WO2019033904A1 - Procédé et système d'authentification de connexion et support d'informations lisible par ordinateur - Google Patents

Procédé et système d'authentification de connexion et support d'informations lisible par ordinateur Download PDF

Info

Publication number
WO2019033904A1
WO2019033904A1 PCT/CN2018/096877 CN2018096877W WO2019033904A1 WO 2019033904 A1 WO2019033904 A1 WO 2019033904A1 CN 2018096877 W CN2018096877 W CN 2018096877W WO 2019033904 A1 WO2019033904 A1 WO 2019033904A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
voiceprint
server
face
watermark
Prior art date
Application number
PCT/CN2018/096877
Other languages
English (en)
Chinese (zh)
Inventor
徐佳良
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2019033904A1 publication Critical patent/WO2019033904A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Definitions

  • the present application relates to the field of login verification technologies, and in particular, to a login verification method, system, and computer readable storage medium.
  • biometric login method has the advantage of identifying security compared to the simple account password verification method and verification code verification method.
  • voiceprint verification login and face verification login still have certain security risks.
  • voiceprint registration can bypass the verification mechanism of the financial system through pre-recorded voiceprint information, and face registration can also be forged by face photos or face videos. Therefore, the traditional account login verification method has great security risks in the financial field, and it also poses a severe test for the security problem of the user's financial account.
  • the main purpose of the present application is to provide a login verification method, system, and computer readable storage medium, which are intended to solve the technical problem that a traditional user account login verification method has security risks in the financial field.
  • the embodiment of the present application provides a login verification method based on an operation terminal, where the login verification method based on the operation terminal includes:
  • the operation terminal When the user's account login command is detected, the operation terminal generates an account login request, and outputs a face watermark collection prompt and a voiceprint watermark collection prompt;
  • the operation terminal collects face data and voiceprint data input by the user based on the face watermark collection prompt and the voiceprint watermark collection prompt, and adds the collected face data and the voiceprint data to the account login request. ;
  • the operation terminal sends the account login request to the server;
  • the operation terminal receives a verification instruction fed back by the server based on the account login request, wherein the verification instruction includes a verification success instruction or a verification failure instruction.
  • the embodiment of the present application further provides a server-based login verification method, where the server-based login verification method includes:
  • the server When the server receives the account login request, parsing the account login request to obtain the face data and the voiceprint data;
  • the server matches the face data with preset face data in the server, and matches the voiceprint data with preset voiceprint data in the server;
  • the server detects that the face data and the voiceprint data respectively match the preset face data and the preset voiceprint data in the server, the verification success instruction is sent to the operation terminal.
  • the application further provides a login verification system, the login verification system comprising an operation terminal and a server, the login verification system comprising: a memory, a processor, a communication bus, and a login verification program stored on the memory,
  • the communication bus is used to implement a communication connection between the processor and the memory
  • the processor is configured to execute the login verification program to implement the following steps:
  • the operation terminal When the user's account login command is detected, the operation terminal generates an account login request, and outputs a face watermark collection prompt and a voiceprint watermark collection prompt;
  • the operation terminal collects face data and voiceprint data input by the user based on the face watermark collection prompt and the voiceprint watermark collection prompt, and adds the collected face data and the voiceprint data to the account login request. ;
  • the operation terminal sends the account login request to the server;
  • the operation terminal receives a verification instruction fed back by the server based on the account login request, wherein the verification instruction includes a verification success instruction or a verification failure instruction.
  • the present application also provides a computer readable storage medium storing one or more programs, the one or more programs being configurable by one or more processors Execute for:
  • the operation terminal When the user's account login command is detected, the operation terminal generates an account login request, and outputs a face watermark collection prompt and a voiceprint watermark collection prompt;
  • the operation terminal collects face data and voiceprint data input by the user based on the face watermark collection prompt and the voiceprint watermark collection prompt, and adds the collected face data and the voiceprint data to the account login request. ;
  • the operation terminal sends the account login request to the server;
  • the operation terminal receives a verification instruction fed back by the server based on the account login request, wherein the verification instruction includes a verification success instruction or a verification failure instruction.
  • the operation terminal when the user's account login instruction is detected, the operation terminal generates an account login request, and outputs a face watermark collection prompt and a voiceprint watermark collection prompt; and then the operation terminal collects the user based face watermark. Collecting prompts and voiceprint watermarks to collect the input face data and voiceprint data, and adding the collected face data and the voiceprint data to an account login request; then the operation terminal will use the account
  • the login request is sent to the server; finally, the operation terminal receives the verification instruction fed back by the server based on the account login request, wherein the verification instruction includes a verification success instruction or a verification failure instruction.
  • FIG. 1 is a schematic flowchart of a first embodiment of a login verification method based on an operation terminal according to the present application
  • FIG. 2 is a schematic flowchart of a step of adding the collected face data and the voiceprint data to an account login request according to the second embodiment of the login verification method of the operation terminal according to the second embodiment;
  • FIG. 3 is a schematic flowchart of the steps of adding the collected face data and the voiceprint data to an account login request according to the third embodiment of the login verification method of the operation terminal according to the third embodiment;
  • FIG. 4 is a schematic flowchart of a first embodiment of a server-based login verification method according to the present application
  • the server matches the face data with preset face data in a server, and the voiceprint data is in the server.
  • the server matches the face data with preset face data in the server, and presets the voiceprint data and the server.
  • FIG. 7 is a schematic flowchart of the steps of parsing the account login request in the fourth embodiment of the server-based login verification method of the present application.
  • FIG. 8 is a schematic flowchart of a step of parsing the account login request in the fifth embodiment of the server-based login verification method according to the present application;
  • FIG. 9 is a schematic structural diagram of a device in a hardware operating environment involved in a method according to an embodiment of the present application.
  • FIG. 10 is a schematic diagram of a scenario of a method according to an embodiment of the present application.
  • the application provides a login verification method based on an operation terminal.
  • the operation terminal-based login verification method includes:
  • Step S10 when detecting the account login command of the user, the operation terminal generates an account login request, and outputs a face watermark collection prompt and a voiceprint watermark collection prompt;
  • the user can perform the financial account login operation in the operation terminal.
  • the account login operation can also use the face recognition verification login and the voiceprint identification verification login and other biometric login methods.
  • the operation terminal When receiving the account login command of the user, the operation terminal generates an account login request, which is mainly used for requesting login verification, and is used as an operation terminal to send a request instruction for verifying data to the server, and the account login request passes through the operation terminal itself.
  • the face verification instruction generator and the voiceprint verification instruction generator generate a face verification instruction and a voiceprint verification instruction, and output a face watermark collection prompt and a voiceprint watermark collection prompt to the user.
  • the face watermark collection prompt refers to a specified action that is specified by the user on the basis of the face recognition verification.
  • the voiceprint watermark collection prompt refers to the specified user to say the specified password on the basis of the voice recognition verification.
  • the face watermark collection prompt requires the user to face the camera device of the operation terminal to make a prescribed action such as a blink of an eye, which means that the face verification command generated by the face verification command generator of the operation terminal includes a blink of an eye, etc.
  • the action command; the voiceprint watermark collection prompt requires the user to face the recording device of the operation terminal to make a retelling according to the voice prompt or the login password displayed by the operation terminal, which means that the voiceprint verification command generated by the voiceprint verification command generator of the operation terminal
  • the login language in the login password is included. The user only needs to follow the prompts to make corresponding actions and passwords in the camera device and the recording device.
  • Step S20 the operation terminal collects face data and voiceprint data input by the user based on the face watermark collection prompt and the voiceprint watermark collection prompt, and adds the collected face data and the voiceprint data.
  • the camera device and the recording device on the operation terminal are simultaneously opened to collect the data input by the user.
  • the user repeats or reproduces the specified face action and login password in the face watermark collection prompt and the voiceprint watermark collection prompt according to the face watermark collection prompt and the voiceprint watermark collection prompt, as the face data and the voiceprint data.
  • the face data and voiceprint data as verification information for verifying the characteristics of the user's personal information will be added to the account login request to wait for subsequent operations.
  • Step S30 the operation terminal sends the account login request to the server
  • Step S40 The operation terminal receives a verification instruction fed back by the server based on the account login request, wherein the verification instruction includes a verification success instruction or a verification failure instruction.
  • the operation terminal adds the personal authentication data such as the user face data and the voiceprint data to the account login request
  • the operation terminal sends the account login request to the server, and the server analyzes and verifies the account login request.
  • the server will verify the account login request and feed back the corresponding verification information to the operation terminal.
  • the operation terminal will receive the verification success instruction sent by the server; and when the verification fails, the operation terminal will receive the verification failure instruction sent by the server.
  • the operation terminal may, according to the verification instruction, decide whether to log in through the account, thereby authorizing whether the financial account is logged in.
  • the operation terminal can lock the account corresponding to the account login request, and prompt the user to unlock according to the preset unlocking process.
  • the server After the operation terminal sends the account login request to the server, the server returns a verification instruction based on the account login request. Assuming that the verification command received by the operation terminal is not a verification success instruction but a verification failure instruction, the operation terminal cannot log in through the user's account. Based on this, the present embodiment adds a judging mechanism, that is, a verification mechanism for verifying a failed instruction. When the operation terminal receives the verification failure command for a period of time greater than the preset number, it proves that the user repeatedly sends the account login request multiple times in a short time, and all the verification fails.
  • a judging mechanism that is, a verification mechanism for verifying a failed instruction.
  • the account login request fails to be verified multiple times, which will trigger the account lockout mechanism, that is, the user's financial login account will be locked.
  • the user cannot continue to log in to the account and cannot send an account login request.
  • the financial account corresponding to the account login request will be locked, and the account in the locked state will be in the system protection state, and the user needs to unlock the account to re-use the account. Therefore, the operation terminal will prompt the user according to the preset unlocking process. Unlock it.
  • one or more verification methods such as security policy, bank account verification, and mobile phone number verification are used for unlocking, and the verification manner includes, but is not limited to, the above.
  • the operation terminal when the user's account login instruction is detected, the operation terminal generates an account login request, and outputs a face watermark collection prompt and a voiceprint watermark collection prompt; and then the operation terminal collects the user based face watermark. Collecting prompts and voiceprint watermarks to collect the input face data and voiceprint data, and adding the collected face data and the voiceprint data to an account login request; then the operation terminal will use the account
  • the login request is sent to the server; finally, the operation terminal receives the verification instruction fed back by the server based on the account login request, wherein the verification instruction includes a verification success instruction or a verification failure instruction.
  • a second embodiment of the login verification method based on the operation terminal is proposed.
  • the second embodiment and the first embodiment are The difference is that the step of adding the collected face data and the voiceprint data to the account login request includes:
  • Step S21 the operation terminal adds a first digital watermark to the collected face data and voiceprint data to obtain new face data and voiceprint data;
  • Digital watermarking refers to embedding some identification information directly into a digital carrier (including multimedia, documents, video, etc.) or indirectly (modifying the structure of a specific area) without affecting the use value of the original carrier, and is not easily detected and Marked information that is modified again, but that can be recognized and recognized by the producer. For example, in the source data of an image or video, an iconic code is added, the code does not affect the normal use of the image or video, but in the process of the terminal identifying the source data, the code will be authenticated as the source data. Information is identified, so digital watermark can be used as an important identifier to verify the security level of its carrier.
  • the method of adding digital watermark can be realized by various watermark algorithms, such as spatial domain algorithm, frequency domain algorithm and so on.
  • the first digital watermark is added thereto to verify the authenticity of the face data and the voiceprint data, thereby obtaining new face data and voiceprint data.
  • the first digital watermark is added to the face data and the voiceprint data, which is equivalent to adding an identification code for the face data and the voiceprint data, and adding the identity identifier to the face data and the voiceprint data through the first digital watermark, thereby ensuring the data. Source security.
  • Step S22 the operation terminal adds the new face data and voiceprint data to an account login request.
  • the first digital watermark can ensure that the face data and the voiceprint data become the data source approved by the server, so that the face data and the voiceprint data are actually collected on the operation terminal, instead of being passed through other
  • the source data provided by the non-server authenticated operation terminal can ensure the reliability of the face data and the voiceprint data through the first digital watermark, thereby preventing the server from receiving illegal deceptive face data and voiceprint data. To eliminate the possibility of fraudulent verification success.
  • the first digital watermark is not a fixed data code, and it may be dynamically changed, that is, each time the digital watermark flow is completed, the first digital watermark may undergo a certain change, thereby avoiding The fixed first digital watermark is illegally acquired, thereby affecting the security of the first digital watermark.
  • a third embodiment of the login verification method based on the operation terminal is proposed.
  • the third embodiment and the first embodiment are The difference between the face data and the voiceprint data is the initial face data and the initial voiceprint data, and the collected face data and the voiceprint data are added to the account login.
  • the requested steps also include:
  • Step S23 the operation terminal converts the initial face data into target face data of a first preset format
  • the initial face data and the initial voiceprint data are added to the account login request, subsequent data analysis is required.
  • the operation terminal adds a data conversion step for the initial face data and the initial voiceprint data.
  • the initial face data can be collected by the camera device, and may be in a default video format (such as avi, mp4) or an image format (such as jpg, png), and the operation terminal can use the initial face data to be collected by the camera device.
  • the feature is configured to assign the initial face data to the first preset format, that is, the collected initial face data is converted from the default format at the time of original collection to the first preset format, and the target face data of the first preset format is obtained.
  • the first preset format may be a multimedia format recognized by an industry standard, or may be a specific format recognizable by the operation terminal.
  • Step S24 the operation terminal converts the initial voiceprint data into target voiceprint data of a second preset format
  • the initial voiceprint data can be collected by the recording device, and the default audio format (such as mp3) can exist, and the operation terminal can use the characteristics of the initial voiceprint data collected by the recording device to give the initial voiceprint data to the second pre-
  • the format that is, the collected initial voiceprint data is converted from the default format at the time of original acquisition to the second preset format, and the target voiceprint data of the second preset format is obtained.
  • the second format may be a multimedia format recognized by an industry standard, or may be a specific format recognizable automatically by the operation terminal.
  • Step S25 the operation terminal adds the target face data and the target voiceprint data to an account login request.
  • the present application provides a server-based login verification method.
  • the server-based login verification method includes:
  • Step S50 when the server receives the account login request, parsing the account login request to obtain face data and voiceprint data;
  • the server will act as a carrier for verifying the account login request of the operating terminal.
  • the server parses the account login request to parse the face data and voiceprint data in the account login request.
  • the parsing function is mainly to distinguish the face data and the voiceprint data from the account login request, to avoid data coupling between the face data and the voiceprint data, thereby destroying the purity of the face data and the voiceprint data.
  • Step S60 the server matches the face data with preset face data in the server, and matches the voiceprint data with preset voiceprint data in the server;
  • the server After the face data and voiceprint data are parsed, the server will detect whether the data is legal and compliant through the face data.
  • the method is to match the face data with the preset face data saved in the server.
  • the preset face data refers to face data saved by the server when the user registers the financial system account for real name verification. Since the face data is not easily changed, the face data can be used as a verification method for verifying whether the account is logged in by the holder.
  • the server will verify and match the voiceprint data.
  • the voiceprint information of the user is recorded, and the server saves the recorded voiceprint information for reference data of subsequent voiceprint verification.
  • Step S70 When the server detects that the face data and the voiceprint data respectively match the preset face data and the preset voiceprint data in the server, the server sends a verification success instruction to the operation terminal.
  • the face data verification or the voiceprint data verification is compared with the preset face data or the preset voiceprint data in the server, that is, the preset face data and the preset voiceprint data saved in the server will be
  • the algorithm is compiled in advance to obtain corresponding data features.
  • the face data and voiceprint data received by the server also need to be compiled by the algorithm to obtain corresponding data features. After comparing the two, the matching degree of the feature is obtained, and the matching degree is used as a reference flag for whether the matching is successful.
  • face data verification and voiceprint data verification are successful.
  • the server sends a verification success instruction to the operation terminal as feedback information of the account login request.
  • the server when the server detects that the face data does not match the preset face data in the server, it needs to send a verification failure instruction to the operation terminal; or when the server detects the voiceprint data and the preset in the server. When the voiceprint data does not match, a verification failure instruction is sent to the operation terminal.
  • the face data verification and voiceprint data verification can appear in the following four cases: (1,1), (1,0), (0,1), (0,0).
  • the account login verification in this embodiment is as follows:
  • the server may send a verification failure instruction to the operation terminal; and if the server detects that the face data and the preset face data match each other, the voiceprint data When the preset voiceprint data cannot be matched, the verification failure instruction is sent to the operation terminal. That is to say, the verification of the face data fails, the server will not verify the voiceprint data, and the verification fails; if the face data verification is successful, the voiceprint data verification fails, and the verification still fails. Only when the face data is successfully verified and the voiceprint data is successfully verified, the successful verification of the account login request can be completed. In this way, the server can maximize the security of financial accounts and prevent security risks.
  • a fifth embodiment of the server-based login verification method is proposed. Referring to FIG. 5, between the fifth embodiment and the fourth embodiment. The difference is that the face data includes face feature data and face watermark data, and the preset face data includes standard face feature data and standard face watermark data.
  • the step of the server matching the face data with the preset face data in the server, and matching the voiceprint data with the preset voiceprint data in the server includes:
  • Step S61 when the server detects that the matching degree of the facial feature data and the standard facial feature data in the server is greater than a first threshold, matching the face watermark data with the standard face watermark data;
  • Step S62 when the server detects that the matching degree between the face watermark data and the standard face watermark data in the server is greater than a second threshold, matching the voiceprint data with the preset voiceprint data in the server.
  • the face data includes, in addition to the traditional face feature data, the face watermark data fed back by the user based on the face watermark collection prompt.
  • the face feature data refers to the muscle layout and texture status of the user's face, and the data can reflect whether the currently logged-in user is a registered user of the financial account; and the face watermark data refers to the user's prompt according to the face watermark collection.
  • the server in addition to the recorded standard face feature data of the user, the preset standard face watermark data representing the face watermark action data is saved. That is to say, the server stores the standard face feature data when the user registers the financial account, and also saves the standard face watermark data of the facial motion and the change of the texture state by the popular face action.
  • the server can perform unified judgment according to the face data corresponding to the face verification command.
  • the first threshold and the second threshold are added in the embodiment, and the matching data is established to determine the quantization standard.
  • the first threshold is used as the verification minimum threshold of the face feature data
  • the second threshold is used as the verification minimum threshold of the face watermark data.
  • the server detects that the matching degree between the face watermark data and the standard face watermark data in the server is greater than the second threshold, it is proved that the face watermark data and the standard face watermark data can match each other, that is, the face watermark data verification passes.
  • the face feature data and the face watermark data are successfully verified, that is, the face data verification is successful, and the server will verify the voiceprint data.
  • a sixth embodiment of a server-based login verification method is proposed.
  • the voiceprint data includes voiceprint feature data and voiceprint watermark data
  • the preset voiceprint data includes standard voiceprint feature data and standard voiceprint watermark data.
  • the step of the server matching the face data with the preset face data in the server, and matching the voiceprint data with the preset voiceprint data in the server further includes:
  • Step S63 when the server detects that the matching degree of the voiceprint feature data and the standard voiceprint feature data is greater than a third threshold, matching the voiceprint watermark data with the standard voiceprint watermark data;
  • Step S64 when the server detects that the matching degree of the voiceprint watermark data with the standard voiceprint watermark data in the server is greater than a fourth threshold, determining that the face data and the voiceprint data are respectively associated with the preset face in the server. The data matches the preset voiceprint data.
  • the voiceprint data includes the voiceprint watermark data fed back by the user based on the voiceprint watermark collection prompt.
  • the voiceprint feature data refers to the voice color and tone of the user voice, and the data can reflect whether the currently logged-in user is a registered user of the financial account, that is, the user has recorded the voiceprint information on the server side in advance; the voiceprint watermark The data refers to the login password made by the user according to the voiceprint watermark collection prompt.
  • the preset standard voiceprint feature data representing the voiceprint watermark login password is also saved. That is to say, the standard voiceprint feature data when the user registers the financial account is saved in the server, and the voiceprint watermark data corresponding to the login password in the voiceprint verification command is also saved.
  • the server can perform unified judgment according to the voiceprint data corresponding to the voiceprint verification command.
  • the third threshold and the fourth threshold are added in the embodiment, and the matching data is established to determine the quantization standard.
  • the third threshold is used as the verification minimum threshold of the voiceprint feature data
  • the fourth threshold is used as the verification minimum threshold of the voiceprint watermark data.
  • the server will verify the voiceprint watermark data.
  • the server detects that the matching degree of the voiceprint watermark data with the standard voiceprint watermark data in the server is greater than the fourth threshold, it is proved that the voiceprint watermark data and the standard voiceprint watermark data can match each other, that is, the voiceprint watermark data verification passes.
  • the voiceprint feature data and the voiceprint watermark data are successfully verified, that is, the voiceprint data verification is successful, and the server sends a verification success instruction to the operation terminal.
  • a seventh embodiment of the server-based login verification method is proposed. Referring to FIG. 7, between the seventh embodiment and the fourth embodiment, The difference is that the step of parsing the account login request includes:
  • Step S51 the server parses the account login request, obtains face data and voiceprint data, and extracts the first digital watermark in the face data and the voiceprint data;
  • the server Since the face data and the voiceprint data are saved in the account login request, the server needs to resolve the account login request to obtain specific face data and voiceprint data.
  • the server needs to extract the first digital watermark in the face data and the voiceprint data.
  • the server will compare with the preset second digital watermark based on the first digital watermark.
  • the preset second digital watermark is a reference verification value for verifying the face data and the voiceprint data, and when the operation terminal adds the first digital watermark to the face data and the voiceprint data, the second digital watermark is performed through the network connection and the server. Synchronize. Therefore, in the normal case, the first digital watermark is consistent with the second digital watermark, that is, when the first digital watermark is determined, the synchronization function of the network connection can become a digital watermark corresponding to the first digital watermark in the server.
  • Step S52 When the server detects that the first digital watermark is inconsistent with the preset second digital watermark, the server sends a verification failure instruction to the operation terminal.
  • the first digital watermark extracted by the server and the preset second digital watermark cannot be mutually exchanged because the operation terminal has been falsified or sent without the face data and voiceprint data collection, or when the digital watermark is illegally added.
  • the mapping that is, the first digital watermark and the second digital watermark are inconsistent, which proves that the digital watermark verification fails, and the server will send a verification failure instruction to the operation terminal.
  • an eighth embodiment of a server-based login verification method is proposed. Referring to FIG. 8, between the eighth embodiment and the fourth embodiment, The difference is that the step of parsing the account login request includes:
  • Step S53 the server extracts the target face data of the first preset format and the target voiceprint data of the second preset format in the account login request;
  • the server needs to first parse the target face data and the target voiceprint data, and refer to the format difference between the target face data and the target voiceprint data, by extracting the first preset format of the target face data and the second target voice data.
  • the preset format is differentiated to obtain data sources of different formats.
  • Step S54 the server parses the target face data and the target voiceprint data into initial face data and initial voiceprint data.
  • the server converts the target face data of the first preset format and the target voiceprint data of the second preset format. It is assumed that directly calling the data source of the preset format will have certain obstacles to the calling process, mainly requiring decoding during the calling process. This will increase the workload during the call, so the target face data and the target voiceprint data can be parsed into the initial face data and the initial voiceprint data in one step for the call.
  • FIG. 9 is a schematic structural diagram of a device in a hardware operating environment involved in a method according to an embodiment of the present application.
  • the terminal in the embodiment of the present application may be a PC, or may be a smart phone, a tablet computer, an e-book reader, and an MP3 (Moving). Picture Experts Group Audio Layer III, motion picture expert compression standard audio layer 3) player, MP4 (Moving Picture Experts Group Audio Layer IV, dynamic video experts compress standard audio layers 3) terminal devices such as players and portable computers.
  • MP3 Motion Picture Experts Group Audio Layer III, motion picture expert compression standard audio layer 3
  • MP4 Moving Picture Experts Group Audio Layer IV, dynamic video experts compress standard audio layers 3 terminal devices such as players and portable computers.
  • the login verification system can include a processor 1001, such as a CPU, a memory 1005, and a communication bus 1002.
  • the communication bus 1002 is used to implement connection communication between the processor 1001 and the memory 1005.
  • the memory 1005 may be a high speed RAM memory or a stable memory (non-volatile) Memory), such as disk storage.
  • the memory 1005 can also optionally be a storage device independent of the aforementioned processor 1001.
  • the login verification system may further include a user interface, a network interface, a camera, and an RF (Radio). Frequency, RF) circuits, sensors, audio circuits, WiFi modules, and more.
  • the user interface may include a display, an input unit such as a keyboard, and the optional user interface may also include a standard wired interface, a wireless interface.
  • the network interface can optionally include a standard wired interface or a wireless interface (such as a WI-FI interface).
  • the login verification system structure shown in FIG. 7 does not constitute a limitation on the login verification system, and may include more or less components than those illustrated, or combine some components or different components. Arrangement.
  • an operating system As shown in FIG. 9, an operating system, a network communication module, and a login verification program may be included in the memory 1005 as a computer storage medium.
  • the operating system is a program that manages and controls the hardware and software resources of the login verification system, and supports the operation of the login verification program and other software and/or programs.
  • the network communication module is used to implement communication between components within the memory 1005 and with other hardware and software in the login verification system.
  • the processor 1001 is configured to execute the login verification program stored in the memory 1005, and implements the following steps:
  • the operation terminal detects the user's account login instruction, the account login request is generated, and the face watermark collection prompt and the voiceprint watermark collection prompt are output;
  • the operation terminal collects the face data and the voiceprint data input by the user based on the face watermark collection prompt and the voiceprint watermark collection prompt, and adds the collected face data and the voiceprint data to the account login request;
  • the operation terminal sends an account login request to the server;
  • the operation terminal receives the verification instruction fed back by the server based on the account login request, wherein the verification instruction includes a verification success instruction and a verification failure instruction.
  • the application also provides a computer readable storage medium storing one or more programs, the one or more programs being further executable by one or more processors for:
  • the operation terminal detects the user's account login instruction, the account login request is generated, and the face watermark collection prompt and the voiceprint watermark collection prompt are output;
  • the operation terminal collects the face data and the voiceprint data input by the user based on the face watermark collection prompt and the voiceprint watermark collection prompt, and adds the collected face data and the voiceprint data to the account login request;
  • the operation terminal sends an account login request to the server;
  • the operation terminal receives the verification instruction fed back by the server based on the account login request, wherein the verification instruction includes a verification success instruction and a verification failure instruction.
  • the foregoing embodiment method can be implemented by means of software plus a necessary general hardware platform, and of course, can also be through hardware, but in many cases, the former is better.
  • Implementation Based on such understanding, the technical solution of the present application, which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
  • the optical disc includes a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the methods described in various embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Collating Specific Patterns (AREA)
  • Telephonic Communication Services (AREA)

Abstract

La présente invention concerne un procédé et un système d'authentification de connexion et un support d'informations lisible par ordinateur. Le procédé d'authentification de connexion consiste : lors de la détection d'une instruction de connexion à un compte d'un utilisateur, à générer par un terminal d'exploitation une demande de connexion à un compte, et délivrer une invite d'acquisition de filigrane de visage et une invite d'acquisition de filigrane d'empreinte vocale ; à acquérir par le terminal d'exploitation des données de visage et des données d'empreinte vocale entrées par l'utilisateur en fonction de l'invite d'acquisition de filigrane de visage et de l'invite d'acquisition de filigrane d'empreinte vocale, et ajouter les données de visage et les données d'empreinte vocale acquises à la demande de connexion à un compte ; à envoyer par le terminal d'exploitation de la demande de connexion à un compte à un serveur ; et la réception par le terminal d'exploitation une instruction d'authentification renvoyée par le serveur en fonction de la demande de connexion à un compte. La présente invention combine une authentification de reconnaissance de visage et une authentification de reconnaissance d'empreinte vocale, ce qui améliore la sécurité de connexion à un compte au moyen d'une double authentification et ajoute également un filigrane de visage et un filigrane d'empreinte vocale, ce qui améliore également le niveau de sécurité, élimine les risques de sécurité de connexion et améliore la sécurité de connexion à un compte.
PCT/CN2018/096877 2017-08-14 2018-07-24 Procédé et système d'authentification de connexion et support d'informations lisible par ordinateur WO2019033904A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710694323.9 2017-08-14
CN201710694323.9A CN107864118B (zh) 2017-08-14 2017-08-14 登录验证方法、系统及计算机可读存储介质

Publications (1)

Publication Number Publication Date
WO2019033904A1 true WO2019033904A1 (fr) 2019-02-21

Family

ID=61699192

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/096877 WO2019033904A1 (fr) 2017-08-14 2018-07-24 Procédé et système d'authentification de connexion et support d'informations lisible par ordinateur

Country Status (2)

Country Link
CN (1) CN107864118B (fr)
WO (1) WO2019033904A1 (fr)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107864118B (zh) * 2017-08-14 2020-03-17 深圳壹账通智能科技有限公司 登录验证方法、系统及计算机可读存储介质
CN110647729A (zh) * 2018-06-27 2020-01-03 深圳联友科技有限公司 一种登录验证方法及系统
HK1250307A2 (zh) * 2018-08-14 2018-12-07 World Concept Development Ltd 身份驗證的方法、裝置、存儲介質及終端設備
CN109670836A (zh) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 账户验证方法、设备、装置及计算机可读存储介质
CN109472487A (zh) * 2018-11-02 2019-03-15 深圳壹账通智能科技有限公司 视频质检方法、装置、计算机设备及存储介质
CN111224920B (zh) * 2018-11-23 2021-04-20 珠海格力电器股份有限公司 一种防止非法登录的方法、装置、设备及计算机存储介质
CN109803255B (zh) * 2018-12-18 2022-04-08 武汉华工赛百数据系统有限公司 用于数字化车间的移动数据信息安全通信系统及方法
CN111803955A (zh) * 2019-04-12 2020-10-23 奇酷互联网络科技(深圳)有限公司 通过可穿戴设备管理账号的方法及系统、存储装置
CN110264243A (zh) * 2019-05-21 2019-09-20 深圳壹账通智能科技有限公司 基于活体检测的产品推广方法、装置、设备及存储介质
CN112615879A (zh) * 2020-12-26 2021-04-06 中国农业银行股份有限公司 一种网络请求的处理方法及装置
CN115225326B (zh) * 2022-06-17 2024-06-07 中国电信股份有限公司 登录验证方法、装置、电子设备及存储介质
CN114969766B (zh) * 2022-07-29 2022-10-21 杭州孝道科技有限公司 账号锁定绕过逻辑漏洞检测方法、系统以及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6105010A (en) * 1997-05-09 2000-08-15 Gte Service Corporation Biometric certifying authorities
US6202151B1 (en) * 1997-05-09 2001-03-13 Gte Service Corporation System and method for authenticating electronic transactions using biometric certificates
US6208746B1 (en) * 1997-05-09 2001-03-27 Gte Service Corporation Biometric watermarks
CN101075868A (zh) * 2006-05-19 2007-11-21 华为技术有限公司 一种远程身份认证的系统、终端、服务器和方法
CN103841108A (zh) * 2014-03-12 2014-06-04 北京天诚盛业科技有限公司 用户生物特征的认证方法和系统
CN107864118A (zh) * 2017-08-14 2018-03-30 上海壹账通金融科技有限公司 登录验证方法、系统及计算机可读存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6105010A (en) * 1997-05-09 2000-08-15 Gte Service Corporation Biometric certifying authorities
US6202151B1 (en) * 1997-05-09 2001-03-13 Gte Service Corporation System and method for authenticating electronic transactions using biometric certificates
US6208746B1 (en) * 1997-05-09 2001-03-27 Gte Service Corporation Biometric watermarks
CN101075868A (zh) * 2006-05-19 2007-11-21 华为技术有限公司 一种远程身份认证的系统、终端、服务器和方法
CN103841108A (zh) * 2014-03-12 2014-06-04 北京天诚盛业科技有限公司 用户生物特征的认证方法和系统
CN107864118A (zh) * 2017-08-14 2018-03-30 上海壹账通金融科技有限公司 登录验证方法、系统及计算机可读存储介质

Also Published As

Publication number Publication date
CN107864118B (zh) 2020-03-17
CN107864118A (zh) 2018-03-30

Similar Documents

Publication Publication Date Title
WO2019033904A1 (fr) Procédé et système d'authentification de connexion et support d'informations lisible par ordinateur
WO2019156499A1 (fr) Dispositif électronique et procédé d'exécution de fonction de dispositif électronique
WO2018166091A1 (fr) Procédé, système et terminal de signature de prêt en face à face, et support d'enregistrement lisible par ordinateur
WO2016187964A1 (fr) Procédé et appareil de commande intelligente de dispositif commandé
WO2018006489A1 (fr) Procédé et dispositif d'interaction vocale de terminal
WO2021025482A1 (fr) Dispositif électronique et procédé pour générer un certificat d'attestation sur la base d'une clé fusionnée
WO2019104876A1 (fr) Procédé et système de poussée de produit d'assurance, terminal, terminal client et support d'informations
WO2019182409A1 (fr) Dispositif électronique et son procédé d'authentification
WO2010124565A1 (fr) Procédé, dispositif et système de signature
WO2019001110A1 (fr) Procédé, système et dispositif d'authentification d'autorité, et support d'informations lisible par ordinateur
WO2019196213A1 (fr) Procédé, appareil et dispositif de test d'interface, et support d'informations lisible par ordinateur
US20120198491A1 (en) Transparently verifiying user identity during an e-commerce session using set-top box interaction behavior
WO2019192085A1 (fr) Procédé, appareil et dispositif pour une communication à connexion directe entre une banque et une entreprise, et support de stockage lisible par ordinateur
WO2016192270A1 (fr) Procédé et dispositif d'ouverture rapide de fichier multimédia à ciel ouvert
WO2019144526A1 (fr) Procédé, dispositif et système destinés à l'activation de carte de débit, et support d'informations lisible par ordinateur
WO2016023225A1 (fr) Appareil et procédé de commande reposant sur un terminal mobile pour appareil d'atomisation électronique
WO2015172684A1 (fr) Procédé de connexion à un ap, terminal et serveur
WO2017148112A1 (fr) Procédé de saisie d'empreintes digitales et terminal
WO2019051902A1 (fr) Procédé de commande de terminal, climatiseur et support d'informations lisible par un ordinateur
WO2017012200A1 (fr) Procédé d'identification d'institution médicale en fonction d'une lettre de diagnostic électronique et plate-forme d'hôpital en réseau
WO2019100604A1 (fr) Procédé et appareil d'interrogation de compte, dispositif, et support de stockage lisible par ordinateur
WO2019100531A1 (fr) Procédé de génération de signature numérique et dispositif associé, procédé de vérification et dispositif associé, et support d'informations
WO2017071352A1 (fr) Procédé de poussée de mot de passe, système de poussée, et dispositif terminal
WO2017054488A1 (fr) Procédé de commande de lecture de télévision, serveur et système de commande de lecture de télévision
WO2019164290A1 (fr) Procédé d'authentification biométrique utilisant une pluralité de caméras avec différents champs de vision et appareil électronique associé

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18845703

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 07.09.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18845703

Country of ref document: EP

Kind code of ref document: A1