Authentication method, system and apparatus

A verification method and technology to be verified, applied in the field of systems and devices, verification methods, can solve problems such as the impact of system availability, and achieve the effect of improving accuracy and reducing misjudgment

Active Publication Date: 2016-01-06
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Code workers refer to people who specialize in manual input of verification codes. Skilled code tools have very high input efficiency (hundreds of milliseconds), which seriously affects the usability of the system.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, system and apparatus
  • Authentication method, system and apparatus
  • Authentication method, system and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0042] The verification method provided by an embodiment of the present invention can be applied to such as figure 1 environment shown. Please refer to figure 1 As shown, the terminal 20 interacts with the audio delivery server 40 and the verification server 50 through the network 30. When the user 10 uses the terminal 20 to request data from the application server corresponding to some applications, the audio delivery server 40 sends the original The audio is given to the terminal 20, and each original audio has a unique number. The user 10 listens to the received original audio through the ter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides an authentication method. The method comprises: receiving to-be-authenticated audio; performing signal-to-noise ratio estimation on the to-be-authenticated audio; and determining whether the signal-to-noise ratio of the to-be-authenticated audio reaches a first threshold, if yes, detecting whether content of the to-be-authenticated audio is consistent with content of corresponding original audio, and if yes, determining that the authentication is passed, or otherwise, determining that the authentication is not passed. With the adoption of the authentication method, an environmental impact can be reduced and speech recognition accuracy can be improved, so that the accuracy of authentication is improved and misjudgments are reduced. Furthermore, another authentication method and an authentication system and apparatus are provided.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a verification method, system and device. Background technique [0002] In many application scenarios, it is necessary to verify whether the user is a "real human being". Captcha is a public automatic program that is currently effective in distinguishing whether the user is a computer or a human. Users need to answer the verification questions raised by the website service provider before they can be considered human beings by the terminal and continue to enjoy the service. Practice has proved that the verification method based on verification codes can greatly reduce common network security risks such as malicious brute force cracking passwords, swiping tickets, flooding forums, and swiping pages. [0003] The read-write verification code is the most common verification code. Usually, the server provides a picture containing a string and requires the user to enter the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G10L21/0216
Inventor 张大威黄亮
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products