CN108768654A - Auth method, server based on Application on Voiceprint Recognition and storage medium - Google Patents
Auth method, server based on Application on Voiceprint Recognition and storage medium Download PDFInfo
- Publication number
- CN108768654A CN108768654A CN201810311087.2A CN201810311087A CN108768654A CN 108768654 A CN108768654 A CN 108768654A CN 201810311087 A CN201810311087 A CN 201810311087A CN 108768654 A CN108768654 A CN 108768654A
- Authority
- CN
- China
- Prior art keywords
- verification
- answer
- voiceprint
- type
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000012795 verification Methods 0.000 claims abstract description 192
- 238000004458 analytical method Methods 0.000 claims abstract description 100
- 239000013598 vector Substances 0.000 claims abstract description 52
- 238000004364 calculation method Methods 0.000 claims description 19
- 238000004422 calculation algorithm Methods 0.000 claims description 17
- 238000013507 mapping Methods 0.000 claims description 7
- 230000001755 vocal effect Effects 0.000 abstract 4
- 238000005516 engineering process Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 3
- 230000007613 environmental effect Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000006798 recombination Effects 0.000 description 2
- 238000005215 recombination Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/06—Decision making techniques; Pattern matching strategies
- G10L17/08—Use of distortion metrics or a particular distance between probe pattern and reference templates
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/06—Decision making techniques; Pattern matching strategies
- G10L17/10—Multimodal systems, i.e. based on the integration of multiple recognition engines or fusion of expert systems
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/22—Interactive procedures; Man-machine interfaces
- G10L17/24—Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3215—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a plurality of channels
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Human Computer Interaction (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Physics & Mathematics (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Game Theory and Decision Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Life Sciences & Earth Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention proposes a kind of auth method based on Application on Voiceprint Recognition, including:The current speech data for acquiring user builds current vocal print discriminant vectors, and determines corresponding standard vocal print discriminant vectors;The distance between current vocal print discriminant vectors and standard vocal print discriminant vectors are calculated, analyse whether to pass through voice print verification;When voice print verification by when, obtain manual verification's result;When manual verification fails, user identity is analyzed again, generates verification analysis result;And when verification analysis passes through, judge that subscriber authentication passes through, alternatively, when verification analysis failure, judge that subscriber authentication fails.The present invention also proposes a kind of Authentication server and computer readable storage medium.Using the present invention, by combining Application on Voiceprint Recognition result and secondary verification result, comprehensive descision user identity to improve the accuracy of subscriber authentication whether by verification.
Description
Technical Field
The invention relates to the technical field of computers, in particular to an identity authentication method based on voiceprint recognition, a server and a computer readable storage medium.
Background
At present, with the continuous development of voiceprint recognition technology, the verification of user identity by utilizing voiceprint verification technology has become an important authentication means for various large customer service companies (e.g., banks, insurance companies, game companies, etc.).
The traditional scheme for realizing user identity authentication by utilizing the voiceprint recognition technology is as follows: and if the voiceprint authentication is passed, judging that the identity authentication is passed, or if the voiceprint authentication is not passed, judging that the identity authentication is not passed.
The drawback of this conventional voiceprint verification scheme is then: the accuracy of voiceprint verification is greatly influenced by the quality of voiceprint data, so that the identity verification result is easy to be wrong; the voice is easy to be intervened and hijacked by human voice during voice acquisition, so that the time effectiveness and authenticity of voiceprint verification cannot be accurately controlled, and the safety cannot be guaranteed.
Disclosure of Invention
The invention provides an identity authentication method based on voiceprint recognition, a server and a computer readable storage medium, and mainly aims to comprehensively judge whether a user identity passes authentication or not by combining a voiceprint recognition result and a secondary authentication result, so that the accuracy of user identity authentication is improved.
In order to achieve the above object, the present invention provides an identity authentication method based on voiceprint recognition, which comprises:
receiving an identity verification request with a user identity identifier sent by a first client, acquiring current voice data of a user from the first client, constructing a current voiceprint authentication vector for the current voice data, and determining a standard voiceprint authentication vector corresponding to the user identity identifier according to the user identity identifier;
calculating the distance between the current voiceprint identification vector and the standard voiceprint identification vector by using a predetermined distance calculation formula, analyzing whether the voiceprint identification passes the voiceprint identification according to the calculated distance, generating a voiceprint identification result and sending the voiceprint identification result to the first client;
when the voiceprint verification result is that the voiceprint verification is passed, acquiring a manual verification result from the second client;
when the manual verification result is that the manual verification fails, analyzing the user identity again according to a predetermined analysis algorithm to generate a verification analysis result; and
and when the verification analysis result is that the verification analysis passes, judging that the user identity verification passes, or when the verification analysis result is that the verification analysis fails, judging that the user identity verification fails.
In addition, in order to achieve the above object, the present invention further provides an authentication server, which includes a memory and a processor, wherein the memory stores thereon a voiceprint recognition based authentication program which can be executed on the processor, and when the program is executed by the processor, the server implements any steps of the voiceprint recognition based authentication method as described above.
Furthermore, to achieve the above object, the present invention further provides a computer-readable storage medium having stored thereon a voiceprint recognition based authentication program, which when executed by a processor, implements any of the steps of the voiceprint recognition based authentication method as described above.
Compared with the prior art, the identity authentication method based on voiceprint recognition, the server and the computer readable storage medium provided by the invention have the advantages that the voiceprint recognition technology is utilized to carry out primary authentication on the identity of the user, then, secondary authentication is carried out on the identity of the user according to the answer of the user to the preset problem, and whether the identity of the user passes the authentication or not is comprehensively judged by combining the primary authentication result and the secondary authentication result, so that the accuracy of the identity authentication of the user is improved.
Drawings
FIG. 1 is a diagram of a server according to a preferred embodiment of the present invention;
FIG. 2 is a block diagram of the voiceprint recognition based authentication process of FIG. 1;
FIG. 3 is a flowchart illustrating a preferred embodiment of the identity verification method based on voiceprint recognition according to the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention provides an identity authentication server 1 based on voiceprint recognition. Referring to fig. 1, a schematic diagram of an authentication server 1 according to a preferred embodiment of the present invention is shown.
In this embodiment, the authentication server 1 may be a rack server, a blade server, a tower server, or a rack server.
The authentication server 1 comprises a memory 11, a processor 12, a communication bus 13, and a network interface 14.
The memory 11 includes at least one type of readable storage medium, which includes a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, and the like. The memory 11 may in some embodiments be an internal storage unit of the authentication server 1, e.g. a hard disk of the authentication server 1. The memory 11 may also be an external storage device of the authentication server 1 in other embodiments, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the authentication server 1. Further, the memory 11 may also include both an internal storage unit and an external storage device of the authentication server 1. The memory 11 may be used not only to store application software installed in the authentication server 1 and various types of data, such as the authentication program 10 based on voiceprint recognition, etc., but also to temporarily store data that has been output or is to be output.
The processor 12 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor or other data Processing chip in some embodiments, and is used for running program codes stored in the memory 11 or Processing data, such as the authentication program 10 based on voiceprint recognition.
The communication bus 13 is used to realize connection communication between these components.
The network interface 14 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), and is generally used to establish a communication connection between the authentication server 1 and other electronic devices and perform data transmission. For example, the authentication server 1 receives an authentication request sent by a first client (not identified in the figure) through the network interface 14, and obtains voice data of a user and the like acquired by the first client; the authentication server 1 also receives an authentication result fed back by a second client (not identified in the figure) through the network interface, and the like.
Fig. 1 only shows the authentication server 1 with components 11-14, but it is to be understood that not all shown components are required to be implemented, and that more or fewer components may alternatively be implemented.
Optionally, the authentication server 1 may further comprise a user interface, the user interface may comprise a Display (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface may further comprise a standard wired interface, a wireless interface.
Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an Organic Light-Emitting Diode (OLED) touch screen, or the like. Wherein the display, which may also be referred to as a display screen or display unit, is used for displaying information processed in the authentication server 1 and for displaying a visualized user interface.
In the embodiment shown in fig. 1, a voiceprint recognition based authentication program 10 is stored in the memory 11. The processor 12, when executing the voiceprint recognition based authentication program 10 stored in the memory 11, implements the following steps:
receiving an identity verification request with a user identity identifier sent by a first client, acquiring current voice data of a user from the first client, constructing a current voiceprint authentication vector for the current voice data, and determining a standard voiceprint authentication vector corresponding to the user identity identifier according to the user identity identifier;
calculating the distance between the current voiceprint identification vector and the standard voiceprint identification vector by using a predetermined distance calculation formula, analyzing whether the voiceprint identification passes the voiceprint identification according to the calculated distance, generating a voiceprint identification result and sending the voiceprint identification result to the first client;
when the voiceprint verification result is that the voiceprint verification is passed, acquiring a manual verification result from the second client;
when the manual verification result is that the manual verification fails, analyzing the user identity again according to a predetermined analysis algorithm to generate a verification analysis result; and
and when the verification analysis result is that the verification analysis passes, judging that the user identity verification passes, or when the verification analysis result is that the verification analysis fails, judging that the user identity verification fails.
In this embodiment, the first client is a terminal used by a user, the second client is a terminal used by a customer service staff, and the terminal may be a mobile terminal or a desktop computer with a sound collection function. When the user identity needs to be verified, after an identity verification request with a user identity (e.g., an identity card number) sent by a first client is received, the first client is used to collect current voice data of the user and construct a current voiceprint authentication vector for the collected current voice data. It can be understood that, in order to determine whether the current voiceprint authentication vector corresponds to the identity transmitted by the first user, a corresponding standard voiceprint authentication vector needs to be set in advance for the predetermined user identity, so as to obtain a mapping relationship between the predetermined user identity and the standard voiceprint authentication vector.
Then, according to the user identity in the identity verification request and the mapping relation between the user identity and the standard voiceprint authentication vector, the standard voiceprint authentication vector corresponding to the user identity is determined, and the distance between the current voiceprint authentication vector and the determined standard voiceprint authentication vector is calculated by using a predetermined distance calculation formula. Specifically, the predetermined distance calculation formula is:
wherein,represents a standard voiceprint authentication vector and is,representing the current voiceprint authentication vector.
And when the calculated distance is smaller than or equal to a preset distance threshold value, determining that the verification is passed, otherwise, determining that the verification fails.
It should be noted that, in the voiceprint authentication process, even if the user identification corresponds to the current voiceprint authentication vector, if the quality of the voice data is poor due to human or environmental interference of the current voice data, an error condition of the authentication result may occur, in order to ensure the accuracy of the user authentication, even if the voiceprint authentication result passes the voiceprint authentication, a manual authentication request is sent to the second client, then, the customer service staff sends a preset authentication problem, such as an identity card number, a name, a school number, etc., to the first client through the second client, and judges whether the manual authentication passes through by judging whether the answer of the user is consistent with the preset answer, and feeds back the manual authentication result to the authentication server through the second client.
When the voiceprint verification result is voiceprint verification failure and the manual verification result is manual verification failure, judging that the user identity verification fails; and when the voiceprint verification result is that the voiceprint verification is passed and the manual verification result is that the manual verification is passed, judging that the user identity verification is passed. The user authentication result is determined through double authentication, and the accuracy of the authentication is improved.
Further, when the voiceprint verification result is that the voiceprint verification is passed and the manual verification result is that the manual verification fails, the user identity is analyzed again according to a predetermined analysis algorithm to generate a verification analysis result. Wherein the predetermined analysis algorithm comprises: if the problem of the manual identity authentication of the user is a first type problem of which the answer is a first type answer, analyzing the first type answer of the user aiming at the first type problem according to a predetermined first analysis rule, and outputting an authentication analysis result, wherein the first type answer refers to an answer of which the content is digital, such as birth date, identification number and the like; or, if the question for performing the manual identity authentication on the user is a second type question with an answer of the second type answer, analyzing the second type answer of the user for the second type question according to a predetermined second analysis rule, and outputting an authentication analysis result, wherein the second type answer refers to an answer with a content of a Chinese character, for example, a name of a teacher in a higher language, a name of a tutor in a grade of university, and the like.
As an embodiment, the step of analyzing the first-type answer of the user to the first-type question according to the predetermined first analysis rule specifically includes: acquiring a first type answer input by a user aiming at a first type question; comparing the first type answers with the standard answers, identifying a difference part, and determining difference values of all preset difference types of the difference part; and comparing and analyzing the difference value of each preset difference type of the difference part with the corresponding preset difference threshold value according to the mapping relation between the preset difference type and the preset difference threshold value, which is defined in advance, and outputting a verification analysis result.
The preset difference types comprise the number of difference parts, error digits, interval difference degrees and interval matching degrees. For example, the first answer input by the user is 123456789, the standard answer is 331456789, the difference between the two is "123" and "331", the number of difference portions of the two numbers is 1, the number of error bits of the difference portion is 3, the difference portion has no number other than the difference portion, the degree of difference between the two numbers is 0, the difference portion of the two numbers cannot be restored and matched by adjusting the number of bits, and the degree of matching between the two numbers is infinite. As another example, the difference portions of 123456789 and 331456971 are "123" and "331", "789", and "971", and the number of difference portions of these two numbers is 2. For another example, the difference portions of 123456789 and 341456789 are "123" and "341", and the difference portion has a number "4" other than the difference portion, and the interval difference between these two numbers is 1. For another example, the difference between 123456789 and 231456789 is "123" and "231", the difference between these two numbers can be restored by adjusting the form of the digits, the digit "1" in "231" can be restored by adjusting 2 sequences forward to match "123", and the interval matching degree between these two digits is 2.
After the difference value of the preset difference type between the answer input by the user and the standard answer is determined, respectively judging whether the difference value of each preset difference type is less than or equal to the corresponding preset difference threshold value, and if the difference value of all the preset difference types is less than or equal to the corresponding preset difference threshold value, determining that the verification analysis is passed; and if the difference value of one preset difference type is larger than the corresponding difference threshold value, determining that the verification analysis fails. For example, the data generated by the user is 123456789, the standard answer is 331456789, the difference portions between the two are "123" and "331", and the difference values of the four preset types of difference portion number, error digit, interval difference degree, and interval matching degree of the difference portion are: 1. 3, 0 and infinity, assuming that the preset difference thresholds corresponding to the difference values of the four preset types are respectively: 1. 1,0,1, do not satisfy the condition that the difference values of all preset difference types are less than or equal to the corresponding difference threshold, and therefore, determine that the verification analysis fails,
the above steps are only suitable for analyzing the condition that the answer of the manual identity authentication question is a digital answer, and when the answer of the manual identity authentication question is a text answer, a second analysis rule is needed for analysis.
As an embodiment, the step of analyzing the second type of answer of the user to the second type of question according to a predetermined second analysis rule includes:
acquiring a second type answer input by a user aiming at the second type question, and converting the second type answer into a character string; comparing and analyzing the converted second type answer character string with a predetermined standard answer character string according to a predetermined second type answer difference value analysis algorithm to generate a corresponding second type answer difference value; if the generated second type answer difference value is larger than the preset answer difference value threshold value, the verification analysis is determined to fail, or if the generated second type answer difference value is smaller than or equal to the preset answer difference value threshold value, the verification analysis is determined to pass.
Specifically, the predetermined second type answer difference value analysis algorithm includes: splitting the letters of the converted character strings word by word, and recombining to generate a second type answer word packet of the user; carrying out character matching on the user second type answer word packet generated by recombination and a predetermined standard answer word packet to generate a corresponding letter matching set value; and calculating a set difference value between the generated letter matching set value and the standard set value according to a predetermined calculation formula, and taking the set difference value as the second type answer difference value.
For example, if the second type of answer input by the user is 'small and bright', and the standard answer is 'small and strong', the two answers are respectively converted into character strings: ' xiaoming ' and ' xiaoqiang ' result in ' x ', ' i ', ' a ', ' o ','m ', ' i ', ' n ', ' g ', ' x ', ' i ', ' a ', ' o ', ' q ', ' i ', ' a ', ' n ', ' g ', ' and ' g ', respectively, and the generated second type answer word packet for the user can be counted as { ' x ', ' i ', ' a ', ' o ','m ', ' i ', ' n ', ' g ' }, and the standard answer word packet can be counted as { ' x ', ' i ', ' a ', ' o ', ' q ', ' i ', ' a ', ' n ', ' g ' }; the standard answer word package { 'x', 'i', 'a', 'o' } is the same as each character of the second type answer word package { 'x', 'i', 'a', 'o' }, and the corresponding letter matching set value of { 'x', 'i', 'a', 'o' } may be [1,1,1,1 ]; the standard answer word package { 'q', 'i', 'a', 'n', 'g' } and the second type answer word package {'m', 'i', 'n', 'g' } have three different characters, the corresponding letter matching set value may be [0,1,0,1,1]), and a set difference value between the generated letter matching set value ([1,1,1,1] [0,1,0,1,1]) and the standard set value ([1,1,1,1] [1,1,1,1,1]) is calculated according to a predetermined calculation formula, and the set difference value is the second type answer difference value. In this embodiment, the predetermined calculation formula may be a cosine formula, an euclidean distance calculation formula, or the like.
When the calculated second type answer difference value is smaller than or equal to the Chinese character answer difference value threshold value, determining that the verification analysis result is that the verification analysis is passed, namely judging that the user identity verification is passed; otherwise, determining that the verification analysis result is verification analysis failure, namely judging that the user identity verification fails.
Further, there is also a case: when the voiceprint verification result is that voiceprint verification fails and the manual verification result is that manual verification passes, selecting one or more questions from additional questions predetermined by the user, proposing the questions to the first client, for example, names of friends best in the beginning, and acquiring additional answers of the user to the additional questions from the first client; comparing and analyzing the obtained additional answers with predetermined standard additional answers; if the obtained additional answer (for example, Zhang III) is consistent with the predetermined standard additional answer (for example, Zhang III), judging that the user identity authentication is passed; if the obtained additional answer (for example, Zhang three) is not consistent with the predetermined standard additional answer (for example, Li four), the user authentication is judged to be failed.
The authentication server 1 provided in the above embodiment performs primary authentication on the user identity by using a voiceprint recognition technology, then performs secondary authentication on the user identity according to the answer of the user to the preset question, and comprehensively determines whether the user identity passes the authentication by combining the primary authentication result and the secondary authentication result, thereby improving the accuracy of the user authentication.
Alternatively, in other embodiments, the voiceprint recognition based authentication program 10 can be further divided into one or more modules, and the one or more modules are stored in the memory 11 and executed by one or more processors (in this embodiment, the processor 12) to implement the present invention, where the module refers to a series of computer program instruction segments capable of implementing a specific function. For example, referring to fig. 2, which is a schematic diagram of program modules of the voiceprint recognition based authentication program 10 in fig. 1, in this embodiment, the voiceprint recognition based authentication program 10 can be divided into a vector acquisition module 110, a voiceprint authentication module 120, a manual authentication module 130, a secondary analysis module 140, and an authentication module 150, the functions or operation steps implemented by the modules 110 to 150 are similar to those described above, and are not described in detail here, for example, where:
a vector obtaining module 110, configured to receive an identity verification request with a user identity sent by a first client, collect current voice data of a user from the first client, construct a current voiceprint authentication vector for the current voice data, and determine a standard voiceprint authentication vector corresponding to the user identity according to the user identity;
the voiceprint verification module 120 is configured to calculate a distance between a current voiceprint authentication vector and a standard voiceprint authentication vector by using a predetermined distance calculation formula, analyze whether the voiceprint authentication passes the calculated distance, generate a voiceprint verification result, and send the voiceprint verification result to the first client;
the manual verification module 130 is configured to obtain a manual verification result from the second client when the voiceprint verification result is that the voiceprint verification passes;
the secondary analysis module 140 is configured to, when the manual verification result is a manual verification failure, analyze the user identity again according to a predetermined analysis algorithm to generate a verification analysis result; and
the authentication module 150 is configured to determine that the user authentication passes when the authentication analysis result is that the authentication analysis passes, or determine that the user authentication fails when the authentication analysis result is that the authentication analysis fails.
In addition, the invention also provides an identity authentication method based on voiceprint recognition. Fig. 3 is a flow chart of the identity authentication method based on voiceprint recognition according to the preferred embodiment of the present invention. The method may be performed by an apparatus, which may be implemented by software and/or hardware.
In this embodiment, the identity authentication method based on voiceprint recognition includes steps S1-S5:
step S1, receiving an identity verification request with a user identity sent by a first client, collecting current voice data of a user from the first client, constructing a current voiceprint authentication vector for the current voice data, and determining a standard voiceprint authentication vector corresponding to the user identity according to the user identity;
step S2, calculating the distance between the current voiceprint identification vector and the standard voiceprint identification vector by using a predetermined distance calculation formula, analyzing whether the voiceprint identification passes the voiceprint identification according to the calculated distance, generating a voiceprint identification result and sending the voiceprint identification result to the first client;
step S3, when the voiceprint verification result is that the voiceprint verification passes, acquiring a manual verification result from the second client;
step S4, when the manual verification result is that the manual verification fails, analyzing the user identity again according to a predetermined analysis algorithm to generate a verification analysis result; and
and step S5, when the result of the verification analysis is that the verification analysis passes, determining that the user identity verification passes, or when the result of the verification analysis is that the verification analysis fails, determining that the user identity verification fails.
In this embodiment, the first client is a terminal used by a user, the second client is a terminal used by a customer service staff, and the terminal may be a mobile terminal or a desktop computer with a sound collection function. When the user identity needs to be verified, after an identity verification request with a user identity (e.g., an identity card number) sent by a first client is received, the first client is used to collect current voice data of the user and construct a current voiceprint authentication vector for the collected current voice data. It can be understood that, in order to determine whether the current voiceprint authentication vector corresponds to the identity transmitted by the first user, a corresponding standard voiceprint authentication vector needs to be set in advance for the predetermined user identity, so as to obtain a mapping relationship between the predetermined user identity and the standard voiceprint authentication vector.
Then, according to the user identity in the identity verification request and the mapping relation between the user identity and the standard voiceprint authentication vector, the standard voiceprint authentication vector corresponding to the user identity is determined, and the distance between the current voiceprint authentication vector and the determined standard voiceprint authentication vector is calculated by using a predetermined distance calculation formula. Specifically, the predetermined distance calculation formula is:
wherein,represents a standard voiceprint authentication vector and is,representing the current voiceprint authentication vector.
And when the calculated distance is smaller than or equal to a preset distance threshold value, determining that the verification is passed, otherwise, determining that the verification fails.
It should be noted that, in the voiceprint authentication process, even if the user identification corresponds to the current voiceprint authentication vector, if the quality of the voice data is poor due to human or environmental interference of the current voice data, an error condition of the authentication result may occur, in order to ensure the accuracy of the user authentication, even if the voiceprint authentication result passes the voiceprint authentication, a manual authentication request is sent to the second client, then, the customer service staff sends a preset authentication problem, such as an identity card number, a name, a school number, etc., to the first client through the second client, and judges whether the manual authentication passes through by judging whether the answer of the user is consistent with the preset answer, and feeds back the manual authentication result to the authentication server through the second client.
When the voiceprint verification result is voiceprint verification failure and the manual verification result is manual verification failure, judging that the user identity verification fails; and when the voiceprint verification result is that the voiceprint verification is passed and the manual verification result is that the manual verification is passed, judging that the user identity verification is passed. The user authentication result is determined through double authentication, and the accuracy of the authentication is improved.
Further, when the voiceprint verification result is that the voiceprint verification is passed and the manual verification result is that the manual verification fails, the user identity is analyzed again according to a predetermined analysis algorithm to generate a verification analysis result. Wherein the predetermined analysis algorithm comprises: if the problem of the manual identity authentication of the user is a first type problem of which the answer is a first type answer, analyzing the first type answer of the user aiming at the first type problem according to a predetermined first analysis rule, and outputting an authentication analysis result, wherein the first type answer refers to an answer of which the content is digital, such as birth date, identification number and the like; or, if the question for performing the manual identity authentication on the user is a second type question with an answer of the second type answer, analyzing the second type answer of the user for the second type question according to a predetermined second analysis rule, and outputting an authentication analysis result, wherein the second type answer refers to an answer with a content of a Chinese character, for example, a name of a teacher in a higher language, a name of a tutor in a grade of university, and the like.
As an embodiment, the step of analyzing the first-type answer of the user to the first-type question according to the predetermined first analysis rule specifically includes: acquiring a first type answer input by a user aiming at a first type question; comparing the first type answers with the standard answers, identifying a difference part, and determining difference values of all preset difference types of the difference part; and comparing and analyzing the difference value of each preset difference type of the difference part with the corresponding preset difference threshold value according to the mapping relation between the preset difference type and the preset difference threshold value, which is defined in advance, and outputting a verification analysis result.
The preset difference types comprise the number of difference parts, error digits, interval difference degrees and interval matching degrees. For example, the first answer input by the user is 123456789, the standard answer is 331456789, the difference between the two is "123" and "331", the number of difference portions of the two numbers is 1, the number of error bits of the difference portion is 3, the difference portion has no number other than the difference portion, the degree of difference between the two numbers is 0, the difference portion of the two numbers cannot be restored and matched by adjusting the number of bits, and the degree of matching between the two numbers is infinite. As another example, the difference portions of 123456789 and 331456971 are "123" and "331", "789", and "971", and the number of difference portions of these two numbers is 2. For another example, the difference portions of 123456789 and 341456789 are "123" and "341", and the difference portion has a number "4" other than the difference portion, and the interval difference between these two numbers is 1. For another example, the difference between 123456789 and 231456789 is "123" and "231", the difference between these two numbers can be restored by adjusting the form of the digits, the digit "1" in "231" can be restored by adjusting 2 sequences forward to match "123", and the interval matching degree between these two digits is 2.
After the difference value of the preset difference type between the answer input by the user and the standard answer is determined, respectively judging whether the difference value of each preset difference type is less than or equal to the corresponding preset difference threshold value, and if the difference value of all the preset difference types is less than or equal to the corresponding preset difference threshold value, determining that the verification analysis is passed; and if the difference value of one preset difference type is larger than the corresponding difference threshold value, determining that the verification analysis fails. For example, the data generated by the user is 123456789, the standard answer is 331456789, the difference portions between the two are "123" and "331", and the difference values of the four preset types of difference portion number, error digit, interval difference degree, and interval matching degree of the difference portion are: 1. 3, 0 and infinity, assuming that the preset difference thresholds corresponding to the difference values of the four preset types are respectively: 1. 1,0,1, do not satisfy the condition that the difference values of all preset difference types are less than or equal to the corresponding difference threshold, and therefore, determine that the verification analysis fails,
the above steps are only suitable for analyzing the condition that the answer of the manual identity authentication question is a digital answer, and when the answer of the manual identity authentication question is a text answer, a second analysis rule is needed for analysis.
As an embodiment, the step of analyzing the second type of answer of the user to the second type of question according to a predetermined second analysis rule includes:
acquiring a second type answer input by a user aiming at the second type question, and converting the second type answer into a character string; comparing and analyzing the converted second type answer character string with a predetermined standard answer character string according to a predetermined second type answer difference value analysis algorithm to generate a corresponding second type answer difference value; if the generated second type answer difference value is larger than the preset answer difference value threshold value, the verification analysis is determined to fail, or if the generated second type answer difference value is smaller than or equal to the preset answer difference value threshold value, the verification analysis is determined to pass.
Specifically, the predetermined second type answer difference value analysis algorithm includes: splitting the letters of the converted character strings word by word, and recombining to generate a second type answer word packet of the user; carrying out character matching on the user second type answer word packet generated by recombination and a predetermined standard answer word packet to generate a corresponding letter matching set value; and calculating a set difference value between the generated letter matching set value and the standard set value according to a predetermined calculation formula, and taking the set difference value as the second type answer difference value.
For example, if the second type of answer input by the user is 'small and bright', and the standard answer is 'small and strong', the two answers are respectively converted into character strings: ' xiaoming ' and ' xiaoqiang ' result in ' x ', ' i ', ' a ', ' o ','m ', ' i ', ' n ', ' g ', ' x ', ' i ', ' a ', ' o ', ' q ', ' i ', ' a ', ' n ', ' g ', ' and ' g ', respectively, and the generated second type answer word packet for the user can be counted as { ' x ', ' i ', ' a ', ' o ','m ', ' i ', ' n ', ' g ' }, and the standard answer word packet can be counted as { ' x ', ' i ', ' a ', ' o ', ' q ', ' i ', ' a ', ' n ', ' g ' }; the standard answer word package { 'x', 'i', 'a', 'o' } is the same as each character of the second type answer word package { 'x', 'i', 'a', 'o' }, and the corresponding letter matching set value of { 'x', 'i', 'a', 'o' } may be [1,1,1,1 ]; the standard answer word package { 'q', 'i', 'a', 'n', 'g' } and the second type answer word package {'m', 'i', 'n', 'g' } have three different characters, the corresponding letter matching set value may be [0,1,0,1,1]), and a set difference value between the generated letter matching set value ([1,1,1,1] [0,1,0,1,1]) and the standard set value ([1,1,1,1] [1,1,1,1,1]) is calculated according to a predetermined calculation formula, and the set difference value is the second type answer difference value. In this embodiment, the predetermined calculation formula may be a cosine formula, an euclidean distance calculation formula, or the like.
When the calculated second type answer difference value is smaller than or equal to the Chinese character answer difference value threshold value, determining that the verification analysis result is that the verification analysis is passed, namely judging that the user identity verification is passed; otherwise, determining that the verification analysis result is verification analysis failure, namely judging that the user identity verification fails.
Further, there is also a case: when the voiceprint verification result is that voiceprint verification fails and the manual verification result is that manual verification passes, selecting one or more questions from additional questions predetermined by the user, proposing the questions to the first client, for example, names of friends best in the beginning, and acquiring additional answers of the user to the additional questions from the first client; comparing and analyzing the obtained additional answers with predetermined standard additional answers; if the obtained additional answer (for example, Zhang III) is consistent with the predetermined standard additional answer (for example, Zhang III), judging that the user identity authentication is passed; if the obtained additional answer (for example, Zhang three) is not consistent with the predetermined standard additional answer (for example, Li four), the user authentication is judged to be failed.
The identity verification method based on voiceprint recognition provided by the embodiment utilizes the voiceprint recognition technology to perform primary verification on the identity of the user, then performs secondary verification on the identity of the user according to the answer of the user to the preset question, and comprehensively judges whether the identity of the user passes the verification or not by combining the primary verification result and the secondary verification result, so that the accuracy of the identity verification of the user is improved.
Furthermore, an embodiment of the present invention further provides a computer-readable storage medium, where an identity verification program 10 based on voiceprint recognition is stored, and when executed by a processor, the program implements the following operations:
receiving an identity verification request with a user identity identifier sent by a first client, acquiring current voice data of a user from the first client, constructing a current voiceprint authentication vector for the current voice data, and determining a standard voiceprint authentication vector corresponding to the user identity identifier according to the user identity identifier;
calculating the distance between the current voiceprint identification vector and the standard voiceprint identification vector by using a predetermined distance calculation formula, analyzing whether the voiceprint identification passes the voiceprint identification according to the calculated distance, generating a voiceprint identification result and sending the voiceprint identification result to the first client;
when the voiceprint verification result is that the voiceprint verification is passed, acquiring a manual verification result from the second client;
when the manual verification result is that the manual verification fails, analyzing the user identity again according to a predetermined analysis algorithm to generate a verification analysis result; and
and when the verification analysis result is that the verification analysis passes, judging that the user identity verification passes, or when the verification analysis result is that the verification analysis fails, judging that the user identity verification fails.
The embodiment of the computer-readable storage medium of the present invention is substantially the same as the embodiments of the identity authentication method based on voiceprint recognition, and will not be described in detail herein.
It should be noted that the above-mentioned numbers of the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (10)
1. An identity authentication method based on voiceprint recognition is characterized by comprising the following steps:
receiving an identity verification request with a user identity identifier sent by a first client, acquiring current voice data of a user from the first client, constructing a current voiceprint authentication vector for the current voice data, and determining a standard voiceprint authentication vector corresponding to the user identity identifier according to the user identity identifier;
calculating the distance between the current voiceprint identification vector and the standard voiceprint identification vector by using a predetermined distance calculation formula, analyzing whether the voiceprint identification passes the voiceprint identification according to the calculated distance, generating a voiceprint identification result and sending the voiceprint identification result to the first client;
when the voiceprint verification result is that the voiceprint verification is passed, acquiring a manual verification result from the second client;
when the manual verification result is that the manual verification fails, analyzing the user identity again according to a predetermined analysis algorithm to generate a verification analysis result; and
and when the verification analysis result is that the verification analysis passes, judging that the user identity verification passes, or when the verification analysis result is that the verification analysis fails, judging that the user identity verification fails.
2. The voiceprint recognition based authentication method as recited in claim 1, further comprising:
when the voiceprint verification result is that the voiceprint verification is passed and the manual verification result is that the manual verification is passed, judging that the user identity verification is passed; or
And when the voiceprint verification result is that the voiceprint verification fails and the manual verification result is that the manual verification fails, judging that the user identity verification fails.
3. The identity verification method based on voiceprint recognition according to claim 1 or 2, wherein the step of "analyzing the user identity again according to a predetermined analysis algorithm" specifically comprises:
if the problem of the manual identity authentication of the user is a first type problem of which the answer is a first type answer, analyzing the first type answer of the user aiming at the first type problem according to a predetermined first analysis rule, and outputting an authentication analysis result; or
And if the question for carrying out the manual identity authentication on the user is a second type question with the answer of the second type, analyzing the second type answer of the user aiming at the second type question according to a predetermined second analysis rule, and outputting an authentication analysis result.
4. The identity verification method based on voiceprint recognition according to claim 3, wherein the step of analyzing the first type answer of the user to the first type question according to the predetermined first analysis rule specifically comprises:
acquiring a first type answer input by a user aiming at the first type question, comparing the first type answer with a standard answer, identifying a difference part, and determining a difference value of each preset difference type of the difference part; and
and comparing and analyzing the difference value of each preset difference type of the difference part with the corresponding preset difference threshold value according to the mapping relation between the preset difference type and the preset difference threshold value, which is defined in advance, and outputting a verification analysis result.
5. The identity verification method based on voiceprint recognition according to claim 4, wherein the preset difference types comprise difference part number, error bit number, interval difference degree and interval matching degree.
6. The identity verification method based on voiceprint recognition according to claim 3, wherein the step of analyzing the second type answer of the user to the second type question according to the predetermined second analysis rule specifically comprises:
acquiring a second type answer input by a user aiming at a second type question, and converting the second type answer into a character string;
comparing and analyzing the character string with a predetermined standard answer character string according to a predetermined second type answer difference value analysis algorithm to generate a corresponding second type answer difference value; and
and when the second type answer difference value is smaller than or equal to a preset Chinese character answer threshold value, determining that the verification analysis is passed, or when the second type answer difference value is larger than a preset second type answer difference value threshold value, determining that the verification analysis is failed.
7. The identity verification method based on voiceprint recognition according to claim 6, wherein the step of comparing and analyzing the character string with a predetermined standard answer character string according to a predetermined second-type answer difference value analysis algorithm to generate a corresponding second-type answer difference value specifically comprises:
splitting the letters of the converted character strings word by word, and recombining to generate a second type answer word packet;
performing character matching on the second type answer word packet and a predetermined standard answer word packet to generate a corresponding letter matching set value; and
and calculating a set difference value between the letter matching set value and a standard set value according to a predetermined calculation formula, and taking the set difference value as the second type answer difference value.
8. The voiceprint recognition based authentication method as recited in claim 1, further comprising:
when the voiceprint verification result is that voiceprint verification fails and the manual verification result is that manual verification passes, a predetermined additional question is put forward to the first client, and an additional answer of the user to the additional question is obtained from the first client;
comparing and analyzing the obtained additional answers with predetermined standard additional answers; and
and when the additional answer is consistent with the standard additional answer, judging that the user identity authentication is passed, or when the additional answer is not consistent with the standard additional answer, judging that the user identity authentication is failed.
9. An authentication server, comprising: a memory, a processor, said memory having stored thereon a voiceprint recognition based authentication program executable on said processor, said program when executed by said processor implementing the steps of the voiceprint recognition based authentication method according to any one of claims 1 to 8.
10. A computer-readable storage medium, on which a voiceprint recognition based authentication program is stored, which when executed by a processor implements the steps of the voiceprint recognition based authentication method according to any one of claims 1 to 8.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810311087.2A CN108768654B (en) | 2018-04-09 | 2018-04-09 | Identity verification method based on voiceprint recognition, server and storage medium |
| PCT/CN2018/102122 WO2019196302A1 (en) | 2018-04-09 | 2018-08-24 | Voiceprint recognition-based identity authentication method, server and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810311087.2A CN108768654B (en) | 2018-04-09 | 2018-04-09 | Identity verification method based on voiceprint recognition, server and storage medium |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN108768654A true CN108768654A (en) | 2018-11-06 |
| CN108768654B CN108768654B (en) | 2020-04-21 |
Family
ID=63981529
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201810311087.2A Active CN108768654B (en) | 2018-04-09 | 2018-04-09 | Identity verification method based on voiceprint recognition, server and storage medium |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN108768654B (en) |
| WO (1) | WO2019196302A1 (en) |
Cited By (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109522693A (en) * | 2018-11-19 | 2019-03-26 | 中国银行股份有限公司 | Information processing method, device, electronic equipment and readable storage medium storing program for executing |
| CN109994118A (en) * | 2019-04-04 | 2019-07-09 | 平安科技(深圳)有限公司 | Speech cipher verification method, device, storage medium and computer equipment |
| CN110111796A (en) * | 2019-06-24 | 2019-08-09 | 秒针信息技术有限公司 | Identify the method and device of identity |
| CN110472579A (en) * | 2019-08-16 | 2019-11-19 | 中国银行股份有限公司 | Identity checking method, device, equipment and readable storage medium storing program for executing in business processing |
| CN110808053A (en) * | 2019-10-09 | 2020-02-18 | 深圳市声扬科技有限公司 | Driver identity verification method and device and electronic equipment |
| CN111181981A (en) * | 2019-12-31 | 2020-05-19 | 联想(北京)有限公司 | Processing method and device and computer equipment |
| CN111199742A (en) * | 2018-11-20 | 2020-05-26 | 阿里巴巴集团控股有限公司 | Identity verification method and device and computing equipment |
| CN111462760A (en) * | 2019-01-21 | 2020-07-28 | 阿里巴巴集团控股有限公司 | Voiceprint recognition system, method and device and electronic equipment |
| CN111833068A (en) * | 2020-07-31 | 2020-10-27 | 重庆富民银行股份有限公司 | Identity verification system and method based on voiceprint recognition |
| CN113242331A (en) * | 2021-05-11 | 2021-08-10 | 鸬鹚科技(深圳)有限公司 | Different types of address translation methods, different types of address translation devices, different types of computer equipment and different types of storage media |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115565539B (en) * | 2022-11-21 | 2023-02-07 | 中网道科技集团股份有限公司 | Data processing method for realizing self-help correction terminal anti-counterfeiting identity verification |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101494540A (en) * | 2009-03-04 | 2009-07-29 | 北京英立讯科技有限公司 | Remote voice identification authentication system and method |
| US20090305667A1 (en) * | 2007-04-24 | 2009-12-10 | Schultz Michael J | Method and system for mobile identity verification and security |
| US20110260832A1 (en) * | 2010-04-27 | 2011-10-27 | Joe Ross | Secure voice biometric enrollment and voice alert delivery system |
| CN102737634A (en) * | 2012-05-29 | 2012-10-17 | 百度在线网络技术(北京)有限公司 | Authentication method and device based on voice |
| CN105323218A (en) * | 2014-06-30 | 2016-02-10 | 腾讯科技(深圳)有限公司 | Identity verifying method and device |
| CN107517207A (en) * | 2017-03-13 | 2017-12-26 | 平安科技(深圳)有限公司 | Server, auth method and computer-readable recording medium |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104618415B (en) * | 2014-03-13 | 2018-06-19 | 腾讯科技(深圳)有限公司 | Credit accounts creation method, apparatus and system |
| CN105740683B (en) * | 2016-01-20 | 2018-10-12 | 北京信安盟科技有限公司 | Based on multifactor, multi engine, the man-machine auth method being combined and system |
| CN105844246A (en) * | 2016-03-25 | 2016-08-10 | 杭州信鸽金融信息服务股份有限公司 | Face recognition and second-generation ID card identification system with single camera cabinet machine |
-
2018
- 2018-04-09 CN CN201810311087.2A patent/CN108768654B/en active Active
- 2018-08-24 WO PCT/CN2018/102122 patent/WO2019196302A1/en not_active Ceased
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20090305667A1 (en) * | 2007-04-24 | 2009-12-10 | Schultz Michael J | Method and system for mobile identity verification and security |
| CN101494540A (en) * | 2009-03-04 | 2009-07-29 | 北京英立讯科技有限公司 | Remote voice identification authentication system and method |
| US20110260832A1 (en) * | 2010-04-27 | 2011-10-27 | Joe Ross | Secure voice biometric enrollment and voice alert delivery system |
| CN102737634A (en) * | 2012-05-29 | 2012-10-17 | 百度在线网络技术(北京)有限公司 | Authentication method and device based on voice |
| CN105323218A (en) * | 2014-06-30 | 2016-02-10 | 腾讯科技(深圳)有限公司 | Identity verifying method and device |
| CN107517207A (en) * | 2017-03-13 | 2017-12-26 | 平安科技(深圳)有限公司 | Server, auth method and computer-readable recording medium |
Cited By (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109522693A (en) * | 2018-11-19 | 2019-03-26 | 中国银行股份有限公司 | Information processing method, device, electronic equipment and readable storage medium storing program for executing |
| CN111199742A (en) * | 2018-11-20 | 2020-05-26 | 阿里巴巴集团控股有限公司 | Identity verification method and device and computing equipment |
| CN111462760A (en) * | 2019-01-21 | 2020-07-28 | 阿里巴巴集团控股有限公司 | Voiceprint recognition system, method and device and electronic equipment |
| CN111462760B (en) * | 2019-01-21 | 2023-09-26 | 阿里巴巴集团控股有限公司 | Voiceprint recognition system, voiceprint recognition method, voiceprint recognition device and electronic equipment |
| CN109994118A (en) * | 2019-04-04 | 2019-07-09 | 平安科技(深圳)有限公司 | Speech cipher verification method, device, storage medium and computer equipment |
| CN109994118B (en) * | 2019-04-04 | 2022-10-11 | 平安科技(深圳)有限公司 | Voice password verification method and device, storage medium and computer equipment |
| CN110111796A (en) * | 2019-06-24 | 2019-08-09 | 秒针信息技术有限公司 | Identify the method and device of identity |
| CN110472579A (en) * | 2019-08-16 | 2019-11-19 | 中国银行股份有限公司 | Identity checking method, device, equipment and readable storage medium storing program for executing in business processing |
| CN110808053B (en) * | 2019-10-09 | 2022-05-03 | 深圳市声扬科技有限公司 | Driver identity verification method and device and electronic equipment |
| CN110808053A (en) * | 2019-10-09 | 2020-02-18 | 深圳市声扬科技有限公司 | Driver identity verification method and device and electronic equipment |
| CN111181981A (en) * | 2019-12-31 | 2020-05-19 | 联想(北京)有限公司 | Processing method and device and computer equipment |
| CN111833068A (en) * | 2020-07-31 | 2020-10-27 | 重庆富民银行股份有限公司 | Identity verification system and method based on voiceprint recognition |
| CN113242331A (en) * | 2021-05-11 | 2021-08-10 | 鸬鹚科技(深圳)有限公司 | Different types of address translation methods, different types of address translation devices, different types of computer equipment and different types of storage media |
| CN113242331B (en) * | 2021-05-11 | 2023-05-09 | 鸬鹚科技(深圳)有限公司 | Different types of address conversion method, device, computer equipment and storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| CN108768654B (en) | 2020-04-21 |
| WO2019196302A1 (en) | 2019-10-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN108768654B (en) | Identity verification method based on voiceprint recognition, server and storage medium | |
| CN108766444B (en) | User identity authentication method, server and storage medium | |
| CN111444341B (en) | User portrait construction method, device, equipment and readable storage medium | |
| RU2005133725A (en) | USER AUTHENTICATION BY COMBINING IDENTIFICATION OF TALING AND REVERSE TURING TEST | |
| CN112288584B (en) | Insurance report processing method and device, computer readable medium and electronic equipment | |
| CN112836484B (en) | A text alignment method, apparatus, electronic device, and computer-readable storage medium | |
| CN113705691B (en) | Image annotation verification method, device, equipment and medium based on artificial intelligence | |
| CN112328761A (en) | Intention label setting method and device, computer equipment and storage medium | |
| CN111444349A (en) | Information extraction method and device, computer equipment and storage medium | |
| CN112580108A (en) | Signature and seal integrity verification method and computer equipment | |
| CN111401367B (en) | Character detection method, device, equipment and medium based on federal OCR model | |
| CN113707157B (en) | Voiceprint recognition-based identity verification method and device, electronic equipment and medium | |
| CN112036323B (en) | Signature handwriting authentication method, client and server | |
| CN112836521A (en) | Question-answer matching method, device, computer equipment and storage medium | |
| CN113486316A (en) | User identity authentication method and device, electronic equipment and readable storage medium | |
| CN117668154A (en) | Medical health consultation service method, system, equipment and storage medium | |
| CN110569340A (en) | Text information verification method and device, computer equipment and storage medium | |
| CN113515705A (en) | Response information generation method, device, equipment and computer readable storage medium | |
| CN113901821B (en) | Entity naming recognition method, device, equipment and storage medium | |
| CN109905362B (en) | User request detection method and device, computer equipment and storage medium | |
| CN114780701A (en) | Automatic question-answer matching method, device, computer equipment and storage medium | |
| CN114077828A (en) | Block chain-based electronic contract signing method, device, equipment and storage medium | |
| CN113704405B (en) | Quality inspection scoring method, device, equipment and storage medium based on recorded content | |
| CN111143524A (en) | User intention determining method and electronic equipment | |
| CN116614422A (en) | Beidou time service protocol safety analysis method |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |