CN109801633A - Method for processing business, device, electronic equipment and storage medium - Google Patents

Method for processing business, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN109801633A
CN109801633A CN201910090663.XA CN201910090663A CN109801633A CN 109801633 A CN109801633 A CN 109801633A CN 201910090663 A CN201910090663 A CN 201910090663A CN 109801633 A CN109801633 A CN 109801633A
Authority
CN
China
Prior art keywords
authentication
user
voiceprint
security level
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910090663.XA
Other languages
Chinese (zh)
Inventor
郑方
邬晓钧
滑国阔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING D-EAR TECHNOLOGIES Co Ltd
Original Assignee
BEIJING D-EAR TECHNOLOGIES Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING D-EAR TECHNOLOGIES Co Ltd filed Critical BEIJING D-EAR TECHNOLOGIES Co Ltd
Priority to CN201910090663.XA priority Critical patent/CN109801633A/en
Publication of CN109801633A publication Critical patent/CN109801633A/en
Pending legal-status Critical Current

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the present disclosure provides a kind of method for processing business, device, electronic equipment and storage medium.Method for processing business includes: the certification voice data for receiving user;According to the certification voice data, the vocal print authentication for authenticating security level corresponding with the business operation being currently related to is carried out to the user, determines identity authentication result;According to the identity authentication result that instruction certification passes through, the business operation of the user is executed.It is directed to different user's operation safety requirements as a result, the vocal print authentication of corresponding certification security level is provided, to preferably meet the operational requirements of user while ensuring that user's operation is safe.

Description

Service processing method and device, electronic equipment and storage medium
Technical Field
The embodiment of the disclosure relates to the technical field of information processing, and in particular, to a service processing method and apparatus, an electronic device, and a storage medium.
Background
In internet applications involving various business operations, such as internet banking, mobile banking, financial services, social security services, online shopping, etc., various operations, such as login, inquiry, order placement, payment, etc., are generally involved, and each operation has a different effect on a user. For example, neither the login operation nor the query operation actually results in a transfer of the user's funds or property, whereas the payment, transfer, etc. operations actually result in a transfer of the user's funds or property. User authentication or authorization during operations such as payment and transfer causes problems, and the influence on the benefit of the user is greater.
Disclosure of Invention
The embodiment of the disclosure provides a service processing technical scheme, which automatically provides identity authentication modes with different security levels for a user, so as to ensure the security of user operation and improve the convenience of user operation.
According to a first aspect of the present disclosure, a service processing method is provided, including: receiving authentication voice data of a user; according to the authentication voice data, performing voiceprint identity authentication of an authentication security level corresponding to the currently related business operation on the user, and determining an identity authentication result; and executing the service operation of the user according to the identity authentication result indicating that the authentication is passed.
Optionally, the performing voiceprint identity authentication corresponding to the currently related service operation on the user according to the authentication voice data to determine an identity authentication result includes: extracting voiceprint feature data from the authentication voice data, and comparing the voiceprint feature data with archived voiceprint feature data of the user, wherein a first comparison result is determined according to a first authentication comparison threshold corresponding to the authentication security level, and the identity authentication result is determined according to the first comparison result; or extracting voiceprint model data from the authentication voice data, and comparing the voiceprint model data with archived voiceprint model data of the user, wherein a second comparison result is determined according to a second authentication comparison threshold corresponding to the authentication security level, and the identity authentication result is determined according to the second comparison result; or extracting voiceprint characteristic data from the authentication voice data, and scoring the voiceprint characteristic data on archived voiceprint model data of the user, wherein a scoring result is determined according to a third authentication comparison threshold corresponding to the authentication security level, and the identity authentication result is determined according to the scoring result.
Optionally, the first authentication comparison threshold or the second authentication comparison threshold is a threshold of an authentication error acceptance rate, or the first authentication comparison threshold or the second authentication comparison threshold is a threshold of an authentication error rejection rate, and the third authentication comparison threshold is a threshold of an authentication error acceptance rate or a threshold of an authentication error rejection rate.
Optionally, before performing voiceprint identity authentication of an authentication security level corresponding to the currently involved service operation on the user according to the authentication voice data and determining an identity authentication result, the method further includes: receiving a service request message of a user; and determining the corresponding authentication security level according to the service task corresponding to the service request message.
Optionally, the business tasks include at least one of the following tasks: the system comprises a login task, an inquiry task, a credit investigation task and a payment task, wherein the payment task corresponds to the highest authentication security level.
Optionally, before performing voiceprint identity authentication of an authentication security level corresponding to the currently involved service operation on the user according to the authentication voice data and determining an identity authentication result, the method further includes: and determining the corresponding authentication security level according to the current application scene.
Optionally, the application scenario includes at least one of the following scenarios: entrance guard, finance, attendance, social security, letter guarantor and government affairs, wherein, the finance application scene corresponds the highest authentication security level.
According to a second aspect of the present disclosure, there is provided a service processing apparatus, including: the voice receiving module is used for receiving authentication voice data of a user; the voiceprint authentication module is used for carrying out voiceprint identity authentication of an authentication security level corresponding to the currently related business operation on the user according to the authentication voice data received by the voice receiving module and determining an identity authentication result; and the service execution module is used for executing the service operation of the user according to the identity authentication result indicating that the authentication passes.
Optionally, the voiceprint authentication module comprises: the first authentication unit is used for extracting voiceprint feature data from the authentication voice data and comparing the voiceprint feature data with archived voiceprint feature data of the user, wherein a first comparison result is determined according to a first authentication comparison threshold corresponding to the authentication security level, and the identity authentication result is determined according to the first comparison result; or, the second authentication unit is configured to extract voiceprint model data from the authentication voice data, compare the voiceprint model data with archived voiceprint model data of the user, determine a second comparison result according to a second authentication comparison threshold corresponding to the authentication security level, and determine the identity authentication result according to the second comparison result; or, a third authentication unit, configured to extract voiceprint feature data from the authentication voice data, and score the voiceprint feature data on archived voiceprint model data of the user, where a scoring result is determined according to a third authentication comparison threshold corresponding to the authentication security level, and the identity authentication result is determined according to the scoring result.
Optionally, the first authentication comparison threshold or the second authentication comparison threshold is a threshold of an authentication error acceptance rate, or the first authentication comparison threshold or the second authentication comparison threshold is a threshold of an authentication error rejection rate, and the third authentication comparison threshold is a threshold of an authentication error acceptance rate or a threshold of an authentication error rejection rate.
Optionally, before the voiceprint authentication module performs voiceprint identity authentication of an authentication security level corresponding to the currently involved business operation on the user according to the authentication voice data and determines an identity authentication result, the apparatus further includes: a service request receiving module, configured to receive a service request message of a user; and the first security level determining module is used for determining the corresponding authentication security level according to the service task corresponding to the service request message.
Optionally, the business tasks include at least one of the following tasks: the system comprises a login task, an inquiry task, a credit investigation task and a payment task, wherein the payment task corresponds to the highest authentication security level.
Optionally, before the voiceprint authentication module performs voiceprint identity authentication of an authentication security level corresponding to the currently involved business operation on the user according to the authentication voice data and determines an identity authentication result, the apparatus further includes: and the second security level determining module is used for determining the corresponding authentication security level according to the current application scene.
Optionally, the application scenario includes at least one of the following scenarios: entrance guard, finance, attendance, social security, letter guarantor and government affairs, wherein, the finance application scene corresponds the highest authentication security level.
According to a third aspect of the present disclosure, there is provided an electronic device comprising: a processor and a memory; the memory is configured to store at least one executable instruction that causes the processor to perform the steps of any of the aforementioned business process methods.
According to a fourth aspect of the present disclosure, there is provided a computer-readable storage medium, wherein the computer-readable storage medium stores executable instructions, which cause the processor to perform the steps of any of the aforementioned business processing methods.
By the service processing scheme provided by the embodiment of the disclosure, when a service task of a user is executed, before corresponding service operation is actually executed, voiceprint identity authentication of an authentication security level corresponding to the service operation can be performed according to authentication voice of the user, and then the service operation of the user is executed according to an identity authentication result indicating that the authentication passes. Therefore, voiceprint identity authentication of corresponding authentication security levels is provided according to different user operation security requirements, and the user operation security is ensured, and meanwhile the operation requirements of the user are better met.
Drawings
FIG. 1 is a flow diagram illustrating a business process method according to some embodiments of the present disclosure;
FIG. 2 is a flow diagram illustrating a business process method according to further embodiments of the present disclosure;
FIG. 3 is a flow diagram illustrating a business process method according to further embodiments of the present disclosure;
FIG. 4 is a logical block diagram illustrating a traffic processing apparatus according to some embodiments of the present disclosure;
FIG. 5 is a logical block diagram illustrating an exemplary structure of the voiceprint authentication module 420 in FIG. 4;
fig. 6 is a schematic diagram illustrating a structure of an electronic device according to some embodiments of the present disclosure.
Detailed Description
The following detailed description of embodiments of the present disclosure is provided in conjunction with the accompanying drawings (like numerals represent like elements throughout the several figures) and examples. The following examples are intended to illustrate the present disclosure, but are not intended to limit the scope of the present disclosure.
It will be understood by those of skill in the art that the terms "first," "second," and the like in the embodiments of the present disclosure are used merely to distinguish one element from another, and are not intended to imply any particular technical meaning, nor is the necessary logical order between them.
Fig. 1 is a flow diagram illustrating a traffic processing method according to some embodiments of the present disclosure. The service processing method of fig. 1 is executed at the server side.
When a user needs to log in, inquire account balance or transfer account in mobile banking application, update information on a social security website or pay goods fee on an e-commerce website, the user can be prompted to input authentication voice data in a speaking mode, and the user can be prompted to speak any speaking voice with a certain duration for voiceprint identity authentication of the user.
According to an optional implementation mode of the invention, the authentication prompt information comprising the random dynamic code or the prompt statement can be sent to the client of the user and provided to the user in a text or voice mode, wherein the prompt statement can be a statement which needs to be repeatedly spoken by the user or a question statement which needs to be answered by the user. After checking or hearing the authentication prompt message, the user speaks the random dynamic code or the message corresponding to the prompt statement to prevent the user of the client from impersonating the user identity by using the pre-recorded voice data.
The speech of the user is collected as the authentication speech data of the user by the speech collection device of the client, and is sent to the server, thereby triggering the voiceprint identity authentication and the service operation of the following step S110 and the subsequent steps.
Referring to fig. 1, in step S110, authenticated voice data of a user is received.
Here, the authentication voice data may be received from the client, or authentication voice data of the user collected by another device may be acquired.
As mentioned above, the authentication voice data may include any speech of the user, and may also include speech corresponding to the authentication prompt information, so as to perform voiceprint authentication on the user.
In step S120, according to the authentication voice data, voiceprint identity authentication of an authentication security level corresponding to the currently involved business operation is performed on the user, and an identity authentication result is determined.
In the existing voiceprint identity authentication method, voiceprint identity authentication is performed on a user according to the same authentication security level aiming at any service operation needing identity authentication. This approach is relatively logically simple, but the requirements for user operational security for different business operations are different: if the set authentication passing standard is too low, the user operation safety cannot be actually ensured for the business operation with high requirement on the user operation safety; if the set authentication pass standard is too high, the condition that the identity authentication cannot be passed can occur for the business operation with low requirement on the user operation safety. Therefore, setting the same authentication security level cannot better satisfy different requirements of user operation security.
According to the basic inventive concept of the invention, aiming at various related business operations, the corresponding authentication security level is set, and the voiceprint identity authentication is executed according to the authentication security level corresponding to the related business operations, so that different user operation security requirements can be better met.
For example, different authentication security levels may be set by default, corresponding to different application scenarios. Before step S110 is executed (e.g., at the time of application/program start), the corresponding authentication security level is determined according to the current application scenario. Here, the application scenario may include, but is not limited to, finance, attendance, social security, credit security, government affairs, and the like. Wherein the financial application scenario may correspond to a highest authentication security level.
When voiceprint recognition or voiceprint identity authentication is carried out, feature comparison or voiceprint scoring is usually involved, and both the feature comparison and the voiceprint scoring involve comparison thresholds, and the voiceprint recognition or voiceprint identity authentication result is directly influenced by setting the comparison threshold.
On the other hand, in order to perform authentication using the biometric data of the user, when an account is set up for the user, voice data of the user is collected, voiceprint feature analysis and modeling are performed, and the voiceprint feature data of the user obtained through analysis is stored as archived voiceprint feature data, or the voiceprint model data obtained through analysis is stored as archived voiceprint model data. The saved archived voiceprint feature data or the archived voiceprint model data are used for comparing and scoring voiceprint information extracted from the voice of the user when voiceprint identity authentication is performed.
According to an optional implementation manner of the present invention, in step S120, voiceprint feature data is extracted from the authentication voice data, and the voiceprint feature data is compared with archived voiceprint feature data of the user, wherein a first comparison result is determined according to a first authentication comparison threshold corresponding to the authentication security level, and the identity authentication result is determined according to the first comparison result.
For example, the first authentication comparison threshold may be a threshold of an authentication error acceptance rate in the feature comparison, and the higher the threshold of the authentication error acceptance rate is set, the lower the corresponding authentication security level is; the lower the threshold value of the authentication error acceptance rate is set, the higher the corresponding authentication security level is.
For another example, the first authentication comparison threshold may be a threshold of an authentication error rejection rate in the feature comparison, and the higher the threshold of the authentication error rejection rate is set, the higher the corresponding authentication security level is; the lower the threshold of the authentication error rejection rate is set, the lower the corresponding authentication security level.
The first authentication comparison threshold is not limited to be set as the two thresholds, and may be set as other thresholds suitable for voiceprint feature comparison.
According to another optional implementation manner of the present invention, in step S120, voiceprint model data is extracted from the authentication voice data, and the voiceprint model data is compared with archived voiceprint model data of the user, wherein a second comparison result is determined according to a second authentication comparison threshold corresponding to the authentication security level, and the identity authentication result is determined according to the second comparison result.
Similarly, the second authentication comparison threshold may be a threshold of an authentication false acceptance rate in the feature comparison pair, and the higher the threshold of the authentication false acceptance rate is set, the lower the corresponding authentication security level is; the lower the threshold value of the authentication error acceptance rate is set, the higher the corresponding authentication security level is.
Or, the second authentication comparison threshold may be a threshold of an authentication error rejection rate in the feature comparison, and the higher the threshold of the authentication error rejection rate is set, the higher the corresponding authentication security level is; the lower the threshold of the authentication error rejection rate is set, the lower the corresponding authentication security level.
Similarly, the second authentication comparison threshold is not limited to be set as the two thresholds, and may also be set as other thresholds suitable for voiceprint feature comparison.
According to another optional implementation manner of the present invention, in step S120, voiceprint feature data is extracted from the authentication voice data, and the voiceprint feature data is scored on the archived voiceprint model data of the user, wherein a scoring result is determined according to a third authentication comparison threshold corresponding to the authentication security level, and the identity authentication result is determined according to the scoring result.
For example, the third authentication comparison threshold may be a threshold of an authentication error acceptance rate in the voiceprint feature score, and the higher the threshold of the authentication error acceptance rate is set, the lower the corresponding authentication security level is; the lower the threshold value of the authentication error acceptance rate is set, the higher the corresponding authentication security level is.
For another example, the third authentication comparison threshold may be a threshold of an authentication error rejection rate in the feature score, and the higher the threshold of the authentication error rejection rate is set, the higher the corresponding authentication security level is; the lower the threshold of the authentication error rejection rate is set, the lower the corresponding authentication security level.
Similarly, the third authentication comparison threshold is not limited to be set as the two thresholds, and may also be set as other thresholds suitable for voiceprint feature scoring.
In step S130, according to the identity authentication result indicating that the authentication is passed, the service operation of the user is executed.
That is, after determining that voiceprint authentication is passed, currently involved business operations, such as, but not limited to, payment operations, transfer operations, query operations, etc., are performed.
Thereafter, the results of the execution of the business operations may be sent to the client for notification to the user.
Through the processing, before the corresponding business operation is actually executed when the business task of the user is executed, the voiceprint identity authentication of the authentication security level corresponding to the business operation can be carried out according to the authentication voice of the user, and then the business operation of the user is executed according to the identity authentication result indicating that the authentication passes. Therefore, voiceprint identity authentication of corresponding authentication security levels is provided according to different user operation security requirements, and the user operation security is ensured, and meanwhile the operation requirements of the user are better met.
FIG. 2 is a flow diagram illustrating a business process method according to further embodiments of the present disclosure.
Generally, when a business task such as a login task, an inquiry task, a payment task, etc. is executed, a client sends a business request message indicating that the business task is to be executed to a server; the server side responds to the received service request message, sends authentication prompt information such as a random dynamic code or a prompt statement to the client side, and then the user of the client side inputs authentication voice. Here, the server may determine the corresponding authentication security level according to the corresponding service task after receiving the service request message. And then, after receiving the authentication voice, carrying out voiceprint identity authentication according to the determined authentication security level. Thus, an authentication security level may be dynamically determined according to the business task and voiceprint identity authentication of the determined authentication security level may be performed.
Referring to fig. 2, a service request message of a user is received at step S210.
For example, when a user of the client initiates a task of order payment, the client sends a service request message indicating that order payment is to be performed to the server. The server may perform the following processing steps after receiving the service request message of the user.
In step S220, a corresponding authentication security level is determined according to the service task corresponding to the service request message.
The server side can determine the authentication security level corresponding to the business task according to the influence degree on the user assets. Since the transfer tasks and payment tasks actually cause the transfer of assets, the highest authentication security level can be set for the transfer tasks and payment tasks.
In step S230, authentication voice data of the user is received.
In step S240, according to the authentication voice data, voiceprint identity authentication with the determined authentication security level is performed on the user, and an identity authentication result is determined.
In step S250, the service operation of the user is executed according to the identity authentication result indicating that the authentication is passed.
Through the processing, when a user initiates a business task, the authentication security level can be dynamically determined and adjusted according to the business task, and the voiceprint identity authentication of the determined authentication security level is executed, so that the operation safety of the user is ensured, and the operation convenience is better provided for the user.
FIG. 3 is a flow diagram illustrating a business process method according to further embodiments of the present disclosure.
Referring to fig. 3, a default authentication security level is determined according to a current application scenario at step S310.
In step S320, a service request message of a user is received.
In step S330, a corresponding authentication security level is determined according to the service task corresponding to the service request message and the default authentication security level.
In step S340, authentication voice data of the user is received.
In step S350, according to the authentication voice data, voiceprint authentication with the determined authentication security level is performed on the user, and an authentication result is determined.
In step S360, the service operation of the user is executed according to the identity authentication result indicating that the authentication is passed.
Through the processing, for example, when the application is started, the default authentication security level is set according to the application scene, and when the user initiates a service task, the authentication security level is dynamically determined and adjusted according to the service task and the default authentication security level, and the voiceprint identity authentication of the determined authentication security level is executed, so that the operation safety of the user is ensured, and the operation convenience is better provided for the user.
Fig. 4 is a logical block diagram illustrating a traffic processing apparatus 400 according to some embodiments of the present disclosure.
Referring to fig. 4, a service processing apparatus according to some embodiments of the present disclosure includes a voice receiving module 410, a voiceprint authentication module 420, and a service execution module 430.
The voice receiving module 410 is configured to receive authenticated voice data of a user; the voiceprint authentication module 420 is configured to perform voiceprint identity authentication of an authentication security level corresponding to a currently involved service operation on the user according to the authentication voice data received by the voice receiving module 410, and determine an identity authentication result; the service execution module 430 is configured to execute the service operation of the user according to the identity authentication result indicating that the authentication passes.
Optionally, before the voiceprint authentication module 420 performs voiceprint identity authentication of an authentication security level corresponding to the currently involved service operation on the user according to the authentication voice data, and determines an identity authentication result, the service processing apparatus 400 further includes:
a service request receiving module 440, configured to receive a service request message of a user;
the first security level determining module 450 is configured to determine the corresponding authentication security level according to the service task corresponding to the service request message.
Optionally, the business tasks include at least one of the following tasks: the system comprises a login task, an inquiry task, a credit investigation task and a payment task, wherein the payment task corresponds to the highest authentication security level.
Optionally, before the voiceprint authentication module 420 performs voiceprint identity authentication of an authentication security level corresponding to the currently involved service operation on the user according to the authentication voice data, and determines an identity authentication result, the service processing apparatus 400 further includes:
the second security level determining module 460 is configured to determine the corresponding authentication security level according to the current application scenario.
Optionally, the application scenario includes at least one of the following scenarios: entrance guard, finance, attendance, social security, letter guarantor and government affairs, wherein, the finance application scene corresponds the highest authentication security level.
The service processing apparatus 400 has the beneficial effects achieved by any of the foregoing service processing methods, which are not described herein again.
FIG. 5 is a logical block diagram illustrating an exemplary structure of the voiceprint authentication module 420 in FIG. 4;
referring to fig. 5, the voiceprint authentication module 420 can include:
a first authentication unit 421, configured to extract voiceprint feature data from the authentication voice data, and compare the voiceprint feature data with archived voiceprint feature data of the user, where a first comparison result is determined according to a first authentication comparison threshold corresponding to the authentication security level, and the identity authentication result is determined according to the first comparison result; or,
a second authentication unit 422, configured to extract voiceprint model data from the authentication voice data, compare the voiceprint model data with archived voiceprint model data of the user, determine a second comparison result according to a second authentication comparison threshold corresponding to the authentication security level, and determine the identity authentication result according to the second comparison result; or,
a third authentication unit 423, configured to extract voiceprint feature data from the authentication voice data, and score the voiceprint feature data on archived voiceprint model data of the user, where a scoring result is determined according to a third authentication comparison threshold corresponding to the authentication security level, and the identity authentication result is determined according to the scoring result.
Optionally, the first authentication comparison threshold or the second authentication comparison threshold is a threshold of an authentication error acceptance rate, or the first authentication comparison threshold or the second authentication comparison threshold is a threshold of an authentication error rejection rate. In addition, the third authentication comparison threshold is a threshold of an authentication error acceptance rate or a threshold of an authentication error rejection rate.
The embodiment of the disclosure also provides an electronic device. Fig. 6 is a schematic diagram illustrating a structure of an electronic device 600 according to an embodiment of the present disclosure. The electronic device 600 may be, for example, a mobile terminal, a Personal Computer (PC), a tablet, a server, or the like.
As shown in fig. 6, the electronic device 600 may include a memory and a processor. In particular, the electronic device 600 includes one or more processors, communication elements, and the like, for example: one or more Central Processing Units (CPUs) 601, and/or one or more business processors (GPUs) 613, etc., which may perform various appropriate actions and processes according to executable instructions stored in a Read Only Memory (ROM)602 or loaded from a storage section 608 into a Random Access Memory (RAM) 603. The communication elements include a communication component 612 and/or a communication interface 609. The communication component 612 may include, but is not limited to, a network card, which may include, but is not limited to, an ib (infiniband) network card, the communication interface 609 includes a communication interface such as a network interface card of a LAN card, a modem, or the like, and the communication interface 609 performs communication processing via a network such as the internet.
The processor can communicate with the read-only memory 602 and/or the random access memory 603 to execute the executable instructions, connect with the communication component 612 through the communication bus 604, and communicate with other target devices through the communication component 612, thereby completing the operation corresponding to any service processing method provided by the embodiment of the disclosure, for example, receiving the authentication voice data of the user; according to the authentication voice data, performing voiceprint identity authentication of an authentication security level corresponding to the currently related business operation on the user, and determining an identity authentication result; and executing the service operation of the user according to the identity authentication result indicating that the authentication is passed.
In addition, in the RAM 603, various programs and data necessary for the operation of the device can also be stored. The CPU 601 or GPU613, ROM 602, and RAM 603 are connected to each other via a communication bus 604. The ROM 602 is an optional module in case of the RAM 603. The RAM 603 stores or writes executable instructions into the ROM 602 at runtime, and the executable instructions cause the processor to perform operations corresponding to the above-described communication method. An input/output (I/O) interface 605 is also connected to communication bus 604. The communication component 612 may be integrated or configured with multiple sub-modules (e.g., multiple IB network cards) and linked over a communication bus.
The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, a mouse, and the like; an output portion 607 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 608 including a hard disk and the like; and a communication interface 609 including a network interface card such as a LAN card, modem, or the like. The driver 610 is also connected to the I/O interface 605 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that a computer program read out therefrom is mounted in the storage section 608 as necessary.
It should be noted that the architecture shown in fig. 6 is only an optional implementation manner, and in a specific practical process, the number and types of the components in fig. 6 may be selected, deleted, added or replaced according to actual needs; in different functional component settings, separate settings or integrated settings may also be used, for example, the GPU and the CPU may be separately set or the GPU may be integrated on the CPU, the communication element may be separately set, or the GPU and the CPU may be integrated, and so on. These alternative embodiments are all within the scope of the present disclosure.
The electronic device of the embodiment of the present disclosure may be configured to implement the corresponding service processing method in the embodiment, and each device in the electronic device may be configured to execute each step in the embodiment of the method.
According to an embodiment of the present disclosure, the process described above with reference to the flow diagrams may be implemented as a computer program product. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method illustrated in the flow chart, the program code may include instructions corresponding to performing the method steps provided by embodiments of the present disclosure, e.g., instructions for receiving authenticated voice data of a user; the voice print identity authentication of the authentication security level corresponding to the current related business operation is carried out on the user according to the authentication voice data, and an identity authentication result is determined; and the instruction is used for executing the service operation of the user according to the identity authentication result indicating that the authentication is passed. In such embodiments, the computer program may be downloaded and installed from a network through the communication element, and/or installed from the removable media 611. The computer program, when executed by a processor, performs the functions disclosed in the methods of the embodiments of the present disclosure.
The method and apparatus, electronic device, and storage medium of the present disclosure may be implemented in many ways. For example, the methods and apparatuses, the electronic devices, and the storage media of the embodiments of the present disclosure may be implemented by software, hardware, firmware, or any combination of software, hardware, and firmware. The above-described order for the steps of the method is for illustration only, and the steps of the method of the embodiments of the present disclosure are not limited to the order specifically described above unless specifically stated otherwise. Further, in some embodiments, the present disclosure may also be implemented as a program recorded in a recording medium, the program including machine-readable instructions for implementing a method according to an embodiment of the present disclosure. Thus, the present disclosure also covers a recording medium storing a program for executing the method according to an embodiment of the present disclosure.
The description of the embodiments of the present disclosure has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the disclosure in the form disclosed, and many modifications and variations will be apparent to those skilled in the art. The embodiment was chosen and described in order to best explain the principles of the disclosure and the practical application, and to enable others of ordinary skill in the art to understand the disclosure for various embodiments with various modifications as are suited to the particular use contemplated.

Claims (10)

1. A service processing method comprises the following steps:
receiving authentication voice data of a user;
according to the authentication voice data, performing voiceprint identity authentication of an authentication security level corresponding to the currently related business operation on the user, and determining an identity authentication result;
and executing the service operation of the user according to the identity authentication result indicating that the authentication is passed.
2. The method according to claim 1, wherein said performing voiceprint authentication corresponding to a currently involved service operation on the user according to the authentication voice data, and determining an authentication result comprises:
extracting voiceprint feature data from the authentication voice data, and comparing the voiceprint feature data with archived voiceprint feature data of the user, wherein a first comparison result is determined according to a first authentication comparison threshold corresponding to the authentication security level, and the identity authentication result is determined according to the first comparison result; or,
extracting voiceprint model data from the authentication voice data, and comparing the voiceprint model data with archived voiceprint model data of the user, wherein a second comparison result is determined according to a second authentication comparison threshold corresponding to the authentication security level, and the identity authentication result is determined according to the second comparison result; or,
and extracting voiceprint characteristic data from the authentication voice data, and scoring the voiceprint characteristic data on archived voiceprint model data of the user, wherein a scoring result is determined according to a third authentication comparison threshold corresponding to the authentication security level, and the identity authentication result is determined according to the scoring result.
3. The method of claim 2, wherein the first authentication comparison threshold or the second authentication comparison threshold is a threshold for an authentication error acceptance rate, or the first authentication comparison threshold or the second authentication comparison threshold is a threshold for an authentication error rejection rate, and,
the third authentication comparison threshold is a threshold of an authentication error acceptance rate or a threshold of an authentication error rejection rate.
4. The method according to any one of claims 1 to 3, wherein before performing voiceprint identity authentication of an authentication security level corresponding to a currently involved business operation on the user according to the authentication voice data and determining an identity authentication result, the method further comprises:
receiving a service request message of a user;
and determining the corresponding authentication security level according to the service task corresponding to the service request message.
5. The method of claim 4, wherein the business tasks include at least one of: the system comprises a login task, an inquiry task, a credit investigation task and a payment task, wherein the payment task corresponds to the highest authentication security level.
6. The method according to any one of claims 1 to 3, wherein before performing voiceprint identity authentication of an authentication security level corresponding to a currently involved business operation on the user according to the authentication voice data and determining an identity authentication result, the method further comprises:
and determining the corresponding authentication security level according to the current application scene.
7. The method of claim 6, wherein the application scenario comprises at least one of the following scenarios: entrance guard, finance, attendance, social security, letter guarantor and government affairs, wherein, the finance application scene corresponds the highest authentication security level.
8. A traffic processing apparatus, comprising:
the voice receiving module is used for receiving authentication voice data of a user;
the voiceprint authentication module is used for carrying out voiceprint identity authentication of an authentication security level corresponding to the currently related business operation on the user according to the authentication voice data received by the voice receiving module and determining an identity authentication result;
and the service execution module is used for executing the service operation of the user according to the identity authentication result indicating that the authentication passes.
9. An electronic device, comprising: a processor and a memory;
the memory is used for storing at least one executable instruction which causes the processor to execute the steps of the business processing method according to any one of claims 1-7.
10. A computer readable storage medium having stored thereon executable instructions for causing a processor to perform the steps of the traffic processing method according to any of claims 1 to 7.
CN201910090663.XA 2019-01-30 2019-01-30 Method for processing business, device, electronic equipment and storage medium Pending CN109801633A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910090663.XA CN109801633A (en) 2019-01-30 2019-01-30 Method for processing business, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910090663.XA CN109801633A (en) 2019-01-30 2019-01-30 Method for processing business, device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109801633A true CN109801633A (en) 2019-05-24

Family

ID=66559277

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910090663.XA Pending CN109801633A (en) 2019-01-30 2019-01-30 Method for processing business, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109801633A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111274560A (en) * 2020-01-14 2020-06-12 支付宝(杭州)信息技术有限公司 Identity authentication mode recommendation method, device and equipment
CN114005435A (en) * 2021-11-02 2022-02-01 北京元心君盛科技有限公司 Method, device, equipment, medium and program product for responding voice information

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079172A (en) * 2007-07-20 2007-11-28 中国建设银行股份有限公司 Self-aid service system and on-line transaction method
JP4351659B2 (en) * 2005-07-28 2009-10-28 積體數位股▲分▼有限公司 Voiceprint password key system
CN102347929A (en) * 2010-07-28 2012-02-08 阿里巴巴集团控股有限公司 Verification method of user identity and apparatus thereof
CN103745397A (en) * 2014-01-27 2014-04-23 上海坤士合生信息科技有限公司 System and method for realizing electronic transaction risk control based on position scene identification
CN104077516A (en) * 2014-06-26 2014-10-01 华为技术有限公司 Biometric authentication method and terminal
CN108512986A (en) * 2018-04-03 2018-09-07 Oppo广东移动通信有限公司 Auth method, electronic device and computer readable storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4351659B2 (en) * 2005-07-28 2009-10-28 積體數位股▲分▼有限公司 Voiceprint password key system
CN101079172A (en) * 2007-07-20 2007-11-28 中国建设银行股份有限公司 Self-aid service system and on-line transaction method
CN102347929A (en) * 2010-07-28 2012-02-08 阿里巴巴集团控股有限公司 Verification method of user identity and apparatus thereof
CN103745397A (en) * 2014-01-27 2014-04-23 上海坤士合生信息科技有限公司 System and method for realizing electronic transaction risk control based on position scene identification
CN104077516A (en) * 2014-06-26 2014-10-01 华为技术有限公司 Biometric authentication method and terminal
CN108512986A (en) * 2018-04-03 2018-09-07 Oppo广东移动通信有限公司 Auth method, electronic device and computer readable storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111274560A (en) * 2020-01-14 2020-06-12 支付宝(杭州)信息技术有限公司 Identity authentication mode recommendation method, device and equipment
CN111274560B (en) * 2020-01-14 2022-11-18 支付宝(杭州)信息技术有限公司 Identity authentication mode recommendation method, device and equipment
CN114005435A (en) * 2021-11-02 2022-02-01 北京元心君盛科技有限公司 Method, device, equipment, medium and program product for responding voice information

Similar Documents

Publication Publication Date Title
CN108352022B (en) System and method for monitoring computer authentication programs
US8694315B1 (en) System and method for authentication using speaker verification techniques and fraud model
CN109196539B (en) System and method for processing transactions with secure authentication
CN108038687B (en) Transaction method based on voice recognition, server and computer-readable storage medium
EP3564887A1 (en) Biometric data transaction processing
US20150161613A1 (en) Methods and systems for authentications and online transactions
KR20160011709A (en) Method, apparatus and system for payment validation
US20180357645A1 (en) Voice activated payment
US11902275B2 (en) Context-based authentication of a user
US20220150243A1 (en) Authentication server, and non-transitory storage medium
US11126705B2 (en) Systems and methods for user authentication using word-gesture pairs
US10672002B2 (en) Systems and methods for using nonvisual communication to obtain permission for authorizing a transaction
CN109801633A (en) Method for processing business, device, electronic equipment and storage medium
EP3867781B1 (en) Method and server
US20150081545A1 (en) Secure payment by mobile phone
US11037146B2 (en) Managing product returns associated with a user device
CN112201254B (en) Non-inductive voice authentication method, device, equipment and storage medium
US10410215B2 (en) System and method for transaction scoring using delivery receipt history
CN111784355A (en) Transaction security verification method and device based on edge calculation
CN111681106A (en) Method and device for verifying acceptance statement of loan use
US9875474B2 (en) Method for securing a transaction performed by bank card
US20240242223A1 (en) Systems and methods for dynamic risk-assessed serialization of user challenges
CN114637982A (en) Transaction processing method, device, equipment and medium
CN114782048A (en) Loan service request processing method and device
KR20230166475A (en) Method and APPARATUS for detecting malicious mail based on user information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190524

WD01 Invention patent application deemed withdrawn after publication