User registration and logon method by combining speaker speech identity authentication and account code protection in network games

A technology of identity verification and login methods, which is applied in the field of user registration and login, and can solve problems such as increasing user expenses and loss of account passwords

Inactive Publication Date: 2012-03-14
朱建政
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the one hand, although users use security products, users still have the risk of account passwords being modified and suf...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User registration and logon method by combining speaker speech identity authentication and account code protection in network games
  • User registration and logon method by combining speaker speech identity authentication and account code protection in network games
  • User registration and logon method by combining speaker speech identity authentication and account code protection in network games

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0020] figure 1 It is a schematic flowchart for users to create account passwords and voice templates according to the embodiment of the present invention. figure 1 The processing shown on the left side of , is executed on the client side, and the processing shown on the right side is executed on the server side. The process starts at step 101, that is, the user creates an account password, and the sending function of the client forms a data packet with the length of the user name, the length of the account password, a random key, the user name and the account password in sequence, and then performs encryption on the data packet according to a certain encryption algorithm. Encrypted and sent to the server. The encryption algorithm here has nothing to do with the essence of the present invention and is well known to those of ordinary skill in the art. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user registration and logon method by combining speaker speech identity authentication and account code protection in network games. A client receives and processes a speech signal, and a server carries out speaker speech identity authentication through a speech template. The method adopts speaker text related speech identity authentication related and account code protection, and has an anti-theft function. At the client, the method comprises: dual-cache sound storage scheme: acquiring and storing a sound signal; and end-point detection and feature extraction: detecting end points in the sampled sound signal to determine start/end frames of an effective speech signal, and extracting feature parameter (linear prediction cepstrum factor) of each frame. At the server, the method adopts dynamic programming to compute matching degree of speaker speed parameter and speech template. If the account code is thieved, since the vocal process and vocal organ of an illegal user are different from a registered user, the illegal user can not easily pass through the speech identity authentication. Even if the illegal user logs on by copying the account code and speech parameter, the server can compare with the prestored speech parameter and detect parameter conformity, causing speech identity authentication failure. After having successfully registered the account code, the user has to register a speech code by speaking and repeating the same text content until enough quantity of speech templates are successfully generated. The user needs to speak the speech code to log on. After the speaker speech identity authentication is successful, the server can confirm a user logon success immediately or after the user has input the correct account code; and after the speaker speech identity authentication fails, the server can determine a user logon failure immediately or confirm a user logon success after requiring the user to input the correct account code.

Description

technical field [0001] The invention relates to a network security verification method in network games, especially a user registration and login method. Background technique [0002] At present, in online games, the account number and password for user login are stolen more and more seriously. There are many account hacking Trojan horses on the Internet that use keyloggers, screenshots, memory scans, etc. to steal other people's account passwords, illegally obtain virtual property, and cause economic losses and mental harm to the stolen users. [0003] In order to protect the user's account and game security, some online game companies have launched security products to protect the account and game security. On the one hand, although users use security products, users still have the risk of account passwords being modified and suffering losses after account passwords are stolen; on the other hand, these security products undoubtedly increase users' expenses. Contents of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G10L17/00
Inventor 朱建政
Owner 朱建政
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products