CN109510806A - Method for authenticating and device - Google Patents

Method for authenticating and device Download PDF

Info

Publication number
CN109510806A
CN109510806A CN201710835052.4A CN201710835052A CN109510806A CN 109510806 A CN109510806 A CN 109510806A CN 201710835052 A CN201710835052 A CN 201710835052A CN 109510806 A CN109510806 A CN 109510806A
Authority
CN
China
Prior art keywords
user
account
target account
vocal print
voice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710835052.4A
Other languages
Chinese (zh)
Other versions
CN109510806B (en
Inventor
方硕
李亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201710835052.4A priority Critical patent/CN109510806B/en
Publication of CN109510806A publication Critical patent/CN109510806A/en
Application granted granted Critical
Publication of CN109510806B publication Critical patent/CN109510806B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Biomedical Technology (AREA)
  • Acoustics & Sound (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Telephonic Communication Services (AREA)

Abstract

This specification embodiment provides a kind of method for authenticating and device, this method comprises: determining that user requests the target account of operation;Obtain the current vocal print of the user;If there are corresponding history vocal prints to determine the user to the operating right of the target account based on the matching status of the current vocal print of user history vocal print corresponding with the target account for the target account.It can be seen that, this specification technical solution can be during user carries out account operation by customer service system, authentication is carried out to the user using sound groove recognition technology in e, since vocal print is the biological characteristic of the uniqueness of people, i.e. vocal print can not be stolen, therefore there is very high safety, can be revealed to avoid user information and cause to emit the person of recognizing to loss brought by account progress relevant operation.

Description

Method for authenticating and device
Technical field
This specification is related to field of computer technology more particularly to a kind of method for authenticating and device.
Background technique
With the continuous development of Internet technology, more and more users are by customer service system come transacting business, customer service system System can provide remote service for user, for example, user can seek advice from relevant issues and application pair to the customer service of customer service system Account carries out relevant operation.Currently, during being operated to account, for example, the reporting the loss of account, cancel loss report operation, customer service It needs to verify the identity of user, that is, confirms whether the user is account holder, only hold in the user for account In the case where people can just relevant operation be carried out to account.
Summary of the invention
The purpose of this specification embodiment is to provide a kind of method for authenticating and device, to realize more safely to user's Identity is verified, to avoid emitting the person of recognizing to loss brought by account progress relevant operation.
In order to solve the above technical problems, this specification embodiment is achieved in that
In a first aspect, providing a kind of method for authenticating, which comprises
Determine that user requests the target account of operation;
Obtain the current vocal print of the user;
If there are corresponding history vocal prints for the target account, based on the current vocal print of the user and the target The matching status of the corresponding history vocal print of account, determines the user to the operating right of the target account.
Second aspect, provides a kind of authentication device, and described device includes:
Determination unit, for determining that user requests the target account of operation;
Acquiring unit, for obtaining the current vocal print of the user;
Authenticating unit, for, there are in the case where corresponding history vocal print, being worked as based on the user in the target account The matching status of preceding vocal print history vocal print corresponding with the target account, determines the user to the behaviour of the target account Make permission.
The third aspect provides a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed It manages device and executes following operation:
Determine that user requests the target account of operation;
Obtain the current vocal print of the user;
If there are corresponding history vocal prints for the target account, based on the current vocal print of the user and the target The matching status of the corresponding history vocal print of account, determines the user to the operating right of the target account.
Fourth aspect, provides a kind of computer storage medium, and the computer-readable recording medium storage one or more A program, one or more of programs are when the electronic equipment for being included multiple application programs executes, so that the electronics is set It is standby to execute following operation:
Determine that user requests the target account of operation;
Obtain the current vocal print of the user;
If there are corresponding history vocal prints for the target account, based on the current vocal print of the user and the target The matching status of the corresponding history vocal print of account, determines the user to the operating right of the target account.
The technical solution provided by above this specification embodiment is as it can be seen that this specification embodiment can pass through visitor in user During dress system carries out account operation, authentication is carried out to the user using sound groove recognition technology in e, since vocal print is people Uniqueness biological characteristic, i.e. vocal print can not be stolen, therefore have very high safety, can be to avoid user information Leakage causes to emit the person of recognizing to account progress relevant operation bring loss.
Detailed description of the invention
In order to illustrate more clearly of this specification embodiment or technical solution in the prior art, below will to embodiment or Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only The some embodiments recorded in this specification, for those of ordinary skill in the art, in not making the creative labor property Under the premise of, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow chart of one embodiment method for authenticating of this specification;
Fig. 2 is the flow chart of another embodiment method for authenticating of this specification;
Fig. 3 is the scene figure of one embodiment method for authenticating of this specification;
Fig. 4 is the scene figure of another embodiment method for authenticating of this specification;
Fig. 5 is the flow chart of another embodiment method for authenticating of this specification;
Fig. 6 is the scene figure of another embodiment method for authenticating of this specification;
Fig. 7 is the scene figure of another embodiment method for authenticating of this specification;
Fig. 8 is the structural schematic diagram of one embodiment electronic equipment of this specification;
Fig. 9 is the structural schematic diagram of one embodiment authentication device of this specification.
Specific embodiment
In order to make those skilled in the art more fully understand the technical solution in this specification, below in conjunction with this explanation Attached drawing in book embodiment is clearly and completely described the technical solution in this specification embodiment, it is clear that described Embodiment be only this specification a part of the embodiment, instead of all the embodiments.The embodiment of base in this manual, Every other embodiment obtained by those of ordinary skill in the art without making creative efforts, all should belong to The range of this specification protection.
This specification embodiment provides a kind of method for authenticating and device.
A kind of method for authenticating provided first below this specification embodiment is introduced.
It should be noted that the method that this specification embodiment provides is suitable for electronic equipment, in practical applications, the electricity Sub- equipment may include: server and terminal device, which may include: smart phone, tablet computer and computer Equipment, the computer equipment may include: laptop, desktop computer etc., and this specification embodiment is not construed as limiting this.
Fig. 1 is the flow chart of one embodiment method for authenticating of this specification, as shown in Figure 1, this method may include with Lower step:
In S102, determine that user requests the target account of operation.
In this specification embodiment, target account can be financial class account, the account of social application, the account for application of calling a taxi Family, the account and account of Video Applications etc. for taking out dispatching application, wherein financial class account may include: bank account and Internet finance account.
It, can when user needs to carry out some operations (such as report the loss or cancel loss report) to account in this specification embodiment To contact the customer service in customer service system, wherein the customer service system may include: phone customer service system and network customer service system.
When customer service system is phone customer service system, user can be made a phone call in customer service system by mobile phone or base Service calls, to be contacted with customer service foundation;After being contacted with customer service by phone foundation, user can describe need to which account Family carry out which operation, at this point, customer service it needs to be determined that the user request operation target account, above-mentioned S102 may include: When user passes through telephony access, determine that the user requests the target account of operation.
When customer service system is network customer service system, user can pass through the customer service in net connection network customer service system; After being contacted by network and customer service foundation, user can describe which operation needed to carry out which account, at this point, customer service needs Determine that the user requests the target account of operation, above-mentioned S102 may include: to determine the use when user passes through network insertion The target account of family request operation.
Currently, user would generally bind telephone number and account in order to improve the safety of account, that is, establish electricity Talk about the corresponding relationship of number and account.For phone customer service system, user is in the customer service for making a phone call customer service system by mobile phone When phone, the customer service in phone customer service system can be determined corresponding to the incoming number according to the incoming number of the user Account, and the target account operated is requested using account corresponding to the incoming number as the user.At this point, optional at one In embodiment, above-mentioned S102 may include: to obtain relation table, recording in the relation table has when user passes through telephony access The corresponding relationship of account and telephone number;According to the relation table, the corresponding account of the incoming number of the user is determined;By the user The corresponding account of incoming number be determined as target account.
Preferably, in another optional embodiment, above-mentioned S102 may include: acquisition relation table, the relation table Middle record has the corresponding relationship of account and telephone number;According to the relation table, the corresponding account of the incoming number of the user is determined; Whether prompt is agreed to using the corresponding account of the incoming number of the user as target account;When determining that the user agrees to, The corresponding account of the incoming number of the user is determined as target account.
Currently, user would generally provide the identity information of oneself, such as ID card No., phone number in login account Code, mailbox etc., therefore, after Account Registration success, the account just establishes corresponding relationship with the identity information of user.For electricity Customer service system and network customer service system are talked about, after contacting with the customer service foundation in customer service system, user can send to the customer service One Duan Yuyin, is depicted the account for needing to operate in voice, and account described in the voice can be determined as target by customer service Account, at this point, above-mentioned S102 may include: the first voice for obtaining user, this first in an optional embodiment Include the sound bite for describing account in voice;Account described in the sound bite is determined as target account.
In present embodiment, can pass through at least one of following information in the first voice: account number is closed with account The ID card No. of connection and the associated phone number of account and the associated mailbox of account, to describe target account.
It can be text by the first speech recognition, from the text after the first voice for obtaining user in present embodiment The account that the part text describes is determined as target account by the middle part text extracted for describing account.
Currently, user would generally bind terminal device and account in order to improve the safety of account, that is, establish eventually The corresponding relationship of end equipment hardware identifier and account.For network customer service system, user is passing through network and network customer service system In customer service when establishing connection, the customer service in network customer service system can be according to the hardware of the currently used terminal device of the user Mark determines the corresponding account of terminal device hardware mark, and using account corresponding to the hardware identifier as the use The target account of family request operation.
In S104, the current vocal print of the user is obtained.
Vocal print (Voiceprint) is the sound wave spectrum for the carrying verbal information that electricity consumption acoustic instrument is shown, with fingerprint class Seemingly and a kind of biological characteristic with uniqueness.Application on Voiceprint Recognition (Voiceprint Recognition), is bio-identification skill One kind of art carries out the service of identity identification according to the acoustic wave character of speaker, and identity identification is unrelated with accent, language, can be with Identification and confirmation for speaker.
In this specification embodiment, customer service can prompt user to input a Duan Yuyin, the language later based on user input Sound extracts the vocal print of the user, at this point, above-mentioned S104 may comprise steps of: S10, S12 and S14, wherein
In S10, the second voice of user is obtained.
In this specification embodiment, in order to reach preferable recognition effect, customer service can indicate user according in regulation Hold pronunciation, that is, need the cooperation of user, at this point, above-mentioned S10 may include: that instruction user pronounces according to the second specified content;It connects Receive the voice that the user pronounces according to the second specified content.
For example, customer service instruction user pronounces according to " 0942051666 " in user and customer service communication process, this When, which needs to pronounce according to " 0942051666 ".
In this specification embodiment, for foundation voice recognition user identity in the case where user's unaware and facilitate use Family uses, and customer service can not provide the pronunciation content of user, at this point, above-mentioned S10 may include: to obtain the random sounding of user to obtain Voice.
In S12, acoustic feature is extracted from second voice.
In this specification embodiment, acoustic feature may include: frequency spectrum, cepstrum, formant, fundamental tone, reflection coefficient etc. Deng.
In this specification embodiment, in order to improve the accuracy of feature extraction, need first to judge whether the second voice meets Condition as defined in some extracts acoustic feature from second voice if second voice meets defined condition, if Second voice is unsatisfactory for defined condition, then abandons extracting acoustic feature from second voice, continue to obtain new voice Or traditional authentication process is executed, at this point, above-mentioned S12 may include:
When the second voice meets and imposes a condition, acoustic feature is extracted from second voice;Wherein, the setting condition packet Include at least one of following: the duration of the second voice reaches duration threshold value, the noise of the second voice is lower than noise threshold, the second voice Volume reach volume threshold, the session number in the second voice is 1.
Optionally, when impose a condition include: the second voice duration reach duration threshold value, the second voice noise lower than making an uproar When sound threshold value, customer service can first determine whether the duration of the second voice reaches duration threshold value, if reaching duration threshold value, into One step judges whether the noise of the second voice is lower than noise threshold, if not reaching duration threshold value, enters traditional identity Verify process;If the noise of the second voice is lower than noise threshold, acoustic feature is extracted from second voice, if second The noise of voice is not less than noise threshold, then enters traditional authentication process.
In S14, the vocal print for characterizing the user identity is extracted from the acoustic feature.
In this specification embodiment, traditional authentication process refers to that customer service question and answer verify identity, specifically, customer service Can propose a series of relevant issues to user, by verify user provide the whether correct mode of answer determine user whether be Account holder, the problem may include: telephone number 8 after account holder's ID card No., after bank's card number of binding Four etc..In addition, can also prompt user input query password to carry out authentication in customer service system.
In S106, if there are corresponding history vocal prints for target account, based on the current vocal print of the user and target The matching status of the corresponding history vocal print of account, determines the user to the operating right of target account.
In this specification embodiment, the corresponding history vocal print of target account may include: the vocal print of target account holder Model.
In order to realize Application on Voiceprint Recognition, in this specification embodiment, vocal print library can be pre-established, is stored in vocal print library more The sound-groove model of a account holder, while recording the corresponding relationship of sound-groove model in account and vocal print library.
Optionally, when establishing vocal print library, user can be required to pronounce according to the content of regulation, the vocal print mould of each user Type is accurately established one by one, in the case, when needing to carry out Application on Voiceprint Recognition, also requires corresponding user must be by regulation Content pronunciation, therefore can achieve preferable recognition effect.
Optionally, when establishing vocal print library, the pronunciation content of user can not be provided, the pronunciation content according to user is established The sound-groove model of each user, in the case, when needing to carry out Application on Voiceprint Recognition, user can pronounce at random, therefore, can be with According to voice recognition user identity in the case where user's unaware, application range is wider.
It, can be after determining the target account that user requests operation, according to account and vocal print library in this specification embodiment The corresponding relationship of middle sound-groove model judges the target account with the presence or absence of corresponding history vocal print;It can also work as obtaining user After preceding vocal print, according to the corresponding relationship of sound-groove model in account and vocal print library, judge the target account with the presence or absence of corresponding History vocal print.
If there are corresponding history vocal prints for target account, corresponding with target account based on the current vocal print of the user The matching status of history vocal print determines the user to the operating right of target account.If target account is gone through there is no corresponding History vocal print then carries out traditional authentication process.
It optionally, can be in the current vocal print of the user and target if there are corresponding history vocal prints for target account When the corresponding history voice print matching of account, determine that the user has the permission operated to target account;It is current in the user Vocal print corresponding with target account history vocal print when mismatching, determine that the user does not have the power operated to target account Limit.
In this specification embodiment, the current vocal print of user history vocal print corresponding with target account is compared, It obtains comparing score;Score will be compared to be compared with preset threshold value, if the comparison is obtained greater than preset Threshold value, then it represents that the current vocal print of user history voice print matching corresponding with target account, if the comparison is obtained no more than pre- The threshold value first set, then it represents that the current vocal print of user history vocal print corresponding with target account mismatches.
In this specification embodiment, operating right may include: to carry out reporting the loss permission to account and carry out solution extension to account The permission of mistake.
In this specification embodiment, when the current vocal print of user history vocal print corresponding with target account mismatches, Prompt needs to be operated by the holder of the target account.
As seen from the above-described embodiment, the embodiment can user by customer service system carry out account operation during, Authentication is carried out to the user using sound groove recognition technology in e, since vocal print is the biological characteristic of the uniqueness of people, i.e. vocal print is It can not be stolen, therefore there is very high safety, can be revealed to avoid user information and cause to emit the person of recognizing to account progress phase Close operation bring loss.
The person of recognizing is emitted in order to prevent emitted by the recording recorded in advance and recognized account holder account is operated, in this theory In another embodiment that bright book provides, on the basis of which can be with embodiment shown in Fig. 1, this method further includes following Step:
In the current vocal print of user history voice print matching corresponding with target account, indicate that the user refers to according to first Determine content pronunciation;
The user it is practical pronounce content and when the first specified content matching, determine the user have to target account into The permission of row operation.
In this specification embodiment, receive user for the first specified content it is practical pronounce voice after, by the language Sound is identified as text, text text corresponding with the first specified content is compared, if the two is identical, then it represents that the use Family it is practical pronounce content and the first specified content matching, that is, indicate the user be target account holder;If the two is different, Then indicate the user it is practical pronounce content mismatched with the first specified content, that is, indicating the user not is that target account is held People.
In this specification embodiment, the first specified content be random content, such as a string it is randomly digital or a string with Machine ground letter etc., recognizes since random content can not go to emit with the voice recorded in advance, it can thus be avoided it is logical to emit the person of recognizing Recognize account holder to emit after the recording recorded in advance account is carried out to operate caused loss.
For the ease of understanding the technical program, it is situated between below with reference to specific application scenarios to the technical program It continues.
Fig. 2 is the flow chart of another embodiment method for authenticating of this specification, and this method is applied to phone customer service system In, as shown in Fig. 2, this method may comprise steps of:
In S202, when user passes through telephony access, determine that the user requests the target account of operation.
In this specification embodiment, phone customer service system can provide remote service for user, in the phone customer service system Customer service can be intelligent customer service robot, or artificial customer service.
When user needs to operate account, the customer service of customer service system can be made a phone call by mobile phone or base Phone, at this point it is possible to provide service by intelligent customer service robot or artificial customer service for user.
In order to improve the safety of account, user would generally bind telephone number and account, that is, establish account and hold The telephone number of someone and the corresponding relationship of account.In this specification embodiment, detecting user by telephony access phone It, can be according to the incoming number of the user and the corresponding relationship of the telephone number of account holder and account, really when customer service system Account corresponding to the incoming number of the fixed user.
It optionally, in one embodiment, can be directly by account corresponding to the incoming number of the identified user Family is determined as target account.
Optionally, in another embodiment, the user can be prompted whether to agree to the incoming number of user is corresponding Account as target account, when user agrees to, the corresponding account of the incoming number of the user is determined as target account.
Optionally, in another embodiment, it is contemplated that a telephone number binds multiple accounts sometimes, at this point, It can prompt whether the user agrees to using the particular account in the corresponding account of the incoming number of user as target account, it will The particular account that user agrees to is determined as target account.
In addition, user can also send a Duan Yuyin to customer service by phone, in voice after accessing phone customer service system In be depicted and need the account that operates, account described in the voice can be determined as target account by customer service, in practical application In, the information for describing account may include at least one of following information: account number and the associated identification card number of account Code and the associated phone number of account and the associated mailbox of account.
In S204, judge otherwise target account executes biography with the presence or absence of corresponding history vocal print if so then execute S206 The authentication process of system.
In this specification embodiment, the corresponding history vocal print of target account may include: the vocal print of target account holder Model.
It, can be according to the corresponding relationship and mesh of sound-groove model and account in vocal print library, vocal print library in this specification embodiment Account is marked, judges target account with the presence or absence of corresponding history fingerprint.If there is the corresponding vocal print mould of target account in vocal print library Type, then it represents that there are corresponding history vocal prints for the target account.If there is no the corresponding sound-groove model of target account in vocal print library, Then indicating the target account, there is no corresponding history vocal prints.
It should be noted that vocal print library can be and be pre-established by phone customer service system, it is also possible to from other equipment (such as server) obtains, and the sound-groove model of multiple account holders is stored in vocal print library, while recording account and vocal print The corresponding relationship of sound-groove model in library.
Preferably, when establishing vocal print library, the pronunciation content of user can not be provided, the random pronunciation content according to user The sound-groove model of each user is established, in the case, when needing to carry out Application on Voiceprint Recognition, user can pronounce at random, therefore, Can be in the case where user's unaware according to voice recognition user identity, application range is wider.
In S206, the current vocal print of the user is obtained.
When using based on user pronounce at random vocal print library generated carry out Application on Voiceprint Recognition when, user can random sounding, For example, which kind of operation voice description carries out to account, voice caused by the random sounding of user, the extraction sound from the voice are received Feature is learned, the vocal print for uniquely characterizing the user identity is extracted from acoustic feature.
In addition, needing first to judge whether voice caused by user's sounding meets to improve the accuracy of feature extraction Condition as defined in some, for example, the duration of voice reaches duration threshold value, the noise of voice is lower than noise threshold, the volume of voice Reach volume threshold, the session number in voice is 1, subsequent acoustic feature just executed when meeting aforementioned condition extract and walk Suddenly.
In this specification embodiment, when corresponding history vocal print is not present in target account, into traditional authentication Process, traditional authentication process refer to verifying identity by customer service question and answer, specifically, customer service can propose one to user Serial relevant issues provide the whether correct mode of answer by verification user to determine whether user is account holder, are somebody's turn to do Problem may include: telephone number 8 after account holder's ID card No., four etc. after bank's card number of binding.This Outside, in phone customer service system, user input query password is prompted to carry out core body, in the customer service of bank or common carrier It is relatively common.
In S208, in the current vocal print of user history voice print matching corresponding with target account, the user is determined With the permission operated to target account;It is mismatched in the current vocal print of user history vocal print corresponding with target account When, determine that the user does not have the permission operated to target account.
In this specification embodiment, the current vocal print of user history vocal print corresponding with target account is compared, It obtains comparing score;Score will be compared to be compared with preset threshold value, if the comparison is obtained greater than preset Threshold value, then it represents that the current vocal print of user history voice print matching corresponding with target account, i.e., if the comparison is not more than Preset threshold value, then it represents that the current vocal print of user history vocal print corresponding with target account mismatches.
In an optional application scenarios, clothes are provided by the artificial user of intelligent customer service machine in phone customer service system Business, as shown in figure 3, including: user 30, mobile phone 31 and intelligent customer service robot 32 in the application scenarios, when the needs pair of user 30 When one account (such as bank account) carries out reporting the loss operation, the service calls in customer service system are made a phone call by mobile phone 31 " XXXX ", when 32 listening user 30 of intelligent customer service robot passes through the phone of 31 incoming call of mobile phone, user 30 can pass through mobile phone 31 accounts for needing to operate to the description of 32 voice of intelligent customer service robot, intelligent customer service robot 32 can be according to the hand of mobile phone 31 Machine number or user 30 by mobile phone 31 be transmitted through come voice, determine that user 30 requests the target account of operation, in order to it is subsequent just It in description, is replaced with account A, intelligent customer service robot 32 determines account A with the presence or absence of corresponding history according to the mark of account A Vocal print judges whether there is the vocal print of account A holder.When there are the vocal print of account A holder, intelligent customer service robot 32 can prompt user 30 to describe the operations for needing to carry out account A, at this point, user 30 can be by mobile phone 31 to intelligent customer service Which operation the description of 32 voice of robot needs to carry out account A, and intelligent customer service robot 32 is in the voice for receiving user 31 Afterwards, the current vocal print of user 30 is extracted from the voice, and the current vocal print of user 30 and the vocal print of account A holder are carried out It compares, if the two matches, intelligent customer service robot 32 operates account A according to the instruction of user 30, such as executes Report the loss operation.
In another optional application scenarios, service is provided for user by the artificial customer service in phone customer service system, such as It include: user 40, mobile phone 41, terminal device 42 and artificial customer service 43 in the application scenarios shown in Fig. 4.When the needs pair of user 40 When one account (such as bank account) carries out cancel loss report operation, the service calls in customer service system are made a phone call by mobile phone 41 " XXXX ", when artificial 43 listening user 40 of customer service is by the phone of 41 incoming call of mobile phone, user 40 can be by mobile phone 41 to people The phone number of mobile phone 41 or user 40 can be passed through hand by the account that the description of 43 voice of work customer service needs to operate, artificial customer service 43 Machine 41 is transmitted through the voice come and is input in inquiry terminal device 42, determines that user 40 requests the target account of operation by terminal device 42 Family, in order to it is subsequent convenient for description, is replaced with account B, terminal device 42 according to the mark of account B determine account B whether there is pair The history vocal print answered, that is, judge whether there is the vocal print of account B holder.When terminal device 42 determines that there are account B to hold When the vocal print of people, artificial customer service 43 can prompt user 40 to describe the operation for needing to carry out account B, at this point, user 40 can be with Which operation needed to carry out account B to the description of artificial 43 voice of customer service by mobile phone 41, artificial customer service 43 is by the language of user 40 In sound input terminal equipment 42, the current vocal print of user 40 is extracted from the voice by terminal device 42, and user 40 is current Vocal print be compared with the vocal print of account B holder, if the two match, artificial customer service 43 according to user 40 instruction pair Account B is operated, such as executes cancel loss report operation.
As seen from the above-described embodiment, which can carry out account operation by phone in user and such as report the loss solution extension phase During closing operation, using this living things feature recognition means of Application on Voiceprint Recognition, authentication is carried out to incoming call user, have compared with High safety, so as to avoid user information leakage from causing to emit the person of recognizing to account progress relevant operation bring loss.This Outside, since sound incoming call user can not change, and in communication process, sound is the biological characteristic that can uniquely get, In entire verification process, user's unaware does not need to answer a series of problems, the time of user and customer service is caused to waste, compared with The working efficiency of customer service is improved to big degree, the user experience is improved.
Fig. 5 is the flow chart of another embodiment method for authenticating of this specification, and this method is applied to network customer service system In, as shown in figure 5, this method may comprise steps of:
In S502, when user passes through network insertion, determine that the user requests the target account of operation.
In this specification embodiment, network customer service system can provide remote service for user, in the network customer service system Customer service can be intelligent customer service robot, or artificial customer service.
When user needs to operate account, terminal device (such as computer, smart phone etc.) can be used and pass through Customer service in net connection network customer service system, at this point it is possible to provide clothes by intelligent customer service robot or artificial customer service for user Business.
In order to improve the safety of account, user would generally bind terminal device and account, that is, establish terminal and set The corresponding relationship of standby hardware identifier and account.In this specification embodiment, detecting user by network insertion network customer service When system, pair of hardware identifier and the terminal device hardware mark and account of terminal device that can be currently used according to the user It should be related to, determine the corresponding account of terminal device hardware mark, and using account corresponding to the hardware identifier as this User requests the target account of operation.
In addition, user can also send a Duan Yuyin to customer service by network, in voice after accessing network customer service system In be depicted and need the account that operates, account described in the voice can be determined as target account by customer service, in practical application In, the information for describing account may include at least one of following information: account number and the associated identification card number of account Code and the associated phone number of account and the associated mailbox of account.
In S504, judge otherwise target account executes biography with the presence or absence of corresponding history vocal print if so then execute S506 The authentication process of system.
During this specification is implemented, the corresponding history vocal print of target account may include: the vocal print mould of target account holder Type.
It, can be according to the corresponding relationship and mesh of sound-groove model and account in vocal print library, vocal print library in this specification embodiment Account is marked, judges target account with the presence or absence of corresponding history fingerprint.If there is the corresponding vocal print mould of target account in vocal print library Type, then it represents that there are corresponding history vocal prints for the target account.If there is no the corresponding sound-groove model of target account in vocal print library, Then indicating the target account, there is no corresponding history vocal prints.
It should be noted that vocal print library can be and be pre-established by phone customer service system, it is also possible to from other equipment (such as server) obtains, and the sound-groove model of multiple account holders is stored in vocal print library, while recording account and vocal print The corresponding relationship of sound-groove model in library.
Preferably, when establishing vocal print library, the pronunciation content of user can not be provided, the random pronunciation content according to user The sound-groove model of each user is established, in the case, when needing to carry out Application on Voiceprint Recognition, user can pronounce at random, therefore, Can be in the case where user's unaware according to voice recognition user identity, application range is wider.
In S506, the current vocal print of the user is obtained.
When using based on user pronounce at random vocal print library generated carry out Application on Voiceprint Recognition when, user can random sounding, For example, which kind of operation voice description carries out to account, voice caused by the random sounding of user, the extraction sound from the voice are received Feature is learned, the vocal print for uniquely characterizing the user identity is extracted from acoustic feature.
In addition, needing first to judge whether voice caused by user's sounding meets to improve the accuracy of feature extraction Condition as defined in some, for example, the duration of voice reaches duration threshold value, the noise of voice is lower than noise threshold, the volume of voice Reach volume threshold, the session number in voice is 1, subsequent acoustic feature just executed when meeting aforementioned condition extract and walk Suddenly.
In this specification embodiment, when corresponding history vocal print is not present in target account, into traditional authentication Process, traditional authentication process refer to verifying identity by customer service question and answer, specifically, customer service can propose one to user Serial relevant issues provide the whether correct mode of answer by verification user to determine whether user is account holder, are somebody's turn to do Problem may include: telephone number 8 after account holder's ID card No., four etc. after bank's card number of binding.This Outside, in phone customer service system, user input query password is prompted to carry out core body, in the customer service of bank or common carrier It is relatively common.
In S508, in the current vocal print of user history voice print matching corresponding with target account, the user is determined With the permission operated to target account;It is mismatched in the current vocal print of user history vocal print corresponding with target account When, determine that the user does not have the permission operated to target account.
In this specification embodiment, the current vocal print of user history vocal print corresponding with target account is compared, It obtains comparing score;Score will be compared to be compared with preset threshold value, if the comparison is obtained greater than preset Threshold value, then it represents that the current vocal print of user history voice print matching corresponding with target account, i.e., if the comparison is not more than Preset threshold value, then it represents that the current vocal print of user history vocal print corresponding with target account mismatches.
In an optional application scenarios, clothes are provided by the artificial user of intelligent customer service machine in network customer service system Business, as shown in fig. 6, include: user 60, terminal device 61, intelligent customer service robot 62 and network 63 in the application scenarios, when with When family 60 needs to carry out reporting the loss operation to an account (such as bank account), using terminal equipment 61 passes through 63 related network of network Customer service in customer service system, when intelligent customer service robot 62 and terminal device 61 establish after network connection, user 60 can pass through The account that terminal device 61 needs to operate to the description of 62 voice of intelligent customer service robot, intelligent customer service robot 62 can be according to end The hardware identifier of end equipment 61 or user 60 by terminal device 61 be transmitted through come voice, determine that user 60 requests the target of operation Account is replaced, intelligent customer service robot 62 determines that account C is according to the mark of account C in order to subsequent convenient for description with account C It is no there are corresponding history vocal print, that is, judge whether there is the vocal print of account C holder.When there are the vocal prints of account C holder When, intelligent customer service robot 62 can prompt user 60 to describe the operation for needing to carry out account C, at this point, user 60 can lead to It crosses terminal device 61 and needs to carry out account C which operation, intelligent customer service robot to the description of 62 voice of intelligent customer service robot 62 after the voice for receiving user 61, and the current vocal print of user 60, and the vocal print that user 60 is current are extracted from the voice Be compared with the vocal print of account C holder, if the two match, intelligent customer service robot 62 according to user 60 instruction pair Account C is operated, such as is executed and reported the loss operation.
In another optional application scenarios, service is provided for user by the artificial customer service in network customer service system, such as It include: user 70, terminal device 71, terminal device 72, artificial customer service 73 and network 74 in the application scenarios shown in Fig. 7.When with When family 70 needs to carry out cancel loss report operation to an account (such as bank account), using terminal equipment 71 contacts net by network 74 Customer service in network customer service system, when terminal device 72 and terminal device 71 are established after network connection, user 70 can pass through terminal The account that equipment 71 needs to operate to the description of artificial 73 voice of customer service, terminal device 72 can be according to the hardware mark of terminal device 71 Know or user 70 by terminal device 71 be transmitted through come voice, determine user 70 request operate target account, in order to it is subsequent just In description, being replaced with account D, terminal device 72 determines that account D whether there is corresponding history vocal print according to the mark of account D, Judge whether there is the vocal print of account D holder.When there are the vocal print of account D holder, artificial customer service 73 can be prompted User 70 describes the operation for needing to carry out account D, at this point, user 70 can be by terminal device 71 to artificial 73 voice of customer service Which operation description needs to carry out account D, and terminal device 72 is extracted from the voice and used after the voice for receiving user 71 The current vocal print in family 70, and the current vocal print of user 70 is compared with the vocal print of account D holder, if the two matches, Then artificial customer service 73 operates account D according to the instruction of user 70, such as executes cancel loss report operation.
As seen from the above-described embodiment, which can carry out account operation by network in user and such as report the loss solution extension phase During closing operation, using this living things feature recognition means of Application on Voiceprint Recognition, authentication is carried out to user, it is with higher Safety, so as to avoid user information leakage from causing to emit the person of recognizing to account progress relevant operation bring loss.In addition, by In sound, incoming call user can not change, and during Internet phone-calling, sound is the biological characteristic that can uniquely get, In entire verification process, user's unaware does not need to answer a series of problems, the time of user and customer service is caused to waste, larger The working efficiency of customer service is improved to degree, the user experience is improved.
Fig. 8 is the structural schematic diagram of one embodiment electronic equipment of this specification.Referring to FIG. 8, in hardware view, it should Electronic equipment includes processor, optionally further comprising internal bus, network interface, memory.Wherein, memory may be comprising interior It deposits, such as high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non-volatile memories Device (non-volatile memory), for example, at least 1 magnetic disk storage etc..Certainly, which is also possible that other Hardware required for business.
Processor, network interface and memory can be connected with each other by internal bus, which can be ISA (Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard Architecture, expanding the industrial standard structure) bus etc..The bus can be divided into address bus, data/address bus, control always Line etc..Only to be indicated with a four-headed arrow in Fig. 8, it is not intended that an only bus or a type of convenient for indicating Bus.
Memory, for storing program.Specifically, program may include program code, and said program code includes calculating Machine operational order.Memory may include memory and nonvolatile memory, and provide instruction and data to processor.
Processor is from the then operation into memory of corresponding computer program is read in nonvolatile memory, in logical layer Authentication device is formed on face.Processor executes the program that memory is stored, and is specifically used for executing following operation:
Determine that user requests the target account of operation;
Obtain the current vocal print of the user;
If there are corresponding history vocal prints for the target account, based on the current vocal print of the user and the target The matching status of the corresponding history vocal print of account, determines the user to the operating right of the target account.
The method that authentication device disclosed in the above-mentioned embodiment illustrated in fig. 8 such as this specification executes can be applied to processor In, or realized by processor.Processor may be a kind of IC chip, the processing capacity with signal.It was realizing Each step of Cheng Zhong, the above method can be complete by the integrated logic circuit of the hardware in processor or the instruction of software form At.Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit, CPU), Network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal Processor, DSP), it is specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing Field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device are divided Vertical door or transistor logic, discrete hardware components.It may be implemented or execute and is in this specification embodiment disclosed Each method, step and logic diagram.General processor can be microprocessor or the processor be also possible to it is any conventional Processor etc..The step of method in conjunction with disclosed in this specification embodiment, can be embodied directly in hardware decoding processor execution Complete, or in decoding processor hardware and software module combine execute completion.Software module can be located at random storage Device, flash memory, read-only memory, this fields such as programmable read only memory or electrically erasable programmable memory, register at In ripe storage medium.The storage medium is located at memory, and processor reads the information in memory, completes in conjunction with its hardware The step of stating method.
The method that the electronic equipment can also carry out Fig. 1, and realize the function of authentication device embodiment shown in Fig. 1, this theory Details are not described herein for bright book embodiment.
Certainly, other than software realization mode, other implementations are not precluded in the electronic equipment of this specification, such as Logical device or the mode of software and hardware combining etc., that is to say, that the executing subject of following process flow is not limited to each Logic unit is also possible to hardware or logical device.
This specification embodiment also proposed a kind of computer readable storage medium, the computer-readable recording medium storage One or more programs, the one or more program include instruction, and the instruction is when by the portable electric including multiple application programs When sub- equipment executes, the method that the portable electronic device can be made to execute embodiment illustrated in fig. 1, and be specifically used for executing following Method:
Determine that user requests the target account of operation;
Obtain the current vocal print of the user;
If there are corresponding history vocal prints for the target account, based on the current vocal print of the user and the target The matching status of the corresponding history vocal print of account, determines the user to the operating right of the target account.
Fig. 9 is the structural schematic diagram of one embodiment authentication device of this specification.Referring to FIG. 9, real in a kind of software It applies in mode, authentication device 900 can include: determination unit 901, acquiring unit 902 and authenticating unit 903, wherein
Determination unit 901, for determining that user requests the target account of operation;
Acquiring unit 902, for obtaining the current vocal print of the user;
Authenticating unit 903, for, there are in the case where corresponding history vocal print, being based on the user in the target account The matching status of current vocal print history vocal print corresponding with the target account, determines the user to the target account Operating right.
As seen from the above-described embodiment, the embodiment can user by customer service system carry out account operation during, Authentication is carried out to the user using sound groove recognition technology in e, since vocal print is the biological characteristic of the uniqueness of people, i.e. vocal print is It can not be stolen, therefore there is very high safety, can be revealed to avoid user information and cause to emit the person of recognizing to account progress phase Close operation bring loss.
Optionally, as one embodiment, the authenticating unit 903 may include:
First permission determines subelement, in the current vocal print of user historical acoustic corresponding with the target account In the matched situation of line, determine that the user has the permission operated to the target account;
Second permission determines subelement, in the current vocal print of user historical acoustic corresponding with the target account In the unmatched situation of line, determine that the user does not have the permission operated to the target account.
Optionally, as one embodiment, the authenticating unit 903 can also include:
First instruction subelement, in the current vocal print of user history vocal print corresponding with the target account In the case where matching, indicate that the user pronounces according to the first specified content;
First permission determines subelement, specifically for the user it is practical pronounce content and described first specified In the case where content matching, determine that the user has the permission operated to the target account.
Optionally, as one embodiment, the determination unit 901 may include:
First account determines subelement, for determining that the user requests behaviour in the case where user passes through telephony access The target account of work.
Optionally, as one embodiment, first account determines subelement, may include:
Relation table obtains subelement, for obtaining relation table, the relation table in the case where user passes through telephony access Middle record has the corresponding relationship of account and telephone number;
Second account determines subelement, for determining the corresponding account of the incoming number of the user according to the relation table Family;
Third account determines subelement, for the corresponding account of the incoming number of the user to be determined as target account.
Optionally, as one embodiment, first account determines subelement, can also include:
Subelement is prompted, whether is agreed to for prompting using the corresponding account of the incoming number of the user as target account Family;
The third account determines subelement, specifically for determine the user agree in the case where, by the user The corresponding account of incoming number be determined as target account.
Optionally, as one embodiment, the determination unit 901 may include:
4th account determines subelement, for determining that the user requests behaviour in the case where user passes through network insertion The target account of work.
Optionally, as one embodiment, the determination unit 901 may include:
First voice obtains subelement, includes for describing in first voice for obtaining the first voice of user The sound bite of account;
5th account determines subelement, for account described in the sound bite to be determined as target account.
Optionally, as one embodiment, the acquiring unit 902 may include:
Second voice obtains subelement, for obtaining the second voice of the user;
Feature extraction subelement, for extracting acoustic feature from second voice;
Vocal print obtains subelement, for extracting the vocal print for characterizing the user identity from the acoustic feature.
Optionally, as one embodiment, second voice obtains subelement, may include:
Second instruction subelement is used to indicate the user and pronounces according to the second specified content;
Phonetic incepting subelement, the voice to pronounce for receiving the user according to the second specified content.
Optionally, as one embodiment, second voice obtains subelement, and it is random to be specifically used for the acquisition user The voice that sounding obtains.
Optionally, as one embodiment, the feature extraction subelement may include:
Acoustic feature extracts subelement, is used in the case where second voice meets and imposes a condition, from described second Acoustic feature is extracted in voice;
Described impose a condition include at least one of following: the duration of the second voice reaches duration threshold value, the second voice is made an uproar Sound is lower than noise threshold, the volume of the second voice reaches volume threshold, the session number in the second voice is 1.
Optionally, as one embodiment, described device can also include:
Prompt unit, for unmatched in the current vocal print of user history vocal print corresponding with the target account In the case of, it prompts to need to be operated by the holder of the target account.
The method that authentication device 900 can also carry out embodiment illustrated in fig. 1, and realize authentication device embodiment shown in Fig. 9 Function, details are not described herein for this specification embodiment.
In short, being not intended to limit the protection of this specification the foregoing is merely the preferred embodiment of this specification Range.For all spirit in this specification within principle, any modification, equivalent replacement, improvement and so on should be included in this Within the protection scope of specification.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment The combination of equipment.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.

Claims (16)

1. a kind of method for authenticating, which comprises
Determine that user requests the target account of operation;
Obtain the current vocal print of the user;
If there are corresponding history vocal prints for the target account, based on the current vocal print of the user and the target account The matching status of corresponding history vocal print determines the user to the operating right of the target account.
2. the method as described in claim 1, the vocal print current based on the user is corresponding with the target account to be gone through The matching status of history vocal print determines the user to the operating right of the target account, comprising:
In the current vocal print of user history voice print matching corresponding with the target account, determine the user have pair The permission that the target account is operated;
When the current vocal print of user history vocal print corresponding with the target account mismatches, determine that the user does not have There is the permission operated to the target account.
3. method according to claim 2 has the power operated to the target account in the determination user Before limit, further includes:
Indicate that the user pronounces according to the first specified content;
The determination user has the permission operated to the target account, comprising:
The user it is practical pronounce content and when the first specified content matching, determine that the user has to the mesh The permission that mark account is operated.
4. the method as described in claim 1, the determining user requests the target account of operation, comprising:
When user passes through telephony access, determine that the user requests the target account of operation.
5. method as claimed in claim 4, described when user passes through telephony access, determine that the user requests the mesh of operation Mark account, comprising:
When user passes through telephony access, relation table is obtained, record has account is corresponding with telephone number to close in the relation table System;
According to the relation table, the corresponding account of the incoming number of the user is determined;
The corresponding account of the incoming number of the user is determined as target account.
6. method as claimed in claim 5 is determined as target account in the corresponding account of the incoming number by the user Before family, further includes:
Whether prompt is agreed to using the corresponding account of the incoming number of the user as target account;
The corresponding account of the incoming number by the user is determined as target account, comprising:
When determining that the user agrees to, the corresponding account of the incoming number of the user is determined as target account.
7. the method as described in claim 1, the determining user requests the target account of operation, comprising:
When user passes through network insertion, determine that the user requests the target account of operation.
8. the method as described in claim 1, the determining user requests the target account of operation, comprising:
The first voice of user is obtained, includes the sound bite for describing account in first voice;
Account described in the sound bite is determined as target account.
9. the method as described in claim 1, described to obtain the current vocal print of the user, comprising:
Obtain the second voice of the user;
Acoustic feature is extracted from second voice;
The vocal print for characterizing the user identity is extracted from the acoustic feature.
10. method as claimed in claim 9, second voice for obtaining the user, comprising:
Indicate that the user pronounces according to the second specified content;
Receive the voice that the user pronounces according to the second specified content.
11. method as claimed in claim 9, second voice for obtaining the user, comprising:
Obtain the voice that the random sounding of the user obtains.
12. method as claimed in claim 9, described to extract acoustic feature from second voice, comprising:
When second voice meets and imposes a condition, acoustic feature is extracted from second voice;
Described impose a condition includes at least one of following: the duration of the second voice reaches the low noise of duration threshold value, the second voice In the volume of noise threshold, the second voice reaches volume threshold, the session number in the second voice is 1.
13. method according to claim 2, the method also includes:
When the current vocal print of user history vocal print corresponding with the target account mismatches, prompt to need by the mesh The holder of mark account operates.
14. a kind of authentication device, described device include:
Determination unit, for determining that user requests the target account of operation;
Acquiring unit, for obtaining the current vocal print of the user;
Authenticating unit, in the target account there are in the case where corresponding history vocal print, it is current based on the user The matching status of vocal print history vocal print corresponding with the target account, determines the user to the operating rights of the target account Limit.
15. a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute following operation:
Determine that user requests the target account of operation;
Obtain the current vocal print of the user;
If there are corresponding history vocal prints for the target account, based on the current vocal print of the user and the target account The matching status of corresponding history vocal print determines the user to the operating right of the target account.
16. a kind of computer storage medium, the computer-readable recording medium storage one or more program, it is one or Multiple programs are when the electronic equipment for being included multiple application programs executes, so that the electronic equipment executes following operation:
Determine that user requests the target account of operation;
Obtain the current vocal print of the user;
If there are corresponding history vocal prints for the target account, based on the current vocal print of the user and the target account The matching status of corresponding history vocal print determines the user to the operating right of the target account.
CN201710835052.4A 2017-09-15 2017-09-15 Authentication method and device Active CN109510806B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710835052.4A CN109510806B (en) 2017-09-15 2017-09-15 Authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710835052.4A CN109510806B (en) 2017-09-15 2017-09-15 Authentication method and device

Publications (2)

Publication Number Publication Date
CN109510806A true CN109510806A (en) 2019-03-22
CN109510806B CN109510806B (en) 2021-12-24

Family

ID=65745085

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710835052.4A Active CN109510806B (en) 2017-09-15 2017-09-15 Authentication method and device

Country Status (1)

Country Link
CN (1) CN109510806B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110166634A (en) * 2019-06-06 2019-08-23 深圳前海微众银行股份有限公司 User identity assists in identifying method, apparatus, equipment and readable storage medium storing program for executing
CN111899744A (en) * 2020-07-16 2020-11-06 中国联合网络通信集团有限公司 Voice information processing method, device, server and storage medium
CN112652314A (en) * 2020-12-30 2021-04-13 太平金融科技服务(上海)有限公司 Method, device, equipment and medium for verifying disabled object based on voiceprint shading
CN112968777A (en) * 2021-02-02 2021-06-15 支付宝(杭州)信息技术有限公司 Data processing method, device, equipment and medium
WO2021135549A1 (en) * 2020-05-22 2021-07-08 平安科技(深圳)有限公司 Service item processing permissions authorization method and apparatus, computer device, and storage medium
CN113256288A (en) * 2021-06-08 2021-08-13 中国银行股份有限公司 Bank card hanging-off method and device
CN114677634A (en) * 2022-05-30 2022-06-28 成都新希望金融信息有限公司 Surface label identification method and device, electronic equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101685635A (en) * 2008-09-23 2010-03-31 吕共欣 Identity authentication system and method
CN102393943A (en) * 2011-06-27 2012-03-28 中国建设银行股份有限公司 Safe handling device and method for telephone bank system
US8620666B1 (en) * 2009-08-07 2013-12-31 West Corporation System, method, and computer-readable medium that facilitate voice biometrics user authentication
CN103730120A (en) * 2013-12-27 2014-04-16 深圳市亚略特生物识别科技有限公司 Voice control method and system for electronic device
CN104348621A (en) * 2013-08-02 2015-02-11 成都林海电子有限责任公司 Authentication system based on voiceprint recognition and method thereof
CN104392353A (en) * 2014-10-08 2015-03-04 无锡指网生物识别科技有限公司 Payment method and system of voice recognition terminal
CN105553947A (en) * 2015-12-08 2016-05-04 腾讯科技(深圳)有限公司 Methods and devices for finding account back, protecting account security and preventing account theft
CN105868972A (en) * 2016-03-29 2016-08-17 上海斐讯数据通信技术有限公司 Payment system and method for reporting lost
CN106778162A (en) * 2016-11-29 2017-05-31 深圳天珑无线科技有限公司 A kind of method for locking an account and Cloud Server

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101685635A (en) * 2008-09-23 2010-03-31 吕共欣 Identity authentication system and method
US8620666B1 (en) * 2009-08-07 2013-12-31 West Corporation System, method, and computer-readable medium that facilitate voice biometrics user authentication
CN102393943A (en) * 2011-06-27 2012-03-28 中国建设银行股份有限公司 Safe handling device and method for telephone bank system
CN104348621A (en) * 2013-08-02 2015-02-11 成都林海电子有限责任公司 Authentication system based on voiceprint recognition and method thereof
CN103730120A (en) * 2013-12-27 2014-04-16 深圳市亚略特生物识别科技有限公司 Voice control method and system for electronic device
CN104392353A (en) * 2014-10-08 2015-03-04 无锡指网生物识别科技有限公司 Payment method and system of voice recognition terminal
CN105553947A (en) * 2015-12-08 2016-05-04 腾讯科技(深圳)有限公司 Methods and devices for finding account back, protecting account security and preventing account theft
CN105868972A (en) * 2016-03-29 2016-08-17 上海斐讯数据通信技术有限公司 Payment system and method for reporting lost
CN106778162A (en) * 2016-11-29 2017-05-31 深圳天珑无线科技有限公司 A kind of method for locking an account and Cloud Server

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110166634A (en) * 2019-06-06 2019-08-23 深圳前海微众银行股份有限公司 User identity assists in identifying method, apparatus, equipment and readable storage medium storing program for executing
WO2021135549A1 (en) * 2020-05-22 2021-07-08 平安科技(深圳)有限公司 Service item processing permissions authorization method and apparatus, computer device, and storage medium
CN111899744A (en) * 2020-07-16 2020-11-06 中国联合网络通信集团有限公司 Voice information processing method, device, server and storage medium
CN112652314A (en) * 2020-12-30 2021-04-13 太平金融科技服务(上海)有限公司 Method, device, equipment and medium for verifying disabled object based on voiceprint shading
CN112968777A (en) * 2021-02-02 2021-06-15 支付宝(杭州)信息技术有限公司 Data processing method, device, equipment and medium
CN113256288A (en) * 2021-06-08 2021-08-13 中国银行股份有限公司 Bank card hanging-off method and device
CN113256288B (en) * 2021-06-08 2024-02-27 中国银行股份有限公司 Bank card unhooking method and device
CN114677634A (en) * 2022-05-30 2022-06-28 成都新希望金融信息有限公司 Surface label identification method and device, electronic equipment and storage medium
CN114677634B (en) * 2022-05-30 2022-09-27 成都新希望金融信息有限公司 Surface label identification method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN109510806B (en) 2021-12-24

Similar Documents

Publication Publication Date Title
CN109510806A (en) Method for authenticating and device
CN109428719B (en) Identity verification method, device and equipment
US8812319B2 (en) Dynamic pass phrase security system (DPSS)
US10665244B1 (en) Leveraging multiple audio channels for authentication
WO2019085575A1 (en) Voiceprint authentication method and apparatus, and account registration method and apparatus
CN104639517B (en) The method and apparatus for carrying out authentication using human body biological characteristics
US11983259B2 (en) Authentication via a dynamic passphrase
WO2017045414A1 (en) Account login method and apparatus
CN111223485A (en) Intelligent interaction method and device, electronic equipment and storage medium
US10623403B1 (en) Leveraging multiple audio channels for authentication
EP4143719B1 (en) Techniques to provide sensitive information over a voice connection
CA2984787C (en) System and method for performing caller identity verification using multi-step voice analysis
CN107886958A (en) Express cabinet pickup method and device based on voiceprint
CN111883140A (en) Authentication method, device, equipment and medium based on knowledge graph and voiceprint recognition
CN103678977A (en) Method and electronic device for protecting information security
CN108417216A (en) Speech verification method, apparatus, computer equipment and storage medium
CN107533598B (en) Input method and device of login password of application program and terminal
CN104954532B (en) The method and device and mobile terminal of speech recognition
CN112417412A (en) Bank account balance inquiry method, device and system
WO2017084591A1 (en) Identification method and device for malicious call
WO2021244471A1 (en) Real-name authentication method and device
US20220321350A1 (en) System for voice authentication through voice recognition and voiceprint recognition
US20120330663A1 (en) Identity authentication system and method
CN109450639A (en) Method, apparatus, electronic equipment and the computer readable storage medium of authentication
CN110010135A (en) A kind of voice-based personal identification method, device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40005611

Country of ref document: HK

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant