CN113225327A - Login client supervision method, device, equipment and medium based on voice recognition - Google Patents

Login client supervision method, device, equipment and medium based on voice recognition Download PDF

Info

Publication number
CN113225327A
CN113225327A CN202110473944.0A CN202110473944A CN113225327A CN 113225327 A CN113225327 A CN 113225327A CN 202110473944 A CN202110473944 A CN 202110473944A CN 113225327 A CN113225327 A CN 113225327A
Authority
CN
China
Prior art keywords
client
login
information
voice
supervision
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110473944.0A
Other languages
Chinese (zh)
Inventor
钱波
沈卓
谷雨
何兴华
蒋家豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xindong Network Co ltd
Original Assignee
Xindong Network Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xindong Network Co ltd filed Critical Xindong Network Co ltd
Priority to CN202110473944.0A priority Critical patent/CN113225327A/en
Publication of CN113225327A publication Critical patent/CN113225327A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/18Artificial neural networks; Connectionist approaches
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/22Interactive procedures; Man-machine interfaces
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L25/00Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00
    • G10L25/03Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 characterised by the type of extracted parameters
    • G10L25/18Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 characterised by the type of extracted parameters the extracted parameters being spectral information of each sub-band

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Biomedical Technology (AREA)
  • Computational Linguistics (AREA)
  • Spectroscopy & Molecular Physics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a method, a device, equipment and a medium for supervising a login client based on voice recognition, wherein the method comprises the following steps: the method comprises the steps of verifying a login request sent by a client, judging whether the login duration meets a corresponding supervision rule or not by recording the login duration of a current login client if the login request is verified, intercepting a voice segment from voice information sent by the client and inputting a voice recognition model for recognition to obtain a recognition result if the login duration meets the supervision rule, judging whether the recognition result is consistent with client registration information of a logged-in client or not, returning to judge whether the login duration meets the supervision rule or not if the recognition result is consistent with the client registration information, and feeding back prompt information for forced log-out if the login duration does not meet the supervision rule. The invention belongs to the technical field of voice recognition, and is used for recognizing voice information input by a client to obtain a recognition result, verifying whether the recognition result is consistent with client registration information or not to verify whether an actual user is matched with a login client or not, thereby realizing effective supervision on the login client and greatly improving the reliability of supervision.

Description

Login client supervision method, device, equipment and medium based on voice recognition
Technical Field
The invention relates to the technical field of voice recognition, in particular to a method, a device, equipment and a medium for supervising a logged-on client based on voice recognition.
Background
With the popularization of electronic products such as mobile phones and computers, more and more minors can more conveniently contact the mobile phones, the computers and the like, parents can hardly supervise the use of the electronic products by the minors, and the use of online game programs by the minors can be limited only by certain technical means. In a conventional technical method, a method of performing differential supervision on a login account is generally adopted to limit a minor to use an electronic product to run a network game program, if a current login account is a minor, the time for the current login account to use the electronic product to run the network game program is correspondingly limited, and if the current login account exceeds a certain time, a forced supervision measure is taken on the current login account to realize a supervision function on the login account. However, in the actual use process, a situation that a minor runs the online game program by using a login account of an adult parent usually exists, and the current login account is an adult, the existing login account monitoring measures can be avoided, so that the existing monitoring method cannot effectively monitor the user of the electronic product. Therefore, the monitoring method in the prior art has the problem that the actual user cannot be effectively monitored.
Disclosure of Invention
The embodiment of the invention provides a method, a device, equipment and a medium for supervising a login client based on voice recognition, and aims to solve the problem that the supervising method in the prior art cannot effectively supervise an actual user.
In a first aspect, an embodiment of the present invention provides a method for supervising a logged-in client based on voice recognition, which is applied to a management server, where the management server is connected with a client through a network to transmit data information, and the method includes:
if a login request sent by the client is received, verifying whether the login request passes the pre-stored registration information table;
if the login request passes the verification, taking the client corresponding to the login request as a logged-in client, recording the login duration of the logged-in client and feeding back prompt information of successful login to the client;
judging whether the login duration meets a supervision rule matched with the logged-in client or not;
if the login duration meets the supervision rule, intercepting the voice message sent by the client according to the login duration and a preset interception period to obtain a voice fragment;
recognizing the voice segments according to a preset voice recognition model to obtain corresponding recognition results;
acquiring client registration information corresponding to the logged-in client in the registration information table, and verifying whether the identification result is consistent with the client registration information;
if the identification result is consistent with the client registration information, returning to the step of judging whether the login duration meets the supervision rule matched with the logged-in client or not;
and if the identification result is not consistent with the client registration information or the login duration does not meet the supervision rule, feeding back prompt information for forcibly quitting the login to the client.
In a second aspect, an embodiment of the present invention provides a login customer monitoring apparatus based on voice recognition, where the apparatus includes:
the login request verification unit is used for verifying whether the login request passes the pre-stored registration information table or not according to the received login request sent by the client;
a login prompt information feedback unit, configured to, if the login request passes verification, take the client corresponding to the login request as a logged-in client, record login duration of the logged-in client, and feed back prompt information indicating that login is successful to the client;
the login duration judging unit is used for judging whether the login duration meets a supervision rule matched with the logged-in client or not;
a voice fragment intercepting unit, configured to intercept, if the login duration meets the supervision rule, a voice fragment from the voice information sent by the client according to the login duration and a preset interception period;
the voice recognition result acquisition unit is used for recognizing the voice segments according to a preset voice recognition model to obtain corresponding recognition results;
an identification result verification unit configured to acquire client registration information corresponding to the logged-in client in the registration information table, and verify whether the identification result is consistent with the client registration information;
a return execution unit, configured to return to execute the step of determining whether the login duration satisfies a supervision rule matching the logged-in client if the identification result is consistent with the client registration information;
and the log-out prompt information feedback unit is used for feeding back prompt information for forcibly logging out to the client if the identification result is not consistent with the client registration information or the log-in duration does not meet the supervision rule.
In a third aspect, an embodiment of the present invention further provides a computer device, where the computer device includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and the processor executes the computer program to implement the login customer supervision method based on voice recognition according to the first aspect.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and when the computer program is executed by a processor, the method for supervising a login client based on voice recognition according to the first aspect is implemented.
The embodiment of the invention provides a method, a device, equipment and a medium for supervising a login client based on voice recognition. The method comprises the steps of verifying a login request sent by a client, judging whether the login duration meets a corresponding supervision rule or not by recording the login duration of a current login client if the login duration meets the corresponding supervision rule, intercepting a voice segment from voice information sent by the client and inputting a voice recognition model for recognition if the login duration meets the supervision rule to obtain a recognition result, judging whether the recognition result is consistent with client registration information of a logged-in client or not, returning to judge whether the login duration meets the corresponding supervision rule or not if the recognition result is consistent with the client registration information of the logged-in client, and feeding back prompt information for forcibly logging out if the login duration is inconsistent with the client registration information of the logged-in client. By the method, the corresponding recognition result can be obtained based on the voice information input by the client, and whether the recognition result is consistent with the client registration information or not is verified, so that whether the actual user is matched with the login client or not is verified, the login client is effectively supervised, and the supervision reliability is greatly improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a method for supervising a logged-in client based on voice recognition according to an embodiment of the present invention;
fig. 2 is a schematic application scenario diagram of a login client monitoring method based on voice recognition according to an embodiment of the present invention;
FIG. 3 is a sub-flowchart of a method for supervising a logged-on client based on voice recognition according to an embodiment of the present invention;
FIG. 4 is a schematic view of another sub-flow of a method for supervising a logged-on client based on voice recognition according to an embodiment of the present invention;
FIG. 5 is a schematic view of another sub-flow chart of a method for supervising a logged-on client based on voice recognition according to an embodiment of the present invention;
FIG. 6 is a schematic view of another sub-flow chart of a method for supervising a logged-on client based on voice recognition according to an embodiment of the present invention;
FIG. 7 is a schematic flowchart of another method for supervising a logged-on client based on voice recognition according to an embodiment of the present invention;
FIG. 8 is a schematic view of another sub-flow chart of a method for supervising a logged-on client based on voice recognition according to an embodiment of the present invention;
FIG. 9 is a schematic block diagram of a log-on client monitor based on speech recognition provided by an embodiment of the present invention;
FIG. 10 is a schematic block diagram of a computer device provided by an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1 and fig. 2, fig. 1 is a schematic flowchart of a method for supervising a logged-in client based on voice recognition according to an embodiment of the present invention, and fig. 2 is a schematic application scenario diagram of the method for supervising the logged-in client based on voice recognition according to an embodiment of the present invention; the method for monitoring the login client based on the voice recognition is applied to a management server 10, the management server 10 and a client 20 are connected through a network to transmit data information, the method for monitoring the login client based on the voice recognition is executed through application software installed in the management server 10, the client 20 is a terminal device used for installing an application program for the client to use, such as a desktop computer, a notebook computer, a tablet computer or a mobile phone, the client 20 comprises a function of collecting the voice information and sending the voice information to the management server 10, and the management server 10 is a server side capable of receiving a login request sent by the client, verifying the login request and obtaining the voice information sent by the client for recognition, such as a server constructed by an enterprise or a government department. As shown in fig. 1, the method includes steps S110 to S180.
And S110, if the login request sent by the client is received, verifying whether the login request passes the pre-stored registration information table.
And if the login request sent by the client is received, verifying whether the login request passes the pre-stored registration information table. The user of the client is the client, the client can operate the corresponding application program in the client by clicking the operation button, login is needed before the corresponding function of the application program is used, at the moment, the client can input login information in the application program, the application program generates a corresponding login request based on the login information input by the client and sends the login request to the management server, and the management server receives the login request sent by the client and verifies the login request. For example, when a client runs a game program installed in the client using the client, it is necessary to input login information to log in the game program, and then a game can be played using a game function of the game program. The registration information table is a data table for storing the client registration information input by the client, and if the client needs to register when using the application program for the first time, the client registration information input to the management server by the client is stored in the registration information table by the management server. Whether the login request passes the verification can be verified through the corresponding client information in the registration information table, specifically, the login request comprises a login user name and a login password, the corresponding login password can be obtained from the registration information table according to the login user name, whether the login password is consistent with the login password is judged based on the login password, if so, the login request passes the verification, and if not, the login request fails the verification.
And S120, if the login request passes the verification, taking the client corresponding to the login request as a logged-in client, recording the login duration of the logged-in client and feeding back prompt information of successful login to the client.
And if the login request passes the verification, taking the client corresponding to the login request as a logged-in client, recording the login duration of the logged-in client and feeding back prompt information of successful login to the client. If the login request passes the verification, the client can use the corresponding function of the application program in the client, at this time, the client corresponding to the login request can be used as the logged-in client, the login duration of the logged-in client is recorded, the prompt message of successful login is fed back to the client, the application program of the client enters an application function interface for the client to use after receiving the prompt message of successful login, and the login duration can include the total login duration and the login duration of the current day.
S130, judging whether the login duration meets a supervision rule matched with the logged-in client.
And judging whether the login duration meets a supervision rule matched with the logged-in client or not. Specifically, a monitoring rule matched with a logged-in client can be obtained, the monitoring rule is a specific rule for monitoring the logged-in client, the management server can monitor the logged-in client in real time through the monitoring rule so as to judge whether the logged-in client meets the monitoring rule, if the logged-in client does not meet the monitoring rule, prompt information for forced log-out can be sent to the corresponding client, an application program in the client logs out from an application function interface after receiving the prompt information for forced log-out, and at the moment, the client cannot continue to use the corresponding function of the application program.
In one embodiment, as shown in fig. 3, step S130 includes sub-steps S131 and S132.
S131, acquiring a rule matched with the current time and the logged-in customer from a prestored rule base as a supervision rule.
Specifically, the management server is configured with a rule base, the rule base is a database for storing rules, a plurality of rules are stored in the rule base, different groups of people and different time periods correspond to different rules, and only one rule is matched with the current time and the logged-in client in the rule base.
For example, the time correspondence may be split into three different time periods: the common time period of the workday, the night forbidding time period of the workday and the holiday time period can be correspondingly divided into four different age groups: the name can be divided into two different real name types according to the real name condition of a client, wherein the names are 0-8 years old, 9-14 years old, 15-17 years old, 18 years old and above: real name and non-real name; any one of the classification information of the time period, the age period and the real name type is combined with each other to be used as a limiting condition of one rule, and then the rule base can correspondingly comprise 24 specific rules. If the age of a client registration information of a certain client is 15 years old, the real name type is real name, and the current time is in the common working day period, the corresponding limiting conditions of the age range of 15-17 years old, the common working day period of the time period and the real name type are real name can be determined, the only rule meeting the limiting conditions is obtained as the corresponding supervision rule, the supervision rule of a minor is more strict than that of an adult, and the supervision rule of a non-real client is more strict than that of a real-name client.
S132, judging whether the login time length exceeds a time length threshold value in the supervision rule or not to obtain a judgment result whether the login time length meets the supervision rule or not.
Whether the login duration exceeds a duration threshold in the supervision rule or not can be judged, specifically, the duration threshold comprises a single-login duration threshold and a single-day login duration threshold, whether the current login duration exceeds the single-login duration threshold or not can be judged, whether the total current-day login duration exceeds the single-day login duration threshold or not is judged, and if the current login duration does not exceed the single-login duration threshold and the total current-day login duration does not exceed the single-day login duration threshold, a judgment result that the login duration meets the supervision rule is obtained; otherwise, obtaining the judgment result that the login duration does not meet the supervision rule.
In an embodiment, as shown in fig. 7, steps S1310 and S1320 are further included after step S130.
S1310, if the payment request information sent by the client is received, judging whether the payment request information meets the supervision rule.
In more particular embodiments, a determination may also be made as to whether the payment request information sent by the client satisfies the oversight rules. The minor is not prevented from impulsing consumption when using the application program, an amount threshold value can be set in the supervision rule, whether the consumption amount in the payment request information exceeds the corresponding amount threshold value is judged to judge whether the payment request meets the corresponding supervision rule, if the payment request does not meet the corresponding supervision rule, prompt information of payment failure is fed back to the client, and at the moment, the management server does not settle the payment request information; otherwise, feeding back the prompt information of successful payment to the client, and at the moment, finishing settlement by the management server according to the payment amount in the payment request information.
In an embodiment, as shown in fig. 8, step S1310 includes substeps S1311, S1312, and S1313.
S1311, judging whether the consumption amount in the payment request information exceeds an amount threshold value in the supervision rule.
And judging whether the consumption amount in the payment request information exceeds an amount threshold in the supervision rule or not, wherein the consumption amount of the payment request information is the single consumption amount, and the amount threshold at the moment only comprises the single consumption amount threshold, and judging whether the consumption amount of the payment request information exceeds the single consumption amount threshold or not. In a more specific embodiment, a historical consumption record of the customer corresponding to the payment request information can be acquired, the total monthly consumption amount of the customer can be acquired, a monthly consumption amount threshold value can be configured in the amount threshold value, on the premise that the amount threshold value does not exceed the word consumption amount threshold value, whether the total monthly consumption amount of the customer exceeds the monthly consumption amount threshold value or not is judged again, and if not, a judgment result that the consumption amount does not exceed the amount threshold value is obtained; otherwise, obtaining the judgment result that the consumption amount exceeds the amount threshold value.
S1312, if the consumption amount does not exceed the amount threshold, obtaining a judgment result that the payment request information meets the supervision rule; s1313, if the consumption amount exceeds the amount threshold, obtaining a judgment result that the payment request information does not meet the supervision rule.
If the consumption amount does not exceed the amount threshold, obtaining the judgment result that the payment request information meets the supervision rule, and then continuing to execute the subsequent steps, namely continuing to execute the step S140; and if the consumption amount exceeds the amount threshold, obtaining a judgment result that the payment request information does not meet the supervision rule.
S1320, if the payment request information does not meet the supervision rule, feeding back a prompt message of payment failure to the client.
If the payment request information does not meet the supervision rule, the prompt information of payment failure can be fed back to the client, and at the moment, the management server does not settle the payment request information, so that the client cannot consume the payment request information.
And S140, if the login duration meets the supervision rule, intercepting the voice fragment from the voice message sent by the client according to the login duration and a preset interception period.
And if the login duration meets the supervision rule, intercepting the voice message sent by the client according to the login duration and a preset interception period to obtain a voice fragment. When the client uses the client, the client sends voice information to the management server, the management server obtains the voice information and transmits the voice information to other clients so as to conduct the voice information among the clients and realize real-time voice communication, and then the management server can intercept and obtain corresponding voice fragments from the voice information sent by the client according to the login duration and the preset interception period of the logged-in client.
In an embodiment, as shown in fig. 4, step S140 includes sub-steps S141 and S142.
And S141, determining a corresponding intercepting time period according to the login duration and a preset intercepting period.
And determining a corresponding intercepting time period according to the login time length and a preset intercepting period, wherein for example, if the intercepting period is 10 minutes and the intercepting time length is 10 seconds, the intercepting time period is determined to be 9m50s-10m0s of the login time length of the user.
S142, intercepting the corresponding voice segment from the voice message according to the intercepting time segment.
The corresponding voice segment can be intercepted from the voice information input by the client according to the intercepting time period, and the duration of the voice segment is 10 seconds. In addition, the average loudness of the intercepted voice segments can be judged, if the average loudness of the voice segments does not exceed a preset loudness threshold, a next voice segment is intercepted again from the voice information input by the client, and if the next intercepting time period is determined to be 10m05s-10m15s of the login time length of the user at this time, the next voice segment is correspondingly intercepted; otherwise, executing the subsequent steps to process the voice segment.
S150, recognizing the voice segments according to a preset voice recognition model to obtain corresponding recognition results.
And recognizing the voice segments according to a preset voice recognition model to obtain a corresponding recognition result. The voice recognition model comprises a spectrum conversion rule, a frequency conversion formula, an inverse transformation rule and a voice recognition neural network. The voice segment comprises a sentence expressed by a voice of a client, the voice segment can be identified through the voice identification model, the identification result is the result obtained by identifying the characteristics in the voice segment, and the identification result comprises gender type information and age classification information.
In one embodiment, as shown in FIG. 5, step S150 includes sub-steps S151, S152, S153, S154, and S155.
And S151, performing framing processing on the voice segments to obtain corresponding multi-frame audio information.
The voice is represented in the computer by a spectrogram containing an audio track, the spectrogram contains a plurality of frames, each frame corresponds to one time unit, and then each frame of audio information can be obtained from the spectrogram of the voice fragment, and each frame of audio information corresponds to the audio information contained in one time unit.
S152, converting the audio information contained in each unit time into a corresponding audio frequency spectrum according to a preset unit time and the frequency spectrum conversion rule.
The audio information can be segmented according to unit time to obtain a plurality of audio information segments, each audio information segment corresponds to multi-frame audio information contained in the unit time, Fast Fourier Transform (FFT) can be performed on each obtained audio information segment according to a spectrum conversion rule, and then the obtained audio information segment rotates 90 degrees counterclockwise to obtain an audio spectrum corresponding to each audio information segment, and the frequency spectrum in the audio spectrum represents the relationship between frequency and energy. For example, the unit time may be set to 0.02 seconds.
And S153, converting each audio frequency spectrum into a corresponding nonlinear audio frequency spectrum according to the frequency conversion formula.
The audio spectrum represented in a linear manner is converted into a non-linear audio spectrum according to a frequency conversion formula, and in order to further highlight the sound features in the speech segment, the audio spectrum represented in a linear manner can be converted into a non-linear audio spectrum. Both the audio spectrum and the nonlinear audio spectrum can be represented by a spectral curve, and the spectral curve is composed of a plurality of continuous spectral values.
Specifically, the frequency conversion formula can be represented by formula (1):
mel(f)=r×log(1+f/t) (1);
wherein mel (f) is a frequency spectrum value of the converted nonlinear audio frequency spectrum, f is a frequency value of the audio frequency, and r and t are parameter values preset in a formula.
And S154, inversely transforming each nonlinear audio frequency spectrum according to the inverse transformation rule to obtain a plurality of audio coefficients corresponding to each nonlinear audio frequency spectrum as the audio characteristic information of the voice segment.
Each nonlinear audio frequency spectrum can be inversely transformed according to an inverse transformation rule, specifically, logarithm of one obtained nonlinear audio frequency spectrum is taken and then Discrete Cosine Transform (DCT) is performed, 2 nd to 12 th coefficients subjected to Discrete Cosine Transform are taken and combined to obtain an audio coefficient corresponding to the nonlinear audio frequency spectrum, 11-dimensional audio coefficients can be correspondingly obtained from each nonlinear audio frequency spectrum, and the audio coefficient corresponding to each nonlinear audio frequency spectrum is obtained, so that audio characteristic information corresponding to a voice segment can be obtained.
And S155, inputting the audio characteristic information into the voice recognition neural network for recognition to obtain a corresponding recognition result.
And inputting the audio characteristic information corresponding to the voice segment into a voice recognition neural network for recognition, so as to obtain a corresponding recognition result. The speech recognition neural network is a neural network for recognizing the audio characteristic information, and specifically, the speech recognition neural network can be composed of an input layer, a plurality of intermediate layers and an output layer, the input layer and the intermediate layers, the intermediate layers and other intermediate layers and the output layer are all connected through correlation formulas, the number of input nodes contained in the input layer is equal to the number of audio coefficients contained in the audio characteristic information, each audio coefficient can be used as an input node value of a corresponding input node, the output layer can contain a plurality of output nodes, each output node can correspond to a gender type or an age classification, the obtained audio characteristic information is input into the speech recognition neural network through the input layer, after recognition is carried out, a corresponding output result can be obtained from the output layer, and the output result contains an output node value of each output node, acquiring the gender type of the output node of the largest output node value in the output node values corresponding to the gender type as gender type information, wherein the gender type can comprise a male type and a female type; the age classification of the output node of the largest output node value among the output node values corresponding to the age classification is obtained as age classification information, and if the age classification includes four categories, namely children (0-8 years old), teenagers (9-14 years old), teenagers (15-17 years old) and adults (18 years old and older), the gender type information and the age classification information are obtained, and then the corresponding recognition result can be obtained.
S160, obtaining the client registration information corresponding to the logged-in client in the registration information table, and verifying whether the identification result is consistent with the client registration information.
And acquiring the client registration information corresponding to the logged-in client in the registration information table, and verifying whether the identification result is consistent with the client registration information. Wherein, the identification result comprises gender type information and age classification information. The client registration information matched with the logged-in client in the registration information table can be acquired, and if the client registration information contains personal information of the gender, age and the like of the client, whether the identification result is consistent with the client registration information can be judged.
In the actual application process, target audio characteristic information corresponding to the logged-in client can be obtained from the registration information table, the target audio characteristic information is characteristic information which is extracted from a section of voice information input by the client during registration and is matched with the client, and whether the obtained audio characteristic information is matched with the target audio characteristic information or not can be verified. After the identification result is verified to be consistent with the registration information, performing supplementary verification on whether the audio characteristic information is matched with the target audio characteristic information to enhance the reliability of verification, and if the audio characteristic information is matched with the target audio characteristic information, returning to the step of executing the supervision rule for judging whether the login duration meets the requirement matched with the logged-in client; and if the audio characteristic information is not matched with the target audio characteristic information, feeding back prompt information for forcibly logging out to the client. The specific step of verifying whether the audio characteristic information is matched with the target audio characteristic information may be to obtain an absolute value of a difference between a numerical value of each dimension in the audio characteristic information and a numerical value of the same dimension of the target audio characteristic information, divide the absolute value of the difference by a numerical value of a corresponding dimension in the target audio characteristic information to obtain a difference value of each dimension, accumulate the difference values to obtain an overall difference value between the audio characteristic information and the target audio characteristic information, determine whether the overall difference value is not greater than a preset difference threshold, verify that the audio characteristic information is matched with the target audio characteristic information if the overall difference value is not greater than the difference threshold, or verify that the audio characteristic information is not matched with the target audio characteristic information.
In one embodiment, as shown in fig. 6, step S160 includes sub-steps S161, S162, S163, and S164.
S161, judging whether the gender in the customer registration information is the same as the gender type information; s162, if the gender in the customer registration information is the same as the gender type information, judging whether the age in the customer registration information is consistent with the age classification information; and S163, if the age in the client registration information is consistent with the age classification information, verifying that the identification result is consistent with the client registration information.
Whether the gender in the client registration information is the same as the gender type information in the identification result can be judged, if so, whether the age in the client registration information is consistent with the age classification information in the identification result is continuously judged, namely, whether the age in the client registration information belongs to the age range corresponding to the age classification information is judged, and if the age is consistent with the age classification information, the identification result is verified to be consistent with the client registration information.
S164, if the gender in the customer registration information is not the same as the gender type information or the age in the customer registration information is not consistent with the age classification information, verifying that the identification result is not consistent with the customer registration information.
And if the gender in the client registration information is not the same as the gender type information or the age in the client registration information is not consistent with the age classification information, verifying that the obtained identification result is not consistent with the client registration information.
S170, if the identification result is consistent with the client registration information, returning to the step of judging whether the login duration meets the supervision rule matched with the logged-in client or not; and S180, if the identification result is not consistent with the client registration information or the login duration does not meet the supervision rule, feeding back prompt information for forcibly quitting the login to the client.
If the identification result is consistent with the client registration information, returning to the step of judging whether the login duration meets the supervision rule matched with the logged-in client, namely returning to the step of S130; if the login duration does not meet the supervision rule, prompt information for forcibly quitting the login can be fed back to the client; if the identification result is not consistent with the client registration information, it indicates that the user using the client may not be consistent with the logged-in client, and at this time, prompt information for forced log-out may also be fed back to the client, and the application program in the client logs out of the application function interface after receiving the prompt information for forced log-out, and at this time, the client cannot continue to use the corresponding function of the application program.
In the login client monitoring method based on voice recognition provided by the embodiment of the invention, a login request sent by a client is verified, if the verification is passed through recording the login duration of the current login client, whether the login duration meets the corresponding monitoring rule is judged, if the login duration meets the monitoring rule, a voice segment is intercepted from the voice information sent by the client and is input into a voice recognition model for recognition to obtain a recognition result, whether the recognition result is consistent with the client registration information of the logged-in client is judged, if so, the judgment is returned to judge whether the login duration meets the corresponding monitoring rule, and if not, prompt information for forced logout is fed back. By the method, the corresponding recognition result can be obtained based on the voice information input by the client, and whether the recognition result is consistent with the client registration information or not is verified, so that whether the actual user is matched with the login client or not is verified, the login client is effectively supervised, and the supervision reliability is greatly improved.
The embodiment of the present invention further provides a login client monitoring apparatus 100 based on voice recognition, which is configured to execute any one of the embodiments of the aforementioned login client monitoring method based on voice recognition. Specifically, referring to fig. 9, fig. 9 is a schematic block diagram of a login client monitoring apparatus based on voice recognition according to an embodiment of the present invention.
As shown in fig. 9, the login customer supervision device 100 based on voice recognition includes a login request authentication unit 110, a login prompt information feedback unit 120, a login duration determination unit 130, a voice fragment intercepting unit 140, a voice recognition result obtaining unit 150, a recognition result authentication unit 160, a return execution unit 170, and an logout prompt information feedback unit 180.
A login request verification unit 110, configured to verify whether the login request passes a pre-stored registration information table if the login request sent by the client is received;
and a login prompt information feedback unit 120, configured to, if the login request passes the verification, take the client corresponding to the login request as a logged-in client, record login duration of the logged-in client, and feed back prompt information indicating that the login is successful to the client.
A login duration determining unit 130, configured to determine whether the login duration meets a supervision rule matching the logged-in client.
In an embodiment, the login duration determining unit 130 includes sub-units: the supervision rule obtaining unit is used for obtaining a rule matched with the current time and the logged-in client from a prestored rule base to be used as a supervision rule; and the judging unit is used for judging whether the login time length exceeds a time length threshold value in the supervision rule so as to obtain a judgment result whether the login time length meets the supervision rule.
In an embodiment, the voice recognition based log-in customer supervision device 100 further comprises sub-units: the payment request information judging unit is used for judging whether the payment request information meets the supervision rule or not if the payment request information sent by the client is received; and the payment failure prompt information feedback unit is used for feeding back prompt information of payment failure to the client side if the payment request information does not meet the supervision rule.
In one embodiment, the payment request information determining unit includes a sub-unit: the consumption amount judging unit is used for judging whether the consumption amount in the payment request information exceeds an amount threshold value in the supervision rule or not; the first judgment result acquisition unit is used for acquiring a judgment result that the payment request information meets the supervision rule if the consumption amount does not exceed the amount threshold; and the second judgment result acquisition unit is used for acquiring a judgment result that the payment request information does not meet the supervision rule if the consumption amount exceeds the amount threshold.
And a voice fragment intercepting unit 140, configured to intercept, if the login duration meets the supervision rule, a voice fragment from the voice information sent by the client according to the login duration and a preset intercepting period.
In one embodiment, the voice fragment intercepting unit 140 includes sub-units: an interception time period obtaining unit, configured to determine a corresponding interception time period according to the login duration and a preset interception period; and the voice fragment acquisition unit is used for intercepting the corresponding voice fragment from the voice information according to the intercepting time period.
And the voice recognition result obtaining unit 150 is configured to recognize the voice segment according to a preset voice recognition model to obtain a corresponding recognition result.
In one embodiment, the speech recognition result obtaining unit 150 includes sub-units: the voice segment framing unit is used for framing the voice segments to obtain corresponding multi-frame audio information; the audio frequency spectrum acquisition unit is used for converting the audio information contained in each unit time into a corresponding audio frequency spectrum according to a preset unit time and the frequency spectrum conversion rule; the audio frequency spectrum conversion unit is used for converting each audio frequency spectrum into a corresponding nonlinear audio frequency spectrum according to the frequency conversion formula; an audio characteristic information obtaining unit, configured to perform inverse transformation on each nonlinear audio frequency spectrum according to the inverse transformation rule to obtain a plurality of audio coefficients corresponding to each nonlinear audio frequency spectrum as audio characteristic information of the voice segment; and the recognition unit is used for inputting the audio characteristic information into the voice recognition neural network for recognition so as to obtain a corresponding recognition result.
An identification result verification unit 160, configured to acquire the client registration information corresponding to the logged-in client in the registration information table, and verify whether the identification result is consistent with the client registration information.
In one embodiment, the identification result verification unit 160 includes sub-units: a gender judging unit, configured to judge whether a gender in the customer registration information is the same as the gender type information; an age judging unit, configured to judge whether the age in the client registration information is consistent with the age classification information if the gender in the client registration information is the same as the gender type information; a first verification result obtaining unit, configured to, if the age in the client registration information is consistent with the age classification information, verify that the identification result is consistent with the client registration information; and the second verification result acquisition unit is used for verifying that the identification result is not consistent with the client registration information if the gender in the client registration information is not the same as the gender type information or the age in the client registration information is not consistent with the age classification information.
And a return execution unit 170, configured to, if the identification result is consistent with the client registration information, return to the step of determining whether the login duration meets a supervision rule matched with the logged-in client.
And the log-out prompt information feedback unit 180 is configured to feed back prompt information for forcing log-out to the client if the identification result is not consistent with the client registration information or the log-in duration does not satisfy the supervision rule.
The login client monitoring device based on voice recognition provided by the embodiment of the invention is applied to the login client monitoring method based on voice recognition, the login request sent by the client is verified, if the verification is passed through recording the login duration of the current login client, whether the login duration meets the corresponding monitoring rule is judged, if the verification is met, a voice fragment is intercepted from the voice information sent by the client, a voice recognition model is input for recognition to obtain a recognition result, whether the recognition result is consistent with the client registration information of the logged-in client is judged, if the recognition result is consistent, whether the login duration meets the corresponding monitoring rule is returned to judge, and if the recognition result is not consistent, prompt information for forcibly logging out is fed back. By the method, the corresponding recognition result can be obtained based on the voice information input by the client, and whether the recognition result is consistent with the client registration information or not is verified, so that whether the actual user is matched with the login client or not is verified, the login client is effectively supervised, and the supervision reliability is greatly improved.
The above-described login customer supervision means based on speech recognition may be implemented in the form of a computer program which may be run on a computer device as shown in fig. 10.
Referring to fig. 10, fig. 10 is a schematic block diagram of a computer device according to an embodiment of the present invention. The computer device may be a management server 10 for performing a voice recognition based log-on client supervision method for real-time supervision of a log-on client.
Referring to fig. 10, the computer device 500 includes a processor 502, memory, and a network interface 505 connected by a system bus 501, where the memory may include a storage medium 503 and an internal memory 504.
The storage medium 503 may store an operating system 5031 and a computer program 5032. The computer program 5032, when executed, may cause the processor 502 to perform a voice recognition based log-in customer supervision method, wherein the storage medium 503 may be a volatile storage medium or a non-volatile storage medium.
The processor 502 is used to provide computing and control capabilities that support the operation of the overall computer device 500.
The internal memory 504 provides an environment for the operation of the computer program 5032 in the storage medium 503, and when the computer program 5032 is executed by the processor 502, the processor 502 can be enabled to execute a login client supervision method based on voice recognition.
The network interface 505 is used for network communication, such as providing transmission of data information. Those skilled in the art will appreciate that the configuration shown in fig. 10 is a block diagram of only a portion of the configuration associated with aspects of the present invention and is not intended to limit the computing device 500 to which aspects of the present invention may be applied, and that a particular computing device 500 may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
The processor 502 is configured to run a computer program 5032 stored in the memory to implement the corresponding functions in the above-mentioned login client supervision method based on voice recognition.
Those skilled in the art will appreciate that the embodiment of a computer device illustrated in fig. 10 does not constitute a limitation on the specific construction of the computer device, and that in other embodiments a computer device may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components. For example, in some embodiments, the computer device may only include a memory and a processor, and in such embodiments, the structures and functions of the memory and the processor are consistent with those of the embodiment shown in fig. 10, and are not described herein again.
It should be understood that, in the embodiment of the present invention, the Processor 502 may be a Central Processing Unit (CPU), and the Processor 502 may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, etc. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
In another embodiment of the invention, a computer-readable storage medium is provided. The computer readable storage medium may be a volatile or non-volatile computer readable storage medium. The computer-readable storage medium stores a computer program which, when executed by a processor, implements the above-described method of log-in client supervision based on speech recognition.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses, devices and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided by the present invention, it should be understood that the disclosed apparatus, device and method can be implemented in other ways. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only a logical division, and there may be other divisions when the actual implementation is performed, or units having the same function may be grouped into one unit, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present invention.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention essentially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product stored in a computer-readable storage medium, which includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned computer-readable storage media comprise: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk, or an optical disk.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A login client supervision method based on voice recognition is applied to a management server, the management server and a client transmit data information through network connection, and the method is characterized by comprising the following steps:
if a login request sent by the client is received, verifying whether the login request passes the pre-stored registration information table;
if the login request passes the verification, taking the client corresponding to the login request as a logged-in client, recording the login duration of the logged-in client and feeding back prompt information of successful login to the client;
judging whether the login duration meets a supervision rule matched with the logged-in client or not;
if the login duration meets the supervision rule, intercepting the voice message sent by the client according to the login duration and a preset interception period to obtain a voice fragment;
recognizing the voice segments according to a preset voice recognition model to obtain corresponding recognition results;
acquiring client registration information corresponding to the logged-in client in the registration information table, and verifying whether the identification result is consistent with the client registration information;
if the identification result is consistent with the client registration information, returning to the step of judging whether the login duration meets the supervision rule matched with the logged-in client or not;
and if the identification result is not consistent with the client registration information or the login duration does not meet the supervision rule, feeding back prompt information for forcibly quitting the login to the client.
2. The method of claim 1, wherein the determining whether the login duration satisfies a supervision rule matching the logged-in client comprises:
acquiring a rule matched with the current time and the logged-in client from a prestored rule base as a supervision rule;
and judging whether the login time length exceeds a time length threshold value in the supervision rule or not to obtain a judgment result whether the login time length meets the supervision rule or not.
3. The method as claimed in claim 1, wherein the intercepting a voice segment from the voice message sent from the client according to the login duration and a preset intercepting period comprises:
determining a corresponding interception time period according to the login time length and a preset interception period;
and intercepting the corresponding voice segment from the voice message according to the intercepting time period.
4. The method as claimed in claim 1, wherein the voice recognition model includes a spectrum transformation rule, a frequency transformation formula, an inverse transformation rule and a voice recognition neural network, and the recognizing the voice segment according to the preset voice recognition model to obtain a corresponding recognition result includes:
performing framing processing on the voice segments to obtain corresponding multi-frame audio information;
converting the audio information contained in each unit time into a corresponding audio frequency spectrum according to a preset unit time and the frequency spectrum conversion rule;
converting each audio frequency spectrum into a corresponding nonlinear audio frequency spectrum according to the frequency conversion formula;
carrying out inverse transformation on each nonlinear audio frequency spectrum according to the inverse transformation rule to obtain a plurality of audio coefficients corresponding to each nonlinear audio frequency spectrum as audio characteristic information of the voice segment;
and inputting the audio characteristic information into the voice recognition neural network for recognition to obtain a corresponding recognition result.
5. The method as claimed in claim 1, wherein said identification result includes gender type information and age classification information, and said verifying whether said identification result is consistent with said customer registration information comprises:
judging whether the gender in the customer registration information is the same as the gender type information;
if the gender in the customer registration information is the same as the gender type information, judging whether the age in the customer registration information is consistent with the age classification information;
if the age in the client registration information is consistent with the age classification information, verifying that the identification result is consistent with the client registration information;
and if the gender in the customer registration information is not the same as the gender type information or the age in the customer registration information is not consistent with the age classification information, verifying that the identification result is not consistent with the customer registration information.
6. The method as claimed in claim 1, wherein after determining whether the login duration satisfies a supervision rule matching the logged-in client, the method further comprises:
if receiving payment request information sent by a client, judging whether the payment request information meets the supervision rule;
and if the payment request information does not meet the supervision rule, feeding back prompt information of payment failure to the client.
7. The method of claim 6, wherein said determining whether said payment request information satisfies said rules comprises:
judging whether the consumption amount in the payment request information exceeds an amount threshold value in the supervision rule or not;
if the consumption amount does not exceed the amount threshold, obtaining a judgment result that the payment request information meets the supervision rule;
and if the consumption amount exceeds the amount threshold value, obtaining a judgment result that the payment request information does not meet the supervision rule.
8. A login customer supervision device based on voice recognition is characterized in that the login customer supervision device based on voice recognition comprises;
the login request verification unit is used for verifying whether the login request passes the pre-stored registration information table or not according to the received login request sent by the client;
a login prompt information feedback unit, configured to, if the login request passes verification, take the client corresponding to the login request as a logged-in client, record login duration of the logged-in client, and feed back prompt information indicating that login is successful to the client;
the login duration judging unit is used for judging whether the login duration meets a supervision rule matched with the logged-in client or not;
a voice fragment intercepting unit, configured to intercept, if the login duration meets the supervision rule, a voice fragment from the voice information sent by the client according to the login duration and a preset interception period;
the voice recognition result acquisition unit is used for recognizing the voice segments according to a preset voice recognition model to obtain corresponding recognition results;
an identification result verification unit configured to acquire client registration information corresponding to the logged-in client in the registration information table, and verify whether the identification result is consistent with the client registration information;
a return execution unit, configured to return to execute the step of determining whether the login duration satisfies a supervision rule matching the logged-in client if the identification result is consistent with the client registration information;
and the log-out prompt information feedback unit is used for feeding back prompt information for forcibly logging out to the client if the identification result is not consistent with the client registration information or the log-in duration does not meet the supervision rule.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor executing the computer program to implement a voice recognition based log-on customer supervision method according to any of claims 1 to 7.
10. A computer-readable storage medium, characterized in that it stores a computer program which, when executed by a processor, implements a voice recognition based log-on customer supervision method according to any of claims 1 to 7.
CN202110473944.0A 2021-04-29 2021-04-29 Login client supervision method, device, equipment and medium based on voice recognition Pending CN113225327A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110473944.0A CN113225327A (en) 2021-04-29 2021-04-29 Login client supervision method, device, equipment and medium based on voice recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110473944.0A CN113225327A (en) 2021-04-29 2021-04-29 Login client supervision method, device, equipment and medium based on voice recognition

Publications (1)

Publication Number Publication Date
CN113225327A true CN113225327A (en) 2021-08-06

Family

ID=77090180

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110473944.0A Pending CN113225327A (en) 2021-04-29 2021-04-29 Login client supervision method, device, equipment and medium based on voice recognition

Country Status (1)

Country Link
CN (1) CN113225327A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115518389A (en) * 2021-10-30 2022-12-27 深圳小悠娱乐科技有限公司 Game real-name authentication system based on voice recognition technology

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1852560A (en) * 2005-07-22 2006-10-25 华为技术有限公司 Subscriber identy identifying method and calling control method and system
US20090055915A1 (en) * 2007-06-01 2009-02-26 Piliouras Teresa C Systems and methods for universal enhanced log-in, identity document verification, and dedicated survey participation
CN102780819A (en) * 2012-07-27 2012-11-14 广东欧珀移动通信有限公司 Method of voice recognition of contact for mobile terminal
CN104078045A (en) * 2013-03-26 2014-10-01 联想(北京)有限公司 Identifying method and electronic device
WO2015096429A1 (en) * 2013-12-25 2015-07-02 中兴通讯股份有限公司 Call voice recognition method and apparatus
CN105120068A (en) * 2015-07-16 2015-12-02 百度在线网络技术(北京)有限公司 Voice communication answering method and device
CN105138879A (en) * 2015-07-31 2015-12-09 北京旷视科技有限公司 Method and device for controlling use permission of software
CN106161397A (en) * 2015-04-21 2016-11-23 富泰华工业(深圳)有限公司 There is the electronic installation of Anti-addiction function, Anti-addiction management system and method
WO2018120241A1 (en) * 2016-12-30 2018-07-05 华为技术有限公司 Method for identifying identity of call object, and terminal device
CN108429816A (en) * 2018-03-27 2018-08-21 百度在线网络技术(北京)有限公司 Method and apparatus for generating information
CN108537017A (en) * 2018-01-05 2018-09-14 上海连尚网络科技有限公司 A kind of method and apparatus for managing game user
CN110096859A (en) * 2019-03-14 2019-08-06 深圳壹账通智能科技有限公司 User authentication method, device, computer equipment and computer readable storage medium
CN110309664A (en) * 2019-07-05 2019-10-08 北京贝思科技术有限公司 User's license control method and system
CN110442394A (en) * 2019-07-23 2019-11-12 维沃移动通信有限公司 A kind of application control method and mobile terminal
CN112084483A (en) * 2019-06-14 2020-12-15 腾讯科技(深圳)有限公司 Application locking and unlocking method, device, equipment and storage medium
CN112370792A (en) * 2020-11-13 2021-02-19 腾讯科技(深圳)有限公司 Anti-addiction method, device, server and storage medium

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1852560A (en) * 2005-07-22 2006-10-25 华为技术有限公司 Subscriber identy identifying method and calling control method and system
US20090055915A1 (en) * 2007-06-01 2009-02-26 Piliouras Teresa C Systems and methods for universal enhanced log-in, identity document verification, and dedicated survey participation
CN102780819A (en) * 2012-07-27 2012-11-14 广东欧珀移动通信有限公司 Method of voice recognition of contact for mobile terminal
CN104078045A (en) * 2013-03-26 2014-10-01 联想(北京)有限公司 Identifying method and electronic device
WO2015096429A1 (en) * 2013-12-25 2015-07-02 中兴通讯股份有限公司 Call voice recognition method and apparatus
CN106161397A (en) * 2015-04-21 2016-11-23 富泰华工业(深圳)有限公司 There is the electronic installation of Anti-addiction function, Anti-addiction management system and method
CN105120068A (en) * 2015-07-16 2015-12-02 百度在线网络技术(北京)有限公司 Voice communication answering method and device
CN105138879A (en) * 2015-07-31 2015-12-09 北京旷视科技有限公司 Method and device for controlling use permission of software
WO2018120241A1 (en) * 2016-12-30 2018-07-05 华为技术有限公司 Method for identifying identity of call object, and terminal device
CN108537017A (en) * 2018-01-05 2018-09-14 上海连尚网络科技有限公司 A kind of method and apparatus for managing game user
CN108429816A (en) * 2018-03-27 2018-08-21 百度在线网络技术(北京)有限公司 Method and apparatus for generating information
CN110096859A (en) * 2019-03-14 2019-08-06 深圳壹账通智能科技有限公司 User authentication method, device, computer equipment and computer readable storage medium
CN112084483A (en) * 2019-06-14 2020-12-15 腾讯科技(深圳)有限公司 Application locking and unlocking method, device, equipment and storage medium
CN110309664A (en) * 2019-07-05 2019-10-08 北京贝思科技术有限公司 User's license control method and system
CN110442394A (en) * 2019-07-23 2019-11-12 维沃移动通信有限公司 A kind of application control method and mobile terminal
CN112370792A (en) * 2020-11-13 2021-02-19 腾讯科技(深圳)有限公司 Anti-addiction method, device, server and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王昆翔: "《智能理论与警用智能技术》", 31 May 2009 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115518389A (en) * 2021-10-30 2022-12-27 深圳小悠娱乐科技有限公司 Game real-name authentication system based on voice recognition technology

Similar Documents

Publication Publication Date Title
NL2024003B1 (en) Method and computing device for identifying suspicious users in message exchange systems
US11431703B2 (en) Identity challenges
US9876825B2 (en) Monitoring user authenticity
CN108512827B (en) Method, device, equipment and storage medium for establishing abnormal login identification and supervised learning model
US11233896B2 (en) Systems and methods for detecting inmate to inmate conference calls
EP2817601B1 (en) System and method for speaker recognition on mobile devices
WO2019019743A1 (en) Information auditing method and apparatus, electronic device and computer readable storage medium
EP3211825B1 (en) Trusted terminal verification method and apparatus
CN112714093B (en) Account abnormity detection method, device, system and storage medium
US11245791B2 (en) Detecting robocalls using biometric voice fingerprints
US11968313B2 (en) Generating a legally binding object within a group-based communication system
US9818060B2 (en) System and method for generation of a heuristic
US20180137149A1 (en) De-identification data generation apparatus, method, and non-transitory computer readable storage medium thereof
US10949153B2 (en) Methods and systems for facilitating the generation of a customized response based on a context
CN113225327A (en) Login client supervision method, device, equipment and medium based on voice recognition
CN112132996A (en) Door lock control method, mobile terminal, door control terminal and storage medium
US11694693B2 (en) Methods and systems for processing audio signals containing speech data
US20240031381A1 (en) Systems and methods for facilitating detection of a security event associated with an iot device
CN105610841B (en) User information authentication method based on traceability
US11822636B1 (en) Biometric keystroke attribution
CN116561737A (en) Password validity detection method based on user behavior base line and related equipment thereof
US11568038B1 (en) Threshold-based authentication
CN111865941A (en) Abnormal behavior identification method and device
US20200311226A1 (en) Methods, systems, apparatuses and devices for facilitating secure publishing of a digital content
US11960584B2 (en) Fraud detection in voice biometric systems through voice print clustering

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210806