Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Identity authentication method and device, terminal, storage medium and program product

An identity authentication and identity verification technology, applied in the field of cloud security, can solve the problems of cumbersome verification operations and long verification process, and achieve the effects of simplifying the identity authentication process, improving efficiency, security and accuracy

Pending Publication Date: 2022-05-10
BIGO TECH PTE LTD
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the identity authentication methods in the related art, whether based on two biometrics, password and password, or biometrics and user private information, require the user to perform at least two rounds of input verification operations, such as Input voiceprint and fingerprint, or respectively input fingerprint and password, etc., the verification operation is more cumbersome and the verification process is longer

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method and device, terminal, storage medium and program product
  • Identity authentication method and device, terminal, storage medium and program product
  • Identity authentication method and device, terminal, storage medium and program product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0031] The "plurality" mentioned herein means two or more. "And / or" describes the association relationship of associated objects, indicating that there may be three types of relationships, for example, A and / or B may indicate: A exists alone, A and B exist simultaneously, and B exists independently. The character " / " generally indicates that the contextual objects are an "or" relationship.

[0032] In related technologies, two-factor identity authentication usually uses two of the following three authentication factors: 1. User private information, such as user password and PIN; 2. User biometric information, such as voiceprint features, face features, and fingerprint features etc.; 3. User personal items, such as SMS verificati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method and device, a terminal, a storage medium and a program product, and belongs to the technical field of cloud security. The method comprises: in response to an identity verification instruction, displaying password conversion prompt information (201); performing voice recognition on the human voice signal acquired by the microphone to obtain an instant password (202); performing voiceprint feature extraction on the human voice signal to obtain voiceprint feature data (203); performing password conversion on the instant password based on a password character conversion mode to obtain an original password (204); and performing identity authentication based on the original password and the voiceprint feature data (205). By adopting the method, the device, the terminal, the storage medium and the program product, a user identity authentication process can be simplified, a user password is ensured not to be leaked in a voice input stage, and voiceprint verification is protected from being attacked by forged voiceprints.

Description

technical field [0001] The embodiments of the present application relate to the field of cloud security technologies, and in particular to an identity authentication method, device, terminal, storage medium, and program product. Background technique [0002] Two-factor authentication (Two-factor Authentication, 2FA) refers to a method for authenticating a user's identity by combining two different types of authentication factors (such as account password, SMS verification code, biometric feature, etc.). During the authentication process, users need to provide two different authentication factors to prove their identity, which can better protect user certificates and accessible resources than using a single-factor authentication method. [0003] In related technologies, two-factor identity authentication usually adopts two of the following three authentication factors: 1. User private information, such as user password (password), personal identification code (Personal Identi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40G10L15/22G10L17/22G10L17/24
CPCH04L63/0838H04L63/0861G10L15/22G10L17/22G10L17/24
Inventor 李岩
Owner BIGO TECH PTE LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products