Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Voice security verification method and apparatus

A security verification and voice technology, which is applied in the field of voice security verification, can solve problems such as low safety factor, complicated technical solutions, inconvenient use, etc., and achieve the effect of ensuring simplicity, reducing the probability of hacker attacks, and improving security

Active Publication Date: 2014-09-03
KINGDEE SOFTWARE(CHINA) CO LTD
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the drawbacks of the above-mentioned password verification are: low safety factor, easy to be broken by hackers, leading to leakage of important information of the mobile service system
[0005] The defect of the above-mentioned dynamic password verification lies in: the technical scheme is complicated, and corresponding software and hardware of the dynamic password need to be invested, and the initial investment is relatively large
And the dynamic password card needs to be carried with you, which is inconvenient to use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice security verification method and apparatus
  • Voice security verification method and apparatus
  • Voice security verification method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0048] Such as figure 1 As shown, it is a schematic flowchart of the first embodiment of the voice security verification method of the present invention.

[0049] It should be emphasized that: figure 1 The flow chart shown is only a preferred embodiment, and those skilled in the art should know that any embodiment constructed around the idea of ​​the present invention should not deviate from the scope covered by the following technical solutions:

[0050] When receiving the user's security verification instruction, obtain the voice data entered by the user; compare the voice data with the pre-stored standard voice data according to the preset voice algorithm to obtain the voice data and the pre-stored The similarity of the standard voice data; when the similarity is greater than a preset threshold, it is determined ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a voice security verification method. The method comprises the following steps: when a security verification instruction of a user is received, obtaining voice data recorded by the user; performing similarity comparing between the voice data and prestored standard voice data according to a preset voice algorithm to obtain the similarity between the voice data and the prestored standard voice data; and when the similarity is greater than a preset threshold, determining that the user passes security verification. The invention also discloses a voice security verification apparatus which effectively reduces the hacker attack probability and improves information security while ensuring simplicity of security verification operation.

Description

technical field [0001] The invention relates to the technical field of mobile terminal security, in particular to a method and device for voice security verification. Background technique [0002] With the rapid development of mobile devices, mobile terminal software has also developed rapidly. Mobile terminal software focuses on the processing of mobile services, and the security of mobile services requires a certain security mechanism to guarantee. Different from other mobile application fields with a strong security environment (such as the financial industry, etc.), mobile terminal software only has a security verification of the login mechanism, and lacks reliable security protection methods. If the login mechanism is cracked, the security of the key business of the mobile application (such as the review of important documents) cannot be guaranteed. [0003] At present, in the existing mobile software, the methods for performing security verification of mobile services...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 邱俊占勇
Owner KINGDEE SOFTWARE(CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products