Voice verification code implementation method and device

A voice verification and implementation method technology, applied in the field of network security, can solve the problems of inability to block malicious attacks, poor security, and voice verification codes are easily cracked by malicious programs, so as to improve the difficulty of machine recognition, avoid business losses, and improve overall security. sexual effect

Pending Publication Date: 2021-07-13
北京顶象技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to overcome the existing voice verification code at least to a certain extent, it is based on 26 English letters and numbers from 0-9, randomly select N characters to form a character combination, and obtain the corresponding sound of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice verification code implementation method and device
  • Voice verification code implementation method and device
  • Voice verification code implementation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solution and advantages of the present application clearer, the technical solution of the present application will be described in detail below. Apparently, the described embodiments are only some of the embodiments of this application, not all of them. Based on the embodiments in the present application, all other implementation manners obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present application.

[0040] figure 1 A flow chart of a voice verification code implementation method provided by an embodiment of the present application, such as figure 1 As shown, the voice verification code implementation method includes:

[0041] S11: Receive the natural sound configuration parameters sent by the user equipment;

[0042] Natural sounds are, for example, barking dogs, rain, pianos, bells, etc., which will not be listed in this application.

[0043] S12: Genera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a voice verification code implementation method and device, and the method comprises the steps of: receiving a natural sound configuration parameter sent by user equipment, generating a voice verification code based on the natural sound and a plurality of sound options corresponding to the voice verification code according to the natural sound configuration parameter information, and when user access request verification information is received, broadcasting the voice verification code and the plurality of voice options corresponding to the voice verification code through the user equipment. Man-machine behavior verification method for visually impaired people can be implemented, and the machine identification difficulty is improved through the voice verification code based on the natural sound, so that the service loss caused by hostile attacks is avoided, and the overall security of the system and the service is improved.

Description

technical field [0001] The application belongs to the technical field of network security, and in particular relates to a method and device for realizing a voice verification code. Background technique [0002] In order to ensure the validity of registration information on webpages and improve information security, most of them use visual-based verification modes, such as pictures, letters or numbers. When the user sends an access request, the server first randomly obtains the character combination waiting for verification, and sends the character combination to the user front end, and the user enters the character combination seen through the keyboard. If the input is correct, the verification is passed, otherwise the verification fails. This is no problem for people with normal visual function, but it has caused great inconvenience for people with visual impairment. In order to solve this problem, in related technologies, a voice verification code is used. The voice verif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 王可李西洋陈树华
Owner 北京顶象技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products