CN107864121A - User ID authentication method and application server - Google Patents

User ID authentication method and application server Download PDF

Info

Publication number
CN107864121A
CN107864121A CN201710914890.0A CN201710914890A CN107864121A CN 107864121 A CN107864121 A CN 107864121A CN 201710914890 A CN201710914890 A CN 201710914890A CN 107864121 A CN107864121 A CN 107864121A
Authority
CN
China
Prior art keywords
user
authentication
vocal print
threshold value
predetermined threshold
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710914890.0A
Other languages
Chinese (zh)
Inventor
刘中原
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Financial Technology Co Ltd Shanghai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Financial Technology Co Ltd Shanghai filed Critical OneConnect Financial Technology Co Ltd Shanghai
Priority to CN201710914890.0A priority Critical patent/CN107864121A/en
Publication of CN107864121A publication Critical patent/CN107864121A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Biomedical Technology (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses a kind of user ID authentication method, this method includes:Vocal print pretreatment and feature extraction are carried out by voice acquisition device, obtain the vocal print feature data of user;Obtain sound-groove model corresponding to the user;The vocal print feature data extracted are contrasted with the acquired sound-groove model, obtain confidence score;The authentication result of the user is judged according to the confidence score and predetermined threshold value.The present invention also provides a kind of application server and computer-readable recording medium.User ID authentication method, application server and computer-readable recording medium provided by the invention can sentence checking user identity based on sound groove recognition technology in e, so as to effectively reduce risk.

Description

User ID authentication method and application server
Technical field
The present invention relates to data analysis technique field, more particularly to a kind of user ID authentication method and application server.
Background technology
Authenticating user identification is always a continuation risk in the internet finance epoch, online loan application, is threatened Transaction security.The identity identifying technologies such as static password, dynamic password, digital certificate in traditional loan application are different degrees of In the presence of the risk being broken, risk can not also be excluded completely based on traditional identity identifying method.
Present mobile phone terminal often carries out subscriber authentication with the mode of recognition of face, but recognition of face be easy at PC ends by Break through, greater risk be present.Therefore other are needed more to be applicable with the mode of safety to carry out consumer's risk checking.
The content of the invention
In view of this, the present invention proposes a kind of user ID authentication method and application server, to solve how effectively to drop The problem of low identity risk.
First, to achieve the above object, the present invention proposes a kind of user ID authentication method, and the method comprising the steps of:
Vocal print pretreatment and feature extraction are carried out by voice acquisition device, obtain the vocal print feature data of user;
Obtain sound-groove model corresponding to the user;
The vocal print feature data extracted are contrasted with the acquired sound-groove model, obtain confidence level Score;And
The authentication result of the user is judged according to the confidence score and predetermined threshold value.
Alternatively, this method also includes step before the step of obtaining sound-groove model corresponding to the user:
Vocal print In vivo detection is carried out to the vocal print feature data extracted;
When detection passes through, described the step of obtaining sound-groove model corresponding to the user is performed;
When detection not by when, immediately arrive at the result of subscriber authentication failure.
Alternatively, this method also includes step:
The predetermined threshold value is improved by continuous regression test.
Alternatively, the step of the authentication result that the user is judged according to the confidence score and predetermined threshold value Suddenly specifically include:
When the confidence score is more than or equal to the predetermined threshold value, the authentication result of the user is judged to test Card passes through;
When the confidence score is less than the predetermined threshold value, judge that the authentication result of the user is lost for checking Lose.
Alternatively, described the step of improving the predetermined threshold value by continuous regression test, specifically includes:
When authentication times corresponding to the user reach preset times, according to multiple authentication result and reality Situation carries out regression test, reversely judges the reasonability of the predetermined threshold value.
In addition, to achieve the above object, the present invention also provides a kind of application server, including memory, processor, described The subscriber identity authentication system that can be run on the processor is stored with memory, the subscriber identity authentication system is by institute Following steps are realized when stating computing device:
Vocal print pretreatment and feature extraction are carried out by voice acquisition device, obtain the vocal print feature data of user;
Obtain sound-groove model corresponding to the user;
The vocal print feature data extracted are contrasted with the acquired sound-groove model, obtain confidence level Score;And
The authentication result of the user is judged according to the confidence score and predetermined threshold value.
Alternatively, the subscriber identity authentication system by the computing device when also realize step:
Vocal print In vivo detection is carried out to the vocal print feature data extracted;
When detection passes through, described the step of obtaining sound-groove model corresponding to the user is performed;
When detection not by when, immediately arrive at the result of subscriber authentication failure.
Alternatively, the subscriber identity authentication system by the computing device when also realize step:
The predetermined threshold value is improved by continuous regression test.
Alternatively, the step of the authentication result that the user is judged according to the confidence score and predetermined threshold value Suddenly specifically include:
When the confidence score is more than or equal to the predetermined threshold value, the authentication result of the user is judged to test Card passes through;
When the confidence score is less than the predetermined threshold value, judge that the authentication result of the user is lost for checking Lose.
Further, to achieve the above object, the present invention also provides a kind of computer-readable recording medium, the computer Readable storage medium storing program for executing is stored with subscriber identity authentication system, and the subscriber identity authentication system can be held by least one processor OK, so that the step of at least one computing device user ID authentication method described above.
Compared to prior art, user ID authentication method proposed by the invention, application server and computer-readable Storage medium, it can be gathered by voice acquisition device and pre-process to obtain user's vocal print feature data, and it is corresponding with the user Credit passport in sound-groove model contrasted, according to comparing result and predetermined threshold value judge the user authentication whether By so as to effectively reduce risk.Furthermore it is also possible to regression test is carried out according to multiple authentication result and actual state, The reasonability of the predetermined threshold value is reversely judged, so as to adjust and improve the value of the predetermined threshold value.
Brief description of the drawings
Fig. 1 is each optional application environment schematic diagram of embodiment one of the present invention;
Fig. 2 is the schematic diagram of one optional hardware structure of application server in Fig. 1;
Fig. 3 is the program module schematic diagram of subscriber identity authentication system first embodiment of the present invention;
Fig. 4 is the program module schematic diagram of subscriber identity authentication system second embodiment of the present invention;
Fig. 5 is the program module schematic diagram of subscriber identity authentication system 3rd embodiment of the present invention;
Fig. 6 is the schematic flow sheet of user ID authentication method first embodiment of the present invention;
Fig. 7 is the schematic flow sheet of user ID authentication method second embodiment of the present invention;
Fig. 8 is the schematic flow sheet of user ID authentication method 3rd embodiment of the present invention.
Reference:
Voice acquisition device 1
Application server 2
Network 3
Memory 11
Processor 12
Network interface 13
Subscriber identity authentication system 200
Extraction module 201
Acquisition module 202
Contrast module 203
Judge module 204
Detection module 205
Regression block 206
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the present invention, not For limiting the present invention.Based on the embodiment in the present invention, those of ordinary skill in the art are not before creative work is made The every other embodiment obtained is put, belongs to the scope of protection of the invention.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is only used for describing purpose, and can not It is interpreted as indicating or implies its relative importance or imply the quantity of the technical characteristic indicated by indicating.Thus, define " the One ", at least one this feature can be expressed or be implicitly included to the feature of " second ".In addition, the skill between each embodiment Art scheme can be combined with each other, but must can be implemented as basis with those of ordinary skill in the art, when technical scheme With reference to occurring conflicting or will be understood that the combination of this technical scheme is not present when can not realize, also not in application claims Protection domain within.
As shown in fig.1, it is each optional application environment schematic diagram of embodiment one of the present invention.
In the present embodiment, present invention can apply to include but not limited to, voice acquisition device 1, application server 2, In the application environment of network 3.Wherein, the voice acquisition device 1 can be the electronic equipment of individual subscriber, such as computer, hand Machine or bank carry out terminal device of online loan application etc..The voice acquisition device 1 is cheap, only needs electricity Words, mobile phone or microphone, cost-effective without customizing collecting device, equipment cost is low.The application server 2 can be with It is the computing devices such as rack-mount server, blade server, tower server or Cabinet-type server, the application server 2 It can be the server cluster that independent server or multiple servers are formed.The network 3 can be in enterprise Portion's net (Intranet), internet (Internet), global system for mobile communications (Global System of Mobile Communication, GSM), WCDMA (Wideband Code Division Multiple Access, WCDMA), the wirelessly or non-wirelessly network such as 4G networks, 5G networks, bluetooth (Bluetooth), Wi-Fi, speech path network.
Wherein, the application server 2 is logical with one or more voice acquisition devices 1 respectively by the network 3 Letter connection, to carry out data transmission and interact.
As shown in fig.2, it is the schematic diagram of 2 one optional hardware structure of application server in Fig. 1.In the present embodiment, institute Stating application server 2 may include, but be not limited only to, and connection memory 11, processor 12, net can be in communication with each other by system bus Network interface 13.It is pointed out that Fig. 2 illustrate only the application server 2 with component 11-13, it should be understood that simultaneously All components shown realistic are not applied, the more or less component of the implementation that can be substituted.
Wherein, the memory 11 comprises at least a type of readable storage medium storing program for executing, and the readable storage medium storing program for executing includes Flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memories etc.), random access storage device (RAM), it is static with Machine access memory (SRAM), read-only storage (ROM), Electrically Erasable Read Only Memory (EEPROM), it is programmable only Read memory (PROM), magnetic storage, disk, CD etc..In certain embodiments, the memory 11 can be described answers With the hard disk or internal memory of the internal storage unit of server 2, such as the application server 2.In further embodiments, it is described to deposit Reservoir 11 can also be that the plug-in type being equipped with the External memory equipment of the application server 2, such as the application server 2 is hard Disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Certainly, the memory 11 can also both include the internal storage unit of the application server 2 or wrap Include its External memory equipment.In the present embodiment, the memory 11 is generally used for the behaviour that storage is installed on the application server 2 Make system and types of applications software, such as program code of subscriber identity authentication system 200 etc..In addition, the memory 11 is also It can be used for temporarily storing the Various types of data that has exported or will export.
The processor 12 can be in certain embodiments central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor or other data processing chips.The processor 12 is generally used for should described in control With the overall operation of server 2, such as the control that execution is related to the voice acquisition device 1 progress data interaction or communication With processing etc..In the present embodiment, the processor 12 is used to run the program code stored in the memory 11 or processing Data, such as run described subscriber identity authentication system 200 etc..
The network interface 13 may include radio network interface or wired network interface, and the network interface 13 is generally used for Communication connection is established between the application server 2 and other electronic equipments.In the present embodiment, the network interface 13 is mainly used In the application server 2 is connected with one or more voice acquisition devices 1 by the network 3, in the application Data transmission channel and communication connection are established between server 2 and one or more of voice acquisition devices 1.
So far, oneself is through describing the application environment of each embodiment of the present invention and the hardware configuration and work(of relevant device in detail Energy.Below, above-mentioned application environment and relevant device will be based on, proposes each embodiment of the present invention.
First, the present invention proposes a kind of subscriber identity authentication system 200.
As shown in fig.3, it is the Program modual graph of the first embodiment of subscriber identity authentication system 200 of the present invention.This implementation In example, described subscriber identity authentication system 200 includes a series of computer program instructions being stored on memory 11, when When the computer program instructions are performed by processor 12, it is possible to achieve the subscriber authentication operation of various embodiments of the present invention. In some embodiments, the specific operation realized based on the computer program instructions each several part, subscriber identity authentication system 200 One or more modules can be divided into.For example, in figure 3, the subscriber identity authentication system 200, which can be divided into, to be carried Modulus block 201, acquisition module 202, contrast module 203, judge module 204.Wherein:
The extraction module 201, for carrying out the pretreatment of Remote Non-touch vocal print and feature by voice acquisition device 1 Extraction.
Specifically, when some user, which is based on mobile Internet, carries out loan application, adopted with the voice acquisition device 1 Collect the voice print database of the user, and the voice print database is pre-processed, extract effective vocal print feature data.In this reality Apply in example, can be according to the name inputted online, user described in the data separation such as identification card number.
The security that Application on Voiceprint Recognition is provided can compare favourably with other biological identification technology (such as face, iris), and vocal print is known Not there is uniqueness and can not distort, technology maturation is with a high credibility.Voice acquisition device 1 is cheap, only needs electricity Words, mobile phone or microphone, cost-effective without customizing collecting device, equipment cost is low.
Application on Voiceprint Recognition is unrelated with language of speaking, unrelated with dialect intonation, and adaptation population's scope is very wide, is not related to privacy and asks Topic, user privacy are good.Simple to operate, process is naturally, user's acceptance is high.Phone or networking are only needed, is especially suitable for Remote authentication.
The acquisition module 202, for obtaining sound-groove model corresponding to the user.
Specifically, sound-groove model corresponding to the user can be obtained from the storage location pre-set.For example, can be from this The sound-groove model is obtained in credit passport corresponding to user, have collected in the credit passport essential information corresponding to the user, The biological information such as credit information and reserved sound-groove model
The contrast module 203, for the vocal print feature data extracted to be entered with the acquired sound-groove model Row contrast, obtains confidence score.
Specifically, when getting sound-groove model corresponding with the user, by the vocal print feature data and the sound-groove model Contrasted item by item, to obtain the confidence score of the vocal print feature data.It is understood that the vocal print feature data are with being somebody's turn to do The similarity of sound-groove model is higher, and the confidence score is higher.
The judge module 204, for judging the authentication of the user according to the confidence score and predetermined threshold value As a result.
Specifically, the predetermined threshold value is sentencing for the vocal print feature data and the similarity degree of the sound-groove model Severed finger mark, such as 60 points.When the confidence score reaches and (be more than or equal to) predetermined threshold value, the identity of the user is judged The result is to be verified.When the confidence score not up to (is less than) predetermined threshold value, the body of the user is judged Part the result is authentication failed.
In addition, vocal print feature can also be combined by the present embodiment with the existing verification mode such as password, digital certificate, work as sound When line feature, password, digital certificate etc. are without exception, it is verified.
As shown in fig.4, it is the Program modual graph of the second embodiment of subscriber identity authentication system 200 of the present invention.This implementation In example, described subscriber identity authentication system 200 is except including the extraction module 201, the acquisition module in first embodiment 202nd, outside contrast module 203, judge module 204, in addition to detection module 205.
The detection module 205, for carrying out vocal print In vivo detection to the vocal print feature data extracted.
Specifically, after the extraction module 201 extracts the vocal print feature data, the extraction module 201 is to this Vocal print feature data carry out vocal print In vivo detection.If detection passes through, continue to trigger the acquisition module 202 and obtain the user couple The sound-groove model answered;If detection is not by immediately arriving at the result that the subscriber authentication fails.
As shown in fig.5, it is the Program modual graph of the 3rd embodiment of subscriber identity authentication system 200 of the present invention.This implementation In example, described subscriber identity authentication system 200 is on the basis of second embodiment, in addition to regression block 206.
The regression block 206, for improving the predetermined threshold value by continuous regression test.
Specifically, can be according to multiple authentication when authentication times corresponding to the user reach to a certain degree As a result regression test is carried out with actual state, reversely judges the reasonability of the predetermined threshold value.It is it is understood that described default The value of threshold value is bigger, and checking accuracy rate is higher;And the value of the predetermined threshold value is smaller, it is higher to be verified rate.By not It is disconnected to carry out regression test, an equalization point can be found between the rate that is verified and checking accuracy rate, improve the default threshold The value of value, it is set to tend to be optimal.
In addition, the present invention also proposes a kind of user ID authentication method.
As shown in fig.6, it is the schematic flow sheet of user ID authentication method first embodiment of the present invention.In the present embodiment In, according to different demands, the execution sequence of the step in flow chart shown in Fig. 6 can change, and some steps can be omitted.
Step S600, the pretreatment of Remote Non-touch vocal print and feature extraction are carried out by voice acquisition device 1, used The vocal print feature data at family.
Specifically, when some user, which is based on mobile Internet, carries out loan application, adopted with the voice acquisition device 1 Collect the voice print database of the user, and the voice print database is pre-processed, extract effective vocal print feature data.In this reality Apply in example, can be according to the name inputted online, user described in the data separation such as identification card number.
The security that Application on Voiceprint Recognition is provided can compare favourably with other biological identification technology (such as face, iris), and vocal print is known Not there is uniqueness and can not distort, technology maturation is with a high credibility.Voice acquisition device 1 is cheap, only needs electricity Words, mobile phone or microphone, cost-effective without customizing collecting device, equipment cost is low.
Application on Voiceprint Recognition is unrelated with language of speaking, unrelated with dialect intonation, and adaptation population's scope is very wide, is not related to privacy and asks Topic, user privacy are good.Simple to operate, process is naturally, user's acceptance is high.Phone or networking are only needed, is especially suitable for Remote authentication.
Step S602, obtain sound-groove model corresponding to the user.
Specifically, sound-groove model corresponding to the user can be obtained from the storage location pre-set.For example, can be from this The sound-groove model is obtained in credit passport corresponding to user, have collected in the credit passport essential information corresponding to the user, The biological information such as credit information and reserved sound-groove model.
Step S604, the vocal print feature data extracted are contrasted with the acquired sound-groove model, obtained Confidence score.
Specifically, when getting sound-groove model corresponding with the user, by the vocal print feature data and the sound-groove model Contrasted item by item, to obtain the confidence score of the vocal print feature data.It is understood that the vocal print feature data are with being somebody's turn to do The similarity of sound-groove model is higher, and the confidence score is higher.
Step S606, the authentication result of the user is judged according to the confidence score and predetermined threshold value.
Specifically, the predetermined threshold value is sentencing for the vocal print feature data and the similarity degree of the sound-groove model Severed finger mark, such as 60 points.When the confidence score reaches and (be more than or equal to) predetermined threshold value, the identity of the user is judged The result is to be verified.When the confidence score not up to (is less than) predetermined threshold value, the body of the user is judged Part the result is authentication failed.
In addition, vocal print feature can also be combined by the present embodiment with the existing verification mode such as password, digital certificate, work as sound When line feature, password, digital certificate etc. are without exception, it is verified.
The user ID authentication method that the present embodiment is proposed, it can gather and pre-process by voice acquisition device 1 To user's vocal print feature data, and the sound-groove model in credit passport corresponding with the user is contrasted, according to comparing result Judge the authentication of the user whether by so as to effectively reduce risk with predetermined threshold value.
As shown in fig. 7, it is the schematic flow sheet of the second embodiment of user ID authentication method of the present invention.The present embodiment In, the step S700 and S704-S708 of the user ID authentication method and the step S600-S606 of first embodiment are similar Seemingly, difference is that this method also includes step S702.
This method comprises the following steps:
Step S700, the pretreatment of Remote Non-touch vocal print and feature extraction are carried out by voice acquisition device 1, used The vocal print feature data at family.
Specifically, when some user, which is based on mobile Internet, carries out loan application, adopted with the voice acquisition device 1 Collect the voice print database of the user, and the voice print database is pre-processed, extract effective vocal print feature data.In this reality Apply in example, can be according to the name inputted online, user described in the data separation such as identification card number.
The security that Application on Voiceprint Recognition is provided can compare favourably with other biological identification technology (such as face, iris), and vocal print is known Not there is uniqueness and can not distort, technology maturation is with a high credibility.Voice acquisition device 1 is cheap, only needs electricity Words, mobile phone or microphone, cost-effective without customizing collecting device, equipment cost is low.
Application on Voiceprint Recognition is unrelated with language of speaking, unrelated with dialect intonation, and adaptation population's scope is very wide, is not related to privacy and asks Topic, user privacy are good.Simple to operate, process is naturally, user's acceptance is high.Phone or networking are only needed, is especially suitable for Remote authentication.
Step S702, vocal print In vivo detection is carried out to the vocal print feature data extracted.
Specifically, after the vocal print feature data are extracted, vocal print In vivo detection is carried out to the vocal print feature data.If Detection passes through, then continues executing with next step;If detection is not by immediately arriving at the checking knot that the subscriber authentication fails Fruit.
Step S704, obtain sound-groove model corresponding to the user.
Specifically, sound-groove model corresponding to the user can be obtained from the storage location pre-set.For example, can be from this The sound-groove model is obtained in credit passport corresponding to user, have collected in the credit passport essential information corresponding to the user, The biological information such as credit information and reserved sound-groove model.
Step S706, the vocal print feature data extracted are contrasted with the acquired sound-groove model, obtained Confidence score.
Specifically, when getting sound-groove model corresponding with the user, by the vocal print feature data and the sound-groove model Contrasted item by item, to obtain the confidence score of the vocal print feature data.It is understood that the vocal print feature data are with being somebody's turn to do The similarity of sound-groove model is higher, and the confidence score is higher.
Step S708, the authentication result of the user is judged according to the confidence score and predetermined threshold value.
Specifically, the predetermined threshold value is sentencing for the vocal print feature data and the similarity degree of the sound-groove model Severed finger mark, such as 60 points.When the confidence score reaches and (be more than or equal to) predetermined threshold value, the identity of the user is judged The result is to be verified.When the confidence score not up to (is less than) predetermined threshold value, the body of the user is judged Part the result is authentication failed.
In addition, vocal print feature can also be combined by the present embodiment with the existing verification mode such as password, digital certificate, work as sound When line feature, password, digital certificate etc. are without exception, it is verified.
The user ID authentication method that the present embodiment is proposed, it can gather and pre-process by voice acquisition device 1 To user's vocal print feature data, and the sound-groove model in credit passport corresponding with the user is contrasted, according to comparing result Judge the authentication of the user whether by so as to effectively reduce risk with predetermined threshold value.
As shown in figure 8, it is the schematic flow sheet of the 3rd embodiment of user ID authentication method of the present invention.The present embodiment In, the step S800-S808 of the user ID authentication method and the step S700-S708 of second embodiment are similar, difference It is that this method also includes step S810.
This method comprises the following steps:
Step S800, the pretreatment of Remote Non-touch vocal print and feature extraction are carried out by voice acquisition device 1, used The vocal print feature data at family.
Specifically, when some user, which is based on mobile Internet, carries out loan application, adopted with the voice acquisition device 1 Collect the voice print database of the user, and the voice print database is pre-processed, extract effective vocal print feature data.In this reality Apply in example, can be according to the name inputted online, user described in the data separation such as identification card number.
The security that Application on Voiceprint Recognition is provided can compare favourably with other biological identification technology (such as face, iris), and vocal print is known Not there is uniqueness and can not distort, technology maturation is with a high credibility.Voice acquisition device 1 is cheap, only needs electricity Words, mobile phone or microphone, cost-effective without customizing collecting device, equipment cost is low.
Application on Voiceprint Recognition is unrelated with language of speaking, unrelated with dialect intonation, and adaptation population's scope is very wide, is not related to privacy and asks Topic, user privacy are good.Simple to operate, process is naturally, user's acceptance is high.Phone or networking are only needed, is especially suitable for Remote authentication.
Step S802, vocal print In vivo detection is carried out to the vocal print feature data extracted.
Specifically, after the vocal print feature data are extracted, vocal print In vivo detection is carried out to the vocal print feature data.If Detection passes through, then continues executing with next step;If detection is not by immediately arriving at the checking knot that the subscriber authentication fails Fruit.
Step S804, obtain sound-groove model corresponding to the user.
Specifically, sound-groove model corresponding to the user can be obtained from the storage location pre-set.For example, can be from this The sound-groove model is obtained in credit passport corresponding to user, have collected in the credit passport essential information corresponding to the user, The biological information such as credit information and reserved sound-groove model.
Step S806, the vocal print feature data extracted are contrasted with the acquired sound-groove model, obtained Confidence score.
Specifically, when getting sound-groove model corresponding with the user, by the vocal print feature data and the sound-groove model Contrasted item by item, to obtain the confidence score of the vocal print feature data.It is understood that the vocal print feature data are with being somebody's turn to do The similarity of sound-groove model is higher, and the confidence score is higher.
Step S808, the authentication result of the user is judged according to the confidence score and predetermined threshold value.
Specifically, the predetermined threshold value is sentencing for the vocal print feature data and the similarity degree of the sound-groove model Severed finger mark, such as 60 points.When the confidence score reaches and (be more than or equal to) predetermined threshold value, the identity of the user is judged The result is to be verified.When the confidence score not up to (is less than) predetermined threshold value, the body of the user is judged Part the result is authentication failed.
In addition, vocal print feature can also be combined by the present embodiment with the existing verification mode such as password, digital certificate, work as sound When line feature, password, digital certificate etc. are without exception, it is verified.
Step S810, the predetermined threshold value is improved by continuous regression test.
Specifically, when authentication times corresponding to the user reach (such as preset times) to a certain degree, Ke Yigen Regression test is carried out according to multiple authentication result and actual state, reversely judges the reasonability of the predetermined threshold value.It can manage Solution, the value of the predetermined threshold value is bigger, and checking accuracy rate is higher;And the value of the predetermined threshold value is smaller, checking is logical It is higher to cross rate.By constantly carrying out regression test, an equalization point can be found between the rate that is verified and checking accuracy rate, The value of the predetermined threshold value is improved, it is tended to be optimal.
The user ID authentication method that the present embodiment is proposed, it can gather and pre-process by voice acquisition device 1 To user's vocal print feature data, and the sound-groove model in credit passport corresponding with the user is contrasted, according to comparing result Judge the authentication of the user whether by so as to effectively reduce risk with predetermined threshold value.Furthermore it is also possible to according to multiple body Part the result and actual state carry out regression test, the reasonability of the predetermined threshold value are reversely judged, so as to adjust and improve State the value of predetermined threshold value.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, computer, clothes Be engaged in device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of user ID authentication method, applied to application server, it is characterised in that methods described includes step:
Vocal print pretreatment and feature extraction are carried out by voice acquisition device, obtain the vocal print feature data of user;
Obtain sound-groove model corresponding to the user;
The vocal print feature data extracted are contrasted with the acquired sound-groove model, confidence level is obtained and obtains Point;And
The authentication result of the user is judged according to the confidence score and predetermined threshold value.
2. user ID authentication method as claimed in claim 1, it is characterised in that this method is being obtained corresponding to the user Also include step before the step of sound-groove model:
Vocal print In vivo detection is carried out to the vocal print feature data extracted;
When detection passes through, described the step of obtaining sound-groove model corresponding to the user is performed;
When detection not by when, immediately arrive at the result of subscriber authentication failure.
3. user ID authentication method as claimed in claim 2, it is characterised in that this method also includes step:
The predetermined threshold value is improved by continuous regression test.
4. user ID authentication method as claimed in claim 1, it is characterised in that described according to the confidence score and pre- If the step of authentication result of user described in threshold decision, specifically includes:
When the confidence score is more than or equal to the predetermined threshold value, judge that the authentication result of the user is logical to verify Cross;
When the confidence score is less than the predetermined threshold value, judge the authentication result of the user for authentication failed.
5. user ID authentication method as claimed in claim 3, it is characterised in that described that institute is improved by continuous regression test The step of stating predetermined threshold value specifically includes:
When authentication times corresponding to the user reach preset times, according to multiple authentication result and actual state Regression test is carried out, reversely judges the reasonability of the predetermined threshold value.
6. a kind of application server, it is characterised in that the application server includes memory, processor, on the memory The subscriber identity authentication system that can be run on the processor is stored with, the subscriber identity authentication system is by the processor Following steps are realized during execution:
Vocal print pretreatment and feature extraction are carried out by voice acquisition device, obtain the vocal print feature data of user;
Obtain sound-groove model corresponding to the user;
The vocal print feature data extracted are contrasted with the acquired sound-groove model, confidence level is obtained and obtains Point;And
The authentication result of the user is judged according to the confidence score and predetermined threshold value.
7. application server as claimed in claim 6, it is characterised in that the subscriber identity authentication system is by the processor Step is also realized during execution:
Vocal print In vivo detection is carried out to the vocal print feature data extracted;
When detection passes through, described the step of obtaining sound-groove model corresponding to the user is performed;
When detection not by when, immediately arrive at the result of subscriber authentication failure.
8. application server as claimed in claim 7, it is characterised in that the subscriber identity authentication system is by the processor Step is also realized during execution:
The predetermined threshold value is improved by continuous regression test.
9. application server as claimed in claim 6, it is characterised in that described according to the confidence score and predetermined threshold value The step of authentication result for judging the user, specifically includes:
When the confidence score is more than or equal to the predetermined threshold value, judge that the authentication result of the user is logical to verify Cross;
When the confidence score is less than the predetermined threshold value, judge the authentication result of the user for authentication failed.
10. a kind of computer-readable recording medium, the computer-readable recording medium storage has subscriber identity authentication system, institute Stating enterprise's recommended program can be by least one computing device, so that at least one computing device such as claim 1-5 Any one of user ID authentication method the step of.
CN201710914890.0A 2017-09-30 2017-09-30 User ID authentication method and application server Pending CN107864121A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710914890.0A CN107864121A (en) 2017-09-30 2017-09-30 User ID authentication method and application server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710914890.0A CN107864121A (en) 2017-09-30 2017-09-30 User ID authentication method and application server

Publications (1)

Publication Number Publication Date
CN107864121A true CN107864121A (en) 2018-03-30

Family

ID=61699550

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710914890.0A Pending CN107864121A (en) 2017-09-30 2017-09-30 User ID authentication method and application server

Country Status (1)

Country Link
CN (1) CN107864121A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108766443A (en) * 2018-05-30 2018-11-06 Oppo广东移动通信有限公司 Method of adjustment, device, storage medium and the electronic equipment of matching threshold
CN110738998A (en) * 2019-09-11 2020-01-31 深圳壹账通智能科技有限公司 Voice-based personal credit evaluation method, device, terminal and storage medium
CN111382593A (en) * 2018-12-27 2020-07-07 浙江宇视科技有限公司 Identity verification method and device and electronic equipment
CN112084106A (en) * 2019-06-14 2020-12-15 中国移动通信集团浙江有限公司 Test data selection method and device, computing equipment and computer storage medium
CN112351047A (en) * 2021-01-07 2021-02-09 北京远鉴信息技术有限公司 Double-engine based voiceprint identity authentication method, device, equipment and storage medium
CN112652314A (en) * 2020-12-30 2021-04-13 太平金融科技服务(上海)有限公司 Method, device, equipment and medium for verifying disabled object based on voiceprint shading
CN112951247A (en) * 2021-03-23 2021-06-11 上海掌数科技有限公司 Method for quickly verifying voiceprint based on application scene and application thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103475490A (en) * 2013-09-29 2013-12-25 广州网易计算机系统有限公司 Identity authentication method and device
CN103841108A (en) * 2014-03-12 2014-06-04 北京天诚盛业科技有限公司 Authentication method and system of biological characteristics of user
US8768709B1 (en) * 1999-11-09 2014-07-01 West Corporation Apparatus and method for verifying transactions using voice print
CN105426723A (en) * 2015-11-20 2016-03-23 北京得意音通技术有限责任公司 Voiceprint identification, face identification and synchronous in-vivo detection-based identity authentication method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8768709B1 (en) * 1999-11-09 2014-07-01 West Corporation Apparatus and method for verifying transactions using voice print
CN103475490A (en) * 2013-09-29 2013-12-25 广州网易计算机系统有限公司 Identity authentication method and device
CN103841108A (en) * 2014-03-12 2014-06-04 北京天诚盛业科技有限公司 Authentication method and system of biological characteristics of user
CN105426723A (en) * 2015-11-20 2016-03-23 北京得意音通技术有限责任公司 Voiceprint identification, face identification and synchronous in-vivo detection-based identity authentication method and system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108766443A (en) * 2018-05-30 2018-11-06 Oppo广东移动通信有限公司 Method of adjustment, device, storage medium and the electronic equipment of matching threshold
CN111382593A (en) * 2018-12-27 2020-07-07 浙江宇视科技有限公司 Identity verification method and device and electronic equipment
CN112084106A (en) * 2019-06-14 2020-12-15 中国移动通信集团浙江有限公司 Test data selection method and device, computing equipment and computer storage medium
CN112084106B (en) * 2019-06-14 2023-08-01 中国移动通信集团浙江有限公司 Method and device for selecting test data, computing equipment and computer storage medium
CN110738998A (en) * 2019-09-11 2020-01-31 深圳壹账通智能科技有限公司 Voice-based personal credit evaluation method, device, terminal and storage medium
CN112652314A (en) * 2020-12-30 2021-04-13 太平金融科技服务(上海)有限公司 Method, device, equipment and medium for verifying disabled object based on voiceprint shading
CN112351047A (en) * 2021-01-07 2021-02-09 北京远鉴信息技术有限公司 Double-engine based voiceprint identity authentication method, device, equipment and storage medium
CN112951247A (en) * 2021-03-23 2021-06-11 上海掌数科技有限公司 Method for quickly verifying voiceprint based on application scene and application thereof

Similar Documents

Publication Publication Date Title
CN107864121A (en) User ID authentication method and application server
US8775187B2 (en) Voice authentication system and methods
CN107517207A (en) Server, auth method and computer-readable recording medium
CN107871279A (en) User ID authentication method and application server
HK1092971A1 (en) Method for the authentification of applications
CN109326058A (en) Identification check method, apparatus, terminal and readable medium based on wisdom automatic teller machine
CN106961418A (en) Identity identifying method and identity authorization system
CN105740683B (en) Based on multifactor, multi engine, the man-machine auth method being combined and system
EP3042333A1 (en) Biometric verification using predicted signatures
WO2008089508A1 (en) Voice recognition system and methods
KR20190053917A (en) Identity recognition method and apparatus
WO2010009495A1 (en) Voice authentication systems and methods
CN110473552A (en) Speech recognition authentication method and system
CN106991312B (en) Internet anti-fraud authentication method based on voiceprint recognition
CN108428102A (en) Attendance comprehensive control method, application server and computer readable storage medium
CN106060019A (en) Bank account management system and method based on intelligent client
CN107911334A (en) Ip address risk monitoring method and application server
CN110769425A (en) Method and device for judging abnormal call object, computer equipment and storage medium
CN108234454B (en) Identity authentication method, server and client device
CN110458401A (en) Information processing unit, method and storage medium based on block chain
CN113707157B (en) Voiceprint recognition-based identity verification method and device, electronic equipment and medium
CN107294981B (en) Authentication method and equipment
CN111402899B (en) Cross-channel voiceprint recognition method and device
CN116151965A (en) Risk feature extraction method and device, electronic equipment and storage medium
CN107786980A (en) A kind of fraud information recognition methods and its device, mobile terminal, server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20180529

Address after: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant after: Shenzhen one ledger Intelligent Technology Co., Ltd.

Address before: 200030 Xuhui District, Shanghai Kai Bin Road 166, 9, 10 level.

Applicant before: Shanghai Financial Technologies Ltd

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180330