Authentication method and device, electronic equipment and storage medium

An electronic device and authentication technology, applied in secure communication devices, electrical components, user identity/authority verification, etc., can solve problems such as user privacy leakage

Active Publication Date: 2020-01-10
BOE TECH GRP CO LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides an authentication method, device, electronic equipment, and storage medium to solve the problem that the verification methods of login password, fingerprint authentication, and face recognition in the prior art easily cause privacy leakage to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device, electronic equipment and storage medium
  • Authentication method and device, electronic equipment and storage medium
  • Authentication method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0149] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0150] refer to figure 1 , which shows a flow chart of the steps of an authentication method provided by an embodiment of the present invention. The authentication method can be applied to electronic devices, and can specifically include the following steps:

[0151] Step 101: Receive target voice data input by a target user.

[0152] In the embodiment of the present invention, the electronic device can be a smart magic mirror device. The smart magic mirror device refers to adding a mirror display and human-mirror interaction functions to the mirror by embedding a display screen, a sensor, and an operating system in a traditional mirror. It has thus become the "fourth screen" besides computers, TVs, mobile phones, etc.

[0153] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an authentication method and device, electronic equipment and a storage medium. The method comprises the following steps: receiving target voice data input by a target user; obtaining a first voiceprint characteristic parameter corresponding to the target voice data from a device voiceprint model library; executing first encryption processing on the first voiceprint characteristic parameter by adopting a locally stored private key to generate to-be-verified data; sending the to-be-verified data to a server, so that the server decrypts the to-be-verified data by adoptinga public key matched with the private key to obtain the first voiceprint characteristic parameter, and authenticating the first voiceprint characteristic parameter to obtain an authentication result;and receiving the authentication result returned by the server. According to the invention, an authentication mode of combining voiceprint characteristic parameters and public and private keys is adopted, so that the risk of user privacy leakage can be avoided.

Description

technical field [0001] The invention relates to the technical field of data encryption processing, in particular to an authentication method, device, electronic equipment and storage medium. Background technique [0002] With the rapid development of electronic equipment, smart magic mirror equipment has gradually become popular. As the entrance of IoT devices, the smart mirror device is convenient for accessing and controlling a variety of IoT device networks including access control systems, security systems, and health monitoring systems, and is responsible for information collection, reporting, and issuance of various control commands. Therefore its security is particularly important. [0003] In order to ensure the security of IoT devices, currently commonly used authentication methods include login passwords, fingerprint authentication, face recognition and voiceprint recognition, etc. However, due to the structural limitations of smart mirror devices, it is necessary...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G10L17/02G10L17/04G10L25/24H04L29/06
CPCH04L9/3231G10L17/02G10L17/04G10L25/24H04L9/3236H04L9/3239H04L63/0442H04L2209/34H04L9/0894H04L9/3247H04L63/0861H04L63/126G10L17/08G10L17/06G10L25/18G10L25/21
Inventor 汪然
Owner BOE TECH GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products