positions of the random elements is both interesting and secure for unlocking. Sex. Using voiceprint comparison and speech recognition technology, it can improve safety and ease of use.
  • This embodiment provides a method for performing related setting by a terminal setting unit, which is specifically:
  • Step 1 Pressing the pressure of the screen pressure sensor, in the corresponding setting interface, input the user's pressing force, and use it to press the screen to judge the authentication when unlocking later.
  • Step 2 Prompt the user to select the content of the random element that appears randomly on the interface, for example: the content of the element appears, the type of the element appears, the size of the element appears, and so on.
  • Step 3 Save user settings
  • This embodiment provides a method for performing related authentication by a terminal voice processing unit, which is specifically:
  • This unit is divided into two parts.
  • the first part is: establishing a phonetic feature and a voiceprint feature library.
  • the specific process is as follows:
  • the sound receiving unit is activated to receive the user-defined sound information, and the voice acquiring unit obtains the customized voice feature data from the customized sound information, and the voiceprint acquiring unit obtains the customized voiceprint feature data from the sound information;
  • the sound processing unit forms the customized voice feature data into a voice model and forms the voiceprint feature data into a voiceprint model, and stores the voice model and the voiceprint model into a local storage unit; wherein the voice model is derived from a voice feature code extracted from the voice feature data, and the voiceprint model is composed of acoustic features extracted from the voiceprint feature data;
  • the correct pronunciation of the random element name is also stored in the local storage unit for the sound content comparison of the speech recognition authentication part.
  • the second part is, after the establishment of the phonetic feature and the voiceprint feature library, the user steps in the process. suddenly.
  • Step 1 Receive voice information of the user in different usage scenarios, and obtain voice feature data and voiceprint feature data from the user voice information;
  • Step 2 Identifying whether there is voiceprint model information consistent with the voiceprint feature data in the voiceprint feature library, wherein the specific process is: extracting the acoustic feature from the voiceprint feature data through the voice processing unit;
  • Step 3 Align the obtained acoustic features with the stored voiceprint models in the speech feature library and determine the similarity between the two, and identify the information associated with the specific model by the speech model and the voiceprint model. If the match is unsuccessful, the user is not prompted to operate.
  • Step 4 After the matching is successful, continue to compare the content of the voice feature data with the content of the stored random element name, and determine whether the random element name spoken by the user is correct through voice recognition, and correctly, according to the setting of the setting module, unlock or directly enter The privacy space of the corresponding module is operated. If it is incorrect, the user is prompted to randomly return the unlocked interface.
  • the embodiment provides a method for displaying a random element by a terminal display unit, which is specifically:
  • Step 1 Extract the random element content to be displayed according to the content set by the user in the setting unit
  • Step 2 Determine the display position of the random element according to the position pressed by the user
  • Step 3 According to the specific random display function calculation, ensure that the random elements displayed by each press are different.
  • This embodiment provides a method for controlling a flow of a terminal control unit, specifically:
  • Step 1 Obtain the voiceprint authentication result from the voice processing unit, the authentication fails, and the user is prompted not to operate and return to the unlocking interface.
  • Step 2 Acquire a voice recognition authentication result from the voice processing unit, and use the prompt if the authentication fails
  • the user prompts the user to randomly name the description of the element to return to the unlock interface.
  • Step 3 After the dual authentication is passed, according to the setting of the setting module, unlock or directly enter the privacy space of the corresponding program.
  • the invention provides a method for unlocking and entering an encryption space and a file, which are divided into two main types of usage scenarios.
  • the first type of user terminal is unlocked by the standby interface. In the standby interface, the user presses any position of the touch screen, and a random pop-up will pop up. Random element, when the user reads the random element name that pops up randomly on the screen, judges whether the terminal owner operates by voice pattern, and judges whether the correct random element name is read by voice recognition. After the authentication is passed, the terminal passes the authentication. Unlock.
  • the second type of usage scenario is for specific programs, and is applicable to various programs that have encrypted hidden files. For example, in the file manager module, pressing a blank area and randomly popping a random element, then the user is facing the screen. The name of the random element that pops up randomly is judged by the voiceprint to determine whether the terminal owner operates by itself. The voice recognition is used to judge whether the name of the random element appears correctly.
  • the encrypted file folder or the privacy space is directly entered.
  • Double authentication unlocking in the unlocking interface can be realized, and the cumbersome steps of reducing the entry in the program with privacy space or encrypted folder can be realized.
  • the unlocking and use efficiency is improved.
  • the random display of random elements is interesting and interesting.
  • the security of unlocking is guaranteed.
  • the use of voiceprint comparison and voice recognition technology can improve safety and ease of use.
  • Embodiments of the present invention also provide a storage medium.
  • the foregoing storage medium may be configured to store program code for performing the following steps:
  • S1 displaying random elements, and random elements are used to represent random content
  • S4 determines that the authentication succeeds when the content of the voice information is consistent with the random content represented by the random element.
  • the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • a mobile hard disk e.g., a hard disk
  • magnetic memory e.g., a hard disk
  • the processor performs displaying a random element according to the stored program code in the storage medium, where the random element is used to represent the random content;
  • the processor performs to receive voice information according to the stored program code in the storage medium
  • the processor performs, according to the stored program code in the storage medium, whether the content of the voice information is consistent with the random content characterized by the random element;
  • the processor determines that the authentication succeeds when the content of the voice information is consistent with the random content represented by the random element according to the stored program code in the storage medium.
  • modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated as a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • a random element is displayed, where the random element is used to represent random content, and then the voice information is received, and it is determined whether the content of the voice information is consistent with the random content represented by the random element, When the content of the voice information is consistent with the random content represented by the random element, the authentication is determined to be successful, and the judgment of the displayed random element increases the interest and portability while ensuring security, and thus can be solved.
  • the related technology has insufficient portability and interestingness in the authentication process, and has achieved the effect of improving the user experience.

Abstract

La présente invention concerne un dispositif et un procédé d'authentification. Le procédé d'authentification consiste : à afficher un élément aléatoire utilisé afin d'indiquer un contenu aléatoire ; à recevoir un message vocal ; à déterminer si le contenu du message vocal correspond au contenu aléatoire indiqué par l'élément aléatoire ; et si tel est le cas, à déterminer que l'authentification est réussie. Le mode de réalisation résout les problèmes de portabilité insuffisante et de valeurs divertissantes d'un processus d'authentification dans l'état de la technique associé.
PCT/CN2016/097712 2016-06-06 2016-08-31 Dispositif et procédé d'authentification WO2017211013A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610393860.5 2016-06-06
CN201610393860.5A CN107463815A (zh) 2016-06-06 2016-06-06 鉴权方法及装置

Publications (1)

Publication Number Publication Date
WO2017211013A1 true WO2017211013A1 (fr) 2017-12-14

Family

ID=60544617

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/097712 WO2017211013A1 (fr) 2016-06-06 2016-08-31 Dispositif et procédé d'authentification

Country Status (2)

Country Link
CN (1) CN107463815A (fr)
WO (1) WO2017211013A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111275858A (zh) * 2020-01-22 2020-06-12 广东快车科技股份有限公司 一种声纹识别的授信方法及系统

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108288472A (zh) * 2018-01-19 2018-07-17 深圳市海派通讯科技有限公司 基于语音识别的解除锁屏方法及移动终端

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103531200A (zh) * 2013-10-29 2014-01-22 宇龙计算机通信科技(深圳)有限公司 语音解锁方法和终端
CN104142796A (zh) * 2013-05-07 2014-11-12 北京三星通信技术研究有限公司 一种终端的解锁方法及终端
CN104598122A (zh) * 2014-11-29 2015-05-06 深圳市金立通信设备有限公司 一种终端
US9336779B1 (en) * 2013-04-10 2016-05-10 Google Inc. Dynamic image-based voice entry of unlock sequence

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9336779B1 (en) * 2013-04-10 2016-05-10 Google Inc. Dynamic image-based voice entry of unlock sequence
CN104142796A (zh) * 2013-05-07 2014-11-12 北京三星通信技术研究有限公司 一种终端的解锁方法及终端
CN103531200A (zh) * 2013-10-29 2014-01-22 宇龙计算机通信科技(深圳)有限公司 语音解锁方法和终端
CN104598122A (zh) * 2014-11-29 2015-05-06 深圳市金立通信设备有限公司 一种终端

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111275858A (zh) * 2020-01-22 2020-06-12 广东快车科技股份有限公司 一种声纹识别的授信方法及系统

Also Published As

Publication number Publication date
CN107463815A (zh) 2017-12-12

Similar Documents

Publication Publication Date Title
US7337466B2 (en) Information hiding through time synchronization
EP3214563B1 (fr) Appareil et procédé permettant d'améliorer la sécurité d'un terminal
WO2017059700A1 (fr) Procédé et appareil d'authentification d'identité
US20150033364A1 (en) Method and Apparatus for the Protection of Application Software
US20160065570A1 (en) Authentication system
WO2017045414A1 (fr) Procédé et appareil d'ouverture de session de compte
JP2017530457A (ja) アイデンティティ認証方法ならびに装置、端末及びサーバ
WO2016165245A1 (fr) Procédé et terminal de commande d'interface utilisateur
WO2014067321A1 (fr) Procédé et appareil permettant de configurer un clavier
US20150286811A1 (en) Method for authenticating a user
WO2018054387A1 (fr) Procédé et dispositif de gestion de permission de terminal
WO2019047148A1 (fr) Procédé de vérification de mot de passe, terminal, et support de stockage lisible par ordinateur
WO2016145706A1 (fr) Procédé et dispositif pour mettre en œuvre un changement de mode d'utilisateur sur un terminal intelligent, et terminal intelligent
WO2017059679A1 (fr) Procédé et appareil de traitement de compte
KR20150121892A (ko) 생체 정보 인식을 이용한 결제 방법, 이를 위한 장치 및 시스템
CN103227721A (zh) 启动应用的系统和方法
US11681419B2 (en) Method for disguising a computer system's login interface
WO2017211013A1 (fr) Dispositif et procédé d'authentification
WO2015184894A2 (fr) Procédé et dispositif de mise en œuvre d'un mode de connexion multiutilisateur
WO2021244471A1 (fr) Procédé et dispositif d'authentification de nom réel
EP3566163A1 (fr) Procédé d'authentification d'un premier utilisateur et premier dispositif et système correspondants
CN105528538B (zh) 终端系统的启动方法及启动装置
WO2017016356A1 (fr) Procédé et système de déverrouillage intelligent
US10212168B2 (en) Electronic device and control method thereof
CN110889101A (zh) 终端功能控制方法、装置及可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16904462

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16904462

Country of ref document: EP

Kind code of ref document: A1