Method, equipment and system for authenticating identity by wireless service

An identity authentication and wireless service technology, applied in the field of wireless service identity authentication methods, equipment and systems, can solve the problem of low security and controllability, difficulty in ensuring the reliability and security of identity authentication, and affecting user business or account security, etc. problems, to achieve the effect of ensuring reliability and safety

Active Publication Date: 2012-05-16
上海灵犀互动娱乐有限公司
View PDF7 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But no matter which way, its security and controllability are low, because once the password and hardware encryption device are stolen or lost together,...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, equipment and system for authenticating identity by wireless service
  • Method, equipment and system for authenticating identity by wireless service
  • Method, equipment and system for authenticating identity by wireless service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments in this application shall fall within the protection scope of this application.

[0043] At present, speech recognition technology is widely used in signal processing, pattern recognition, artificial intelligence and other fields. Its goal is to convert the vocabulary content in human speech into computer-readable input, such as keystrokes, binary codes or character sequences.

[0044] The production of human voice is a complex physiological and p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, equipment and a system for authenticating an identity by a wireless service. The method comprises the following steps that: a server receives an identity authentication request sent by a wireless service terminal, generates a dynamic text, transmits the dynamic text to the wireless service terminal, receives a voice identification text and a voice print characteristic which are generated by reading the dynamic text by a user, authenticates the identity of the user by using the voice identification text and the voice print characteristic, if the voice identification text is matched with the dynamic text and the voice print characteristic is matched with a voice print characteristic registered by the user, determines that the user passes through the identity authentication, otherwise, determines that the user fails in the identity authentication. By applying the technical scheme, the reliability of the identity authentication can be guaranteed fully; and the security of the wireless service can be guaranteed.

Description

technical field [0001] The present application relates to the technical field of mobile communication, in particular to a wireless service identity authentication method, device and system. Background technique [0002] With the development of mobile communication technology, wireless business has become a new business means. For example, mobile phones are no longer just a tool for voice calls. More and more applications and services appear on mobile terminals, and mobile payment is one of them. At present, my country's mobile payment market mainly has two forms: one is the direct deduction of mobile phone bills, and its business model is usually limited to the scope of services or applications relying on the operator's own business platform. The second is to bind the credit card with the bank card through the mobile phone, and directly deduct the money from the user's bank account during the payment process. The "mobile wallet" of China Mobile and the "mobile banking" of C...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06G10L15/00
CPCH04L63/0861H04W12/06G10L17/00G10L15/26
Inventor 诸寅嘉孟超峰
Owner 上海灵犀互动娱乐有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products