Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secure login method and apparatus

A technology for secure login and voice data, applied in the field of information security, it can solve the problems of inability to log in to the mobile phone safely, without fun, and easy to imitate, and achieve the effect of improving customer experience, increasing diversity, and improving security.

Inactive Publication Date: 2017-12-19
ZTE CORP
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the simple voice recognition technology, which only matches the voice sound waves, is far from meeting the requirements of protecting user privacy; at present, the industry basically adopts the following methods for voiceprint security login: start the voice recognition mode, listen to voice commands; match and save If the voice commands in the mobile phone and the voice commands heard reach a certain degree of matching, the mobile phone will be logged in safely; if the matching degree is not reached, the mobile phone cannot be logged in safely
At the same time, the single security login entry also caused troubles for users. The security login entry is easy to be obtained by people around, and it is not interesting.
[0005] The existing technology only matches specific voice commands. When affected by the environment and other aspects, the fluctuation of the matching rate will increase, which will affect the matching results; moreover, it does not protect the user's safety from the user's own characteristics. If the voice command is forgotten, it will not be safe. Login; a single security login entry is easy to be deciphered and intercepted by others; it is not associated with the user’s voiceprint characteristics, so it is easy to imitate and be deciphered; repeating the same security login voice command for a long time is boring, uninteresting, and easy to cause User disgusted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure login method and apparatus
  • Secure login method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In the embodiment of the present invention, the first voice data generated by the user reading preset characteristic characters is obtained, and the voiceprint characteristics of the first voice data are determined; the second voice data generated by the user reading random characters is obtained, and the second voice data is determined The voiceprint feature of the data; determine the matching degree between the voiceprint feature of the first voice data and the voiceprint feature of the second voice data, and allow login when the matching degree is greater than a preset matching degree threshold.

[0039] The present invention will be described in further detail below in conjunction with the examples.

[0040] The secure login method provided by the embodiment of the present invention, such as figure 1 As shown, the method includes:

[0041] Step 101: Obtain the first voice data generated by the user reading the preset feature text, and determine the voiceprint featu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a secure login method. The method comprises: obtaining first voice data generated by a user by reading a preset feature text, and determining a voiceprint feature of the first voice data; obtaining second voice data generated by a user by reading a random text, and determining the voiceprint feature of the second voice data; and determining the matching degree of the voiceprint feature of the first voice data with the voiceprint feature of the second voice data, and when he matching degree is greater than the preset matching degree threshold, allowing the user to login. The present invention also discloses a secure login apparatus.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a secure login method and device. Background technique [0002] With the popularity of mobile terminals, the security of mobile terminals has attracted more and more attention; usually, users will lock mobile terminals when they are not in use, and mobile terminals themselves can also be automatically locked according to the settings. In this way, Non-secure users cannot operate the mobile terminal; after the mobile terminal is locked, security login is required for normal operation, also known as unlocking; some software applications with high security requirements, such as online banking software, also require security login. common secure login methods include password unlocking and fingerprint unlocking. [0003] With the development of technology, the application of voice input technology in secure login of mobile terminals has become a trend; especiall...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/32
CPCG06F21/32
Inventor 刘雪芹
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products