CN110266734A - Speech verification method, apparatus calculates equipment and medium - Google Patents

Speech verification method, apparatus calculates equipment and medium Download PDF

Info

Publication number
CN110266734A
CN110266734A CN201910679803.7A CN201910679803A CN110266734A CN 110266734 A CN110266734 A CN 110266734A CN 201910679803 A CN201910679803 A CN 201910679803A CN 110266734 A CN110266734 A CN 110266734A
Authority
CN
China
Prior art keywords
voice
target terminal
verifying
transfer channel
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910679803.7A
Other languages
Chinese (zh)
Inventor
傅麟
赵森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN201910679803.7A priority Critical patent/CN110266734A/en
Publication of CN110266734A publication Critical patent/CN110266734A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Biomedical Technology (AREA)
  • Health & Medical Sciences (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Present disclose provides a kind of speech verification methods, for application server, this method comprises: receiving the checking request from target terminal, wherein, checking request includes the terminal iidentification of target terminal, checking request is for requesting application server that target terminal is allowed to execute specific function, determine communication identifier associated with terminal iidentification, and solicited message is generated based on communication identifier, wherein, solicited message includes communication identifier, solicited message is sent to communication company server, wherein, the voice transfer channel that solicited message is used to that communication company server to be requested to be established between application server and target terminal, communication identifier, which is based on, in response to communication company server establishes voice transfer channel, verifying voice is sent to target terminal via voice transfer channel, wherein, whether verifying voice is used to verify target terminal to have and hold The permission of row specific function.The disclosure additionally provides a kind of speech verification device, calculates equipment, medium.

Description

Speech verification method, apparatus calculates equipment and medium
Technical field
This disclosure relates to which field of computer technology, more particularly to a kind of speech verification method, speech verification device, calculates Equipment and computer readable storage medium.
Background technique
In the related art, the correlation of application program using certain application programs or is needed to be implemented by terminal as user When function, in order to ensure safety, it usually needs verified to the identity of user.For example, applying journey when user's login is certain Sequence or when being paid the bill using application program, usually by sent to user include identifying code short message, user receiving After short message, the identifying code in short message is input in the input interface of application program, realizes that the identifying code inputted based on user is tested Demonstrate,prove the identity of user.But the short message comprising identifying code is easy to be stolen by other people, and the safety of transaction is caused to be on the hazard.
Summary of the invention
An aspect of this disclosure provides a kind of speech verification method, is used for application server, which comprises connect Receive the checking request from target terminal, wherein the checking request includes the terminal iidentification of the target terminal, the verifying For requesting the application server that the target terminal is allowed to execute specific function, determination is related to the terminal iidentification for request The communication identifier of connection, and solicited message is generated based on the communication identifier, wherein the solicited message includes the communication mark Know, sends the solicited message to communication company server, wherein the solicited message is for requesting the common carrier Server establishes the voice transfer channel between the application server and the target terminal, in response to the common carrier Server is based on the communication identifier and establishes the voice transfer channel, and verifying voice is sent via the voice transfer channel To the target terminal, wherein the verifying voice is for verifying whether the target terminal has the execution specific function Permission.
Optionally, the above method further include: receive the feedback that the target terminal is sent via the voice transfer channel Voice, wherein it is described feedback voice be target user according to it is described verifying speech production voice, determine the feedback voice and Whether default voice is consistent, consistent with the default voice in response to the determination feedback voice, and the target terminal is allowed to hold The row specific function.
Optionally, the above method further include:, instruction inconsistent in response to the determination feedback voice and the default voice The communication company server disconnects the voice transfer channel.
Optionally, above-mentioned default voice includes default voiceprint;The determination feedback voice is with default voice It is no consistent, comprising: the processing feedback voice obtains the vocal print of the target user, determines vocal print and the institute of the target user Whether consistent state default voiceprint.
Optionally, the above method further include: the history voice data for acquiring at least one user handles the history voice Data obtain the default voiceprint.
Optionally, the feedback voice that the above-mentioned reception target terminal is sent via the voice transfer channel, comprising: The verifying voice is sent to after the target terminal and in the voice transfer channel via the voice transfer channel When in continual communication state, the feedback voice that the target terminal is sent via the voice transfer channel is received.
Optionally, above-mentioned feedback voice is voice of the target user according to the verifying speech production, comprising: described It feeds back voice and the verifying speech production is repeated by the target user.
Another aspect of the disclosure provides a kind of speech verification device, is used for application server, and described device includes: First receiving module, the first determining module, the first sending module and the second sending module.Wherein, the first receiving module receives Checking request from target terminal, wherein the checking request includes the terminal iidentification of the target terminal, and the verifying is asked It asks for requesting the application server that the target terminal is allowed to execute specific function, the determination of the first determining module and the end End identifies associated communication identifier, and generates solicited message based on the communication identifier, wherein the solicited message includes institute Communication identifier is stated, the first sending module sends the solicited message to communication company server, wherein the solicited message is used The voice transfer channel between the application server and the target terminal is established in the request communication company server, Second sending module is based on the communication identifier in response to the communication company server and establishes the voice transfer channel, will It verifies voice and is sent to the target terminal via the voice transfer channel, wherein the verifying voice is described for verifying Whether target terminal has the permission for executing the specific function.
Optionally, above-mentioned apparatus further include: the second receiving module, the second determining module and respond module.Wherein, second Receiving module receives the feedback voice that the target terminal is sent via the voice transfer channel, wherein the feedback voice It is target user according to the voice of the verifying speech production, the second determining module determines that the feedback voice and default voice are No consistent, respond module is consistent with the default voice in response to the determination feedback voice, and the target terminal is allowed to execute The specific function.
Optionally, above-mentioned apparatus further include: indicating module, not in response to the determination feedback voice and the default voice Unanimously, indicate that the communication company server disconnects the voice transfer channel.
Optionally, above-mentioned default voice includes default voiceprint;The determination feedback voice is with default voice It is no consistent, comprising: the processing feedback voice obtains the vocal print of the target user, determines vocal print and the institute of the target user Whether consistent state default voiceprint.
Optionally, above-mentioned apparatus further include: acquisition module and processing module.Wherein, acquisition module acquires at least one The history voice data of user, the processing module processing history voice data obtain the default voiceprint.
Optionally, the feedback voice that the above-mentioned reception target terminal is sent via the voice transfer channel, comprising: The verifying voice is sent to after the target terminal and in the voice transfer channel via the voice transfer channel When in continual communication state, the feedback voice that the target terminal is sent via the voice transfer channel is received.
Optionally, above-mentioned feedback voice is voice of the target user according to the verifying speech production, comprising: described It feeds back voice and the verifying speech production is repeated by the target user.
Another aspect of the present disclosure provides a kind of calculating equipment, comprising: one or more processors;Memory is used for Store one or more programs, wherein when one or more of programs are executed by one or more of processors, so that One or more of processors realize method as described above.
Another aspect of the present disclosure provides a kind of non-volatile readable storage medium, is stored with the executable finger of computer It enables, described instruction is when executed for realizing method as described above.
Another aspect of the present disclosure provides a kind of computer program, and the computer program, which includes that computer is executable, to be referred to It enables, described instruction is when executed for realizing method as described above.
Detailed description of the invention
In order to which the disclosure and its advantage is more fully understood, referring now to being described below in conjunction with attached drawing, in which:
Fig. 1 diagrammatically illustrates the system tray of speech verification method and speech verification device according to the embodiment of the present disclosure Structure;
Fig. 2 diagrammatically illustrates the applied field of speech verification method and speech verification device according to the embodiment of the present disclosure Scape;
Fig. 3 diagrammatically illustrates the flow chart of the speech verification method according to the embodiment of the present disclosure;
Fig. 4 diagrammatically illustrates the flow chart of the speech verification method according to another embodiment of the disclosure;
Fig. 5 diagrammatically illustrates the flow chart of the speech verification method according to disclosure another embodiment;
Fig. 6 diagrammatically illustrates the block diagram of the speech verification device according to the embodiment of the present disclosure;
Fig. 7 diagrammatically illustrates the block diagram of the speech verification device according to another embodiment of the disclosure;
Fig. 8 diagrammatically illustrates the block diagram of the speech verification device according to disclosure another embodiment;And
Fig. 9 diagrammatically illustrates the block diagram of the computer system for speech verification according to the embodiment of the present disclosure.
Specific embodiment
Hereinafter, will be described with reference to the accompanying drawings embodiment of the disclosure.However, it should be understood that these descriptions are only exemplary , and it is not intended to limit the scope of the present disclosure.In the following detailed description, to elaborate many specific thin convenient for explaining Section is to provide the comprehensive understanding to the embodiment of the present disclosure.It may be evident, however, that one or more embodiments are not having these specific thin It can also be carried out in the case where section.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to avoid Unnecessarily obscure the concept of the disclosure.
Term as used herein is not intended to limit the disclosure just for the sake of description specific embodiment.It uses herein The terms "include", "comprise" etc. show the presence of the feature, step, operation and/or component, but it is not excluded that in the presence of Or add other one or more features, step, operation or component.
There are all terms (including technical and scientific term) as used herein those skilled in the art to be generally understood Meaning, unless otherwise defined.It should be noted that term used herein should be interpreted that with consistent with the context of this specification Meaning, without that should be explained with idealization or excessively mechanical mode.
It, in general should be according to this using statement as " at least one in A, B and C etc. " is similar to Field technical staff is generally understood the meaning of the statement to make an explanation (for example, " system at least one in A, B and C " Should include but is not limited to individually with A, individually with B, individually with C, with A and B, with A and C, have B and C, and/or System etc. with A, B, C).Using statement as " at least one in A, B or C etc. " is similar to, generally come Saying be generally understood the meaning of the statement according to those skilled in the art to make an explanation (for example, " having in A, B or C at least One system " should include but is not limited to individually with A, individually with B, individually with C, with A and B, have A and C, have B and C, and/or the system with A, B, C etc.).
Shown in the drawings of some block diagrams and/or flow chart.It should be understood that some sides in block diagram and/or flow chart Frame or combinations thereof can be realized by computer program instructions.These computer program instructions can be supplied to general purpose computer, The processor of special purpose computer or other programmable control units, so that these instructions can create when executed by this processor For realizing function/operation device illustrated in these block diagrams and/or flow chart.
Therefore, the technology of the disclosure can be realized in the form of hardware and/or software (including firmware, microcode etc.).Separately Outside, the technology of the disclosure can take the form of the computer program product on the computer-readable medium for being stored with instruction, should Computer program product uses for instruction execution system or instruction execution system is combined to use.In the context of the disclosure In, computer-readable medium, which can be, can include, store, transmitting, propagating or transmitting the arbitrary medium of instruction.For example, calculating Machine readable medium can include but is not limited to electricity, magnetic, optical, electromagnetic, infrared or semiconductor system, device, device or propagation medium. The specific example of computer-readable medium includes: magnetic memory apparatus, such as tape or hard disk (HDD);Light storage device, such as CD (CD-ROM);Memory, such as random access memory (RAM) or flash memory;And/or wire/wireless communication link.
Embodiment of the disclosure provides a kind of speech verification method, is used for application server, comes this method comprises: receiving From the checking request of target terminal, wherein checking request includes the terminal iidentification of target terminal, and checking request is for requesting application Server allows target terminal to execute specific function, determines communication identifier associated with terminal iidentification, and be based on communication identifier Generate solicited message, wherein solicited message includes communication identifier, sends solicited message to communication company server, wherein ask Ask voice transfer channel of the information for requesting communication company server to be established between application server and target terminal, response Communication identifier is based in communication company server and establishes voice transfer channel, and verifying voice is sent via voice transfer channel To target terminal, wherein verifying voice is used to verify whether target terminal has the permission for executing specific function.
Fig. 1 diagrammatically illustrates the system tray of speech verification method and speech verification device according to the embodiment of the present disclosure Structure.It should be noted that being only the example that can apply the system architecture of the embodiment of the present disclosure shown in Fig. 1, to help this field Technical staff understands the technology contents of the disclosure, but be not meant to the embodiment of the present disclosure may not be usable for other equipment, system, Environment or scene.
As shown in Figure 1, system architecture 100 may include terminal device 101,102,103, network according to this embodiment 104 and server 105.Network 104 between terminal device 101,102,103 and server 105 to provide communication link Medium.Network 104 may include various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be used terminal device 101,102,103 and be interacted by network 104 with server 105, to receive or send out Send message etc..Various telecommunication customer end applications, such as the application of shopping class, net can be installed on terminal device 101,102,103 (merely illustrative) such as the application of page browsing device, searching class application, instant messaging tools, mailbox client, social platform softwares.
Terminal device 101,102,103 can be the various electronic equipments with display screen and supported web page browsing, packet Include but be not limited to smart phone, tablet computer, pocket computer on knee and desktop computer etc..
Server 105 can be to provide the server of various services, such as utilize terminal device 101,102,103 to user The website browsed provides the back-stage management server (merely illustrative) supported.Back-stage management server can be to the use received The data such as family request analyze etc. processing, and by processing result (such as according to user's request or the webpage of generation, believe Breath or data etc.) feed back to terminal device.
It should be noted that speech verification method provided by the embodiment of the present disclosure can generally be executed by server 105. Correspondingly, speech verification device provided by the embodiment of the present disclosure generally can be set in server 105.The embodiment of the present disclosure Provided speech verification method can also by be different from server 105 and can with terminal device 101,102,103 and/or clothes The server or server cluster that business device 105 communicates execute.Correspondingly, speech verification device provided by the embodiment of the present disclosure It can be set in the service that is different from server 105 and can be communicated with terminal device 101,102,103 and/or server 105 In device or server cluster.
For example, the checking request of the embodiment of the present disclosure can store in terminal device 101,102,103, set by terminal Standby 101,102,103 are sent to checking request in server 105, and server 105 can be determined and be verified based on checking request The associated communication identifier of the terminal iidentification for including in request, and solicited message is generated based on communication identifier, and to communication operation Quotient's server sends solicited message.In addition, checking request can also be received by server 105 and be stored directly in server 105 In, checking request is directly based upon by server 105 and determines communication identifier associated with the terminal iidentification for including in checking request, And solicited message is generated based on communication identifier, and send solicited message to communication company server.
Fig. 2 diagrammatically illustrates the applied field of speech verification method and speech verification device according to the embodiment of the present disclosure Scape.It should be noted that being only the example that can apply the scene of the embodiment of the present disclosure shown in Fig. 2, to help art technology Personnel understand the technology contents of the disclosure, but are not meant to that the embodiment of the present disclosure may not be usable for other equipment, system, environment Or scene.
As shown in Fig. 2, the application scenarios 200 for example may include application server 210, communication company server 220 And target terminal 230.
Related application, related application can be used in target terminal 230 according to the embodiment of the present disclosure, such as user Program for example can be bank APP, and when user uses bank APP, application server 210 for example can be bank server. In addition, communication company server 220 for example can be SIM (Subscriber used in target terminal Identification Module) card carrier server, such as can be telecommunication server, Mobile Server, connection clothes Business device etc..
For example, when user is paid the bill using bank APP, it, can be by application service in order to ensure the safety of transaction Transaction verification code is sent to communication company server 220 by device 210, then by communication company server 220 according to target end SIM card used in end 230 sends the short message comprising transaction verification code to target terminal 230, after user receives short message, will hand over Easy identifying code is input in the payment interface of bank APP, and the transaction verification code that user is inputted is fed back to and answered by target terminal 230 With server 210, to complete to verify.
Below with reference to the system architecture of Fig. 1 and the application scenarios of Fig. 2, described with reference to Fig. 3~Fig. 5 according to disclosure example The speech verification method of property embodiment.It should be noted that above-mentioned application scenarios are merely for convenience of understanding the essence of the disclosure Mind and principle and show, embodiment of the present disclosure is unrestricted in this regard.On the contrary, embodiment of the present disclosure can be with Applied to applicable any scene.
Fig. 3 diagrammatically illustrates the flow chart of the speech verification method according to the embodiment of the present disclosure.
As shown in figure 3, this method is applied to application server, this method includes operation S310~S340.
In operation S310, the checking request from target terminal is received, wherein checking request includes the terminal of target terminal Mark, checking request is for requesting application server that target terminal is allowed to execute specific function.
According to the embodiment of the present disclosure, target terminal for example can be mobile phone, the specific function example executed by target terminal It such as can be and log in bank APP or carry out payment operation using bank APP.For example, when user makes on a target terminal When being paid the bill with bank APP, target terminal can send checking request to application server, use convenient for application server verifying The identity at family then allows target terminal to execute payment operation when being verified.Wherein, for example including target in checking request The terminal iidentification of terminal, the terminal iidentification are the unique identification of target terminal.
In operation S320, communication identifier associated with terminal iidentification is determined, and solicited message is generated based on communication identifier, Wherein, solicited message includes communication identifier.
In the embodiments of the present disclosure, terminal iidentification and communication identifier are associatedly stored in the application server, wherein communication Phone number used in mark for example, target terminal.For example, application server is in the verifying for receiving target terminal transmission After request, associated phone number can be confirmed according to the terminal iidentification in checking request, and ask based on phone number generation Information is sought, includes phone number in the solicited message.
In operation S330, solicited message is sent to communication company server, wherein solicited message is for requesting communication fortune Battalion's quotient's server establishes the voice transfer channel between application server and target terminal.
According to the embodiment of the present disclosure, communication company server for example can be SIM used in target terminal The carrier server of (Subscriber Identification Module) card, such as can be telecommunication server, movement Server, interchange server etc..After application server generates solicited message, which can be sent to communication Carrier server, communication company server confirms target terminal according to the phone number in solicited message, and takes in application Voice transfer channel is established between business device and target terminal, is directly led to by voice transfer convenient for application server and target terminal Road carries out voice communication.
In operation S340, communication identifier is based in response to communication company server and establishes voice transfer channel, will be verified Voice is sent to target terminal via voice transfer channel, wherein verifying voice is for verifying whether target terminal has execution The permission of specific function.
In the embodiments of the present disclosure, language is set up between application server and target terminal when communication company server After sound transmission channel, verifying voice can be sent directly to target terminal via the voice transfer channel by application server, To verify whether target terminal has the permission for executing payment operation.
The embodiment of the present disclosure is established the voice between application server and target terminal by communication company server and is passed Verifying voice is directly sent to target terminal convenient for application server and verified by defeated channel, and this programme is carried out by voice The safety of verifying is higher, without by sent to user include identifying code short message, avoid that short message is stolen can Energy property, it is ensured that the safety of transaction.
Fig. 4 diagrammatically illustrates the flow chart of the speech verification method according to another embodiment of the disclosure.
As shown in figure 4, this method includes operation S310~S340 and operation S410~S440.Wherein, operate S310~ S340 is same or like with the operation described above with reference to Fig. 3, and details are not described herein.
In operation S410, the feedback voice that target terminal is sent via voice transfer channel is received, wherein feeding back voice is Target user is according to the voice for verifying speech production.
According to the embodiment of the present disclosure, target user can be the user using target terminal, such as when target terminal is hand When machine, target user can be owner.Voice will be verified in application server, and target terminal is sent to by voice transfer channel Afterwards, target user can feed back voice according to verifying speech production, and target terminal acquires the feedback voice of target user, and should It feeds back voice and application server is sent to by voice transfer channel, whether just to verify the feedback voice convenient for application server Really.
According to the embodiment of the present disclosure, in order to ensure the safety during speech verification, need to guarantee to verify the hair of voice Send the time interval between moment and the time of reception for feeding back voice as small as possible.Therefore, unbroken in voice transfer channel In the case of send verifying and voice and receive feedback voice.In other words, it is sent to via voice transfer channel voice will be verified After target terminal and when voice transfer channel is in continual communication state, receives target terminal and sent out via voice transfer channel The feedback voice sent.The transmission for thereby ensuring that verifying voice and the reception for feeding back voice are to be in continue in voice transfer channel It is completed when connected state, avoids verification process and manipulated by other people.
According to the embodiment of the present disclosure, in one case, feedback voice can be repeated verifying speech production by target user. In order to make it easy to understand, verifying voice can be the Duan Yuyin generated by application server, for example, " 123456 ", target user After receiving verifying voice " 123456 ", target user can repeat " 123456 " and feed back voice " 123456 " to generate, After target terminal collects the feedback voice of target user, application server is sent to for voice is fed back by voice transfer channel In, it is whether correct that the feedback voice is verified convenient for application server.
In operation S420, determine whether feedback voice and default voice are consistent.
According to the embodiment of the present disclosure, whether application server needs to verify the feedback voice after receiving feedback voice Correctly, such as the feedback voice received and verifying voice can be compared, is indicated if consistent through verifying, and permit Perhaps target terminal can execute payment operation.Authentication failed is indicated if inconsistent, in order to ensure transaction security, then forbids mesh It marks terminal and executes payment operation.
According to the embodiment of the present disclosure, presetting voice includes default voiceprint, determines whether are feedback voice and default voice Unanimously, comprising: processing feedback voice obtain the vocal print of target user, determine target user vocal print and default voiceprint whether Unanimously.
For example, default voiceprint for example can be the voiceprint of the pre-stored target user of application server, when After application server receives the feedback voice of target user, it can handle feedback voice and obtain the vocal print of target user, and Whether unanimously it is confirmed whether to pass through verifying by comparing the vocal print of target user and default voiceprint.
Target terminal is allowed to execute specific function in response to determining that feedback voice is consistent with default voice in operation S430.
For example, then allowing target terminal to execute specific when application server confirms that feedback voice is consistent with default voice Function, such as target terminal is allowed to execute payment operation.
In operation S440, in response to determining that feedback voice and default voice are inconsistent, instruction communication company server is disconnected Open voice transfer channel.
For example, then target terminal is forbidden to execute spy when application server confirms that feedback voice and default voice are inconsistent Determine function, such as target terminal is forbidden to execute payment operation.After application server confirms authentication failed, application server can be with Indicate that communication company server disconnects voice transfer channel.
The embodiment of the present disclosure is established the voice between application server and target terminal by communication company server and is passed Defeated channel, and be in after it will verify voice and be sent to target terminal via voice transfer channel and in voice transfer channel When continual communication state, the feedback voice that target terminal is sent via voice transfer channel is received, convenient in voice transfer channel Verifying voice is sent in unbroken situation and receives feedback voice, and high degree ensure that the safety of speech verification, really The safety of transaction is protected.
Fig. 5 diagrammatically illustrates the flow chart of the speech verification method according to disclosure another embodiment.
As shown in figure 5, this method includes operation S310~S340, operation S410~S440 and operation S510~S520. Wherein, operation S310~S340 is same or like with the operation described above with reference to Fig. 3, and details are not described herein.Operation S410~ S440 is same or like with the operation described above with reference to Fig. 4, and details are not described herein.
In operation S510, the history voice data of at least one user is acquired.
According to the embodiment of the present disclosure, application server can acquire the history voice data of multiple users in advance.For example, working as User's registration and when using bank APP, can acquire the history voice data of user.
In operation S520, processing history voice data obtains default voiceprint.
According to the embodiment of the present disclosure, after collecting the history voice data of user, history voice data can handle Default voiceprint is obtained, and store the default voiceprint to locate convenient for subsequent in the feedback voice for getting user Whether reason feedback voice obtains the vocal print of target user, and unanimously come by comparing the vocal print of target user and default voiceprint It is confirmed whether to pass through verifying.
In the embodiments of the present disclosure, presetting voice includes default voiceprint, and operation S420 can specifically be executed: processing is anti- Feedback voice obtains the vocal print of target user, determines whether the vocal print of target user and default voiceprint are consistent.
In the embodiments of the present disclosure, operation S430 can specifically be executed: in response to determining that feedback voice and default vocal print are believed Breath is consistent, and target terminal is allowed to execute specific function.
In the embodiments of the present disclosure, operation S440 can specifically be executed: in response to determining that feedback voice and default vocal print are believed Cease inconsistent, instruction communication company server disconnection voice transfer channel.
Fig. 6 diagrammatically illustrates the block diagram of the speech verification device according to the embodiment of the present disclosure.
As shown in fig. 6, speech verification device 600 includes the first receiving module 610, the transmission of the first determining module 620, first Module 630 and the second sending module 640.
First receiving module 610 can be used for receiving the checking request from target terminal, wherein checking request includes mesh The terminal iidentification of terminal is marked, checking request is for requesting application server that target terminal is allowed to execute specific function.According to this public affairs Embodiment is opened, the first receiving module 610 can for example execute the operation S310 above with reference to Fig. 3 description, and details are not described herein.
First determining module 620 is determined for communication identifier associated with terminal iidentification, and is based on communication identifier Generate solicited message, wherein solicited message includes communication identifier.According to the embodiment of the present disclosure, the first determining module 620 for example may be used To execute the operation S320 described above with reference to Fig. 3, details are not described herein.
First sending module 630 can be used for sending solicited message to communication company server, wherein solicited message is used The voice transfer channel between application server and target terminal is established in request communication company server.According to disclosure reality Example is applied, the first sending module 630 can for example execute the operation S330 above with reference to Fig. 3 description, and details are not described herein.
Second sending module 640 can be used for being based on communication identifier in response to communication company server establishing voice transfer Verifying voice is sent to target terminal via voice transfer channel, wherein verifying voice, which is used to verify target terminal, is by channel It is no that there is the permission for executing specific function.According to the embodiment of the present disclosure, the second sending module 640 can for example execute above with reference to The operation S340 of Fig. 3 description, details are not described herein.
Fig. 7 diagrammatically illustrates the block diagram of the speech verification device according to another embodiment of the disclosure.
As shown in fig. 7, speech verification device 700 includes the first receiving module 610, the transmission of the first determining module 620, first Module 630, the second sending module 640, the second receiving module 710, the second determining module 720, respond module 730 and instruction mould Block 740.Wherein, the first receiving module 610, the first determining module 620, the first sending module 630 and the second sending module 640 Same or like with the module described above with reference to Fig. 6, details are not described herein.
Second receiving module 710 can be used for receiving the feedback voice that target terminal is sent via voice transfer channel, In, feedback voice is voice of the target user according to verifying speech production.
According to the embodiment of the present disclosure, the feedback voice that target terminal is sent via voice transfer channel is received, comprising: inciting somebody to action Verifying voice is sent to after target terminal and when voice transfer channel is in continual communication state via voice transfer channel, Receive the feedback voice that target terminal is sent via voice transfer channel.
According to the embodiment of the present disclosure, feeding back voice is voice of the target user according to verifying speech production, comprising: backchannel Sound repeats verifying speech production by target user.
According to the embodiment of the present disclosure, the second receiving module 710 can for example execute the operation above with reference to Fig. 4 description S410, details are not described herein.
Second determining module 720 is determined for feedback voice and whether default voice is consistent.
According to the embodiment of the present disclosure, presetting voice includes default voiceprint;Determine feedback voice and default voice whether Unanimously, comprising: processing feedback voice obtain the vocal print of target user, determine target user vocal print and default voiceprint whether Unanimously.
According to the embodiment of the present disclosure, the second determining module 720 can for example execute the operation above with reference to Fig. 4 description S420, details are not described herein.
Respond module 730 can be used for allowing target terminal to execute in response to determining that feedback voice is consistent with default voice Specific function.According to the embodiment of the present disclosure, respond module 730 can for example execute the operation S430 above with reference to Fig. 4 description, This is repeated no more.
Indicating module 740 can be used in response in response to determining that feedback voice and default voice are inconsistent, instruction is communicated Carrier server disconnects voice transfer channel.According to the embodiment of the present disclosure, indicating module 740 can for example execute above with reference to The operation S440 of Fig. 4 description, details are not described herein.
Fig. 8 diagrammatically illustrates the block diagram of the speech verification device according to disclosure another embodiment.
As shown in figure 8, speech verification device 800 includes the first receiving module 610, the transmission of the first determining module 620, first Module 630, the second sending module 640, the second receiving module 710, the second determining module 720, respond module 730, indicating module 740, acquisition module 810 and processing module 820.Wherein, the first receiving module 610, the first determining module 620, first are sent Module 630 and the second sending module 640 are same or like with the module described above with reference to Fig. 6, and details are not described herein.Second Receiving module 710, the second determining module 720, respond module 730 and indicating module 740 and the module above with reference to Fig. 7 description Same or like, details are not described herein
Acquisition module 810 can be used for acquiring the history voice data of at least one user.According to the embodiment of the present disclosure, adopt Collection module 810 can for example execute the operation S510 above with reference to Fig. 5 description, and details are not described herein.
Processing module 820 can be used for handling history voice data and obtain default voiceprint.According to the embodiment of the present disclosure, Processing module 820 can for example execute the operation S520 above with reference to Fig. 5 description, and details are not described herein.
It is module according to an embodiment of the present disclosure, submodule, unit, any number of or in which any more in subelement A at least partly function can be realized in a module.It is single according to the module of the embodiment of the present disclosure, submodule, unit, son Any one or more in member can be split into multiple modules to realize.According to the module of the embodiment of the present disclosure, submodule, Any one or more in unit, subelement can at least be implemented partly as hardware circuit, such as field programmable gate Array (FPGA), programmable logic array (PLA), system on chip, the system on substrate, the system in encapsulation, dedicated integrated electricity Road (ASIC), or can be by the hardware or firmware for any other rational method for integrate or encapsulate to circuit come real Show, or with any one in three kinds of software, hardware and firmware implementations or with wherein any several appropriately combined next reality It is existing.Alternatively, can be at least by part according to one or more of the module of the embodiment of the present disclosure, submodule, unit, subelement Ground is embodied as computer program module, when the computer program module is run, can execute corresponding function.
For example, the first receiving module 610, the first determining module 620, the first sending module 630, the second sending module 640, Second receiving module 710, the second determining module 720, respond module 730, indicating module 740, acquisition module 810 and processing mould Any number of in block 820, which may be incorporated in a module, to be realized or any one module therein can be split into Multiple modules.Alternatively, at least partly function of one or more modules in these modules can be at least portion of other modules Point function combines, and realizes in a module.In accordance with an embodiment of the present disclosure, the first receiving module 610, first determines mould Block 620, the first sending module 630, the second sending module 640, the second receiving module 710, the second determining module 720, response mould At least one of block 730, indicating module 740, acquisition module 810 and processing module 820 can be at least at least partially implemented To be on hardware circuit, such as field programmable gate array (FPGA), programmable logic array (PLA), system on chip, substrate System, the system in encapsulation, specific integrated circuit (ASIC), or can be by carrying out integrated to circuit or encapsulating any other The hardware such as rational method or firmware realize, or with any one in three kinds of software, hardware and firmware implementations or with it In any several appropriately combined realize.Alternatively, the first receiving module 610, the first determining module 620, the first sending module 630, the second sending module 640, the second receiving module 710, the second determining module 720, respond module 730, indicating module 740, At least one of acquisition module 810 and processing module 820 can at least be implemented partly as computer program module, when When the computer program module is run, corresponding function can be executed.
Fig. 9 diagrammatically illustrates the block diagram of the computer system for speech verification according to the embodiment of the present disclosure.Fig. 9 The computer system shown is only an example, should not function to the embodiment of the present disclosure and use scope bring any limit System.
As shown in figure 9, computer system 900 includes processor 901, computer readable storage medium 902.The system 900 The method according to the embodiment of the present disclosure can be executed.
Specifically, processor 901 for example may include general purpose microprocessor, instruction set processor and/or related chip group And/or special microprocessor (for example, specific integrated circuit (ASIC)), etc..Processor 901 can also include using for caching The onboard storage device on way.Processor 901 can be the different movements for executing the method flow according to the embodiment of the present disclosure Single treatment unit either multiple processing units.
Computer readable storage medium 902, such as can be times can include, store, transmitting, propagating or transmitting instruction Meaning medium.For example, readable storage medium storing program for executing can include but is not limited to electricity, magnetic, optical, electromagnetic, infrared or semiconductor system, device, Device or propagation medium.The specific example of readable storage medium storing program for executing includes: magnetic memory apparatus, such as tape or hard disk (HDD);Optical storage Device, such as CD (CD-ROM);Memory, such as random access memory (RAM) or flash memory;And/or wire/wireless communication chain Road.
Computer readable storage medium 902 may include computer program 903, which may include generation Code/computer executable instructions execute processor 901 according to the embodiment of the present disclosure Method or its any deformation.
Computer program 903 can be configured to have the computer program code for example including computer program module.Example Such as, in the exemplary embodiment, the code in computer program 903 may include one or more program modules, for example including 903A, module 903B ....It should be noted that the division mode and number of module are not fixation, those skilled in the art can To be combined according to the actual situation using suitable program module or program module, when these program modules are combined by processor 901 When execution, processor 901 is executed according to the method for the embodiment of the present disclosure or its any deformation.
In accordance with an embodiment of the present disclosure, the first receiving module 610, the first determining module 620, the first sending module 630, Two sending modules 640, the second receiving module 710, the second determining module 720, respond module 730, indicating module 740, acquisition mould At least one of block 810 and processing module 820 can be implemented as the computer program module with reference to Fig. 9 description, in quilt When processor 901 executes, corresponding operating described above may be implemented.
The disclosure additionally provides a kind of computer-readable medium, which, which can be in above-described embodiment, retouches Included in the equipment/device/system stated;It is also possible to individualism, and without in the supplying equipment/device/system.On It states computer-readable medium and carries one or more program, when said one or multiple programs are performed, in realization State method.
In accordance with an embodiment of the present disclosure, computer-readable medium can be computer-readable signal media or computer can Read storage medium either the two any combination.Computer readable storage medium for example can be --- but it is unlimited In system, device or the device of --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or any above combination.It calculates The more specific example of machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, portable of one or more conducting wires Formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device or The above-mentioned any appropriate combination of person.In the disclosure, computer readable storage medium can be it is any include or storage program Tangible medium, which can be commanded execution system, device or device use or in connection.And in this public affairs In opening, computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, In carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limited to Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable Any computer-readable medium other than storage medium, the computer-readable medium can send, propagate or transmit for by Instruction execution system, device or device use or program in connection.The journey for including on computer-readable medium Sequence code can transmit with any suitable medium, including but not limited to: wireless, wired, optical cable, radiofrequency signal etc., or Above-mentioned any appropriate combination.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
It will be understood by those skilled in the art that the feature recorded in each embodiment and/or claim of the disclosure can To carry out multiple combinations and/or combination, even if such combination or combination are not expressly recited in the disclosure.Particularly, exist In the case where not departing from disclosure spirit or teaching, the feature recorded in each embodiment and/or claim of the disclosure can To carry out multiple combinations and/or combination.All these combinations and/or combination each fall within the scope of the present disclosure.
Although the disclosure, art technology has shown and described referring to the certain exemplary embodiments of the disclosure Personnel it should be understood that in the case where the spirit and scope of the present disclosure limited without departing substantially from the following claims and their equivalents, A variety of changes in form and details can be carried out to the disclosure.Therefore, the scope of the present disclosure should not necessarily be limited by above-described embodiment, But should be not only determined by appended claims, also it is defined by the equivalent of appended claims.

Claims (10)

1. a kind of speech verification method is used for application server, which comprises
Receive the checking request from target terminal, wherein the checking request includes the terminal iidentification of the target terminal, institute Checking request is stated for requesting the application server that the target terminal is allowed to execute specific function;
It determines communication identifier associated with the terminal iidentification, and solicited message is generated based on the communication identifier, wherein institute Stating solicited message includes the communication identifier;
The solicited message is sent to communication company server, wherein the solicited message is for requesting the communication operation Quotient's server establishes the voice transfer channel between the application server and the target terminal;And
The communication identifier is based in response to the communication company server and establishes the voice transfer channel, will verify voice The target terminal is sent to via the voice transfer channel, wherein the verifying voice is for verifying the target terminal Whether there is the permission for executing the specific function.
2. according to the method described in claim 1, further include:
Receive the feedback voice that the target terminal is sent via the voice transfer channel, wherein the feedback voice is mesh User is marked according to the voice of the verifying speech production;
Determine whether the feedback voice and default voice are consistent;And
It is consistent with the default voice in response to the determination feedback voice, allow the target terminal to execute the specific function Energy.
3. according to the method described in claim 2, further include:
It is inconsistent in response to the determination feedback voice and the default voice, indicate that the communication company server disconnects institute Predicate sound transmission channel.
4. according to the method in claim 2 or 3, wherein the default voice includes default voiceprint;The determining institute It states feedback voice and whether default voice is consistent, comprising:
It handles the feedback voice and obtains the vocal print of the target user;And
Determine whether vocal print and the default voiceprint of the target user are consistent.
5. according to the method described in claim 4, further include:
Acquire the history voice data of at least one user;And
It handles the history voice data and obtains the default voiceprint.
6. according to the method in claim 2 or 3, wherein the reception target terminal is logical via the voice transfer The feedback voice that road is sent, comprising:
It is passed after the verifying voice is sent to the target terminal via the voice transfer channel and in the voice When defeated channel is in continual communication state, the backchannel that the target terminal is sent via the voice transfer channel is received Sound.
7. according to the method in claim 2 or 3, wherein the feedback voice is the target user according to the verifying The voice of speech production, comprising: the feedback voice repeats the verifying speech production by the target user.
8. a kind of speech verification device, is used for application server, described device includes:
First receiving module receives the checking request from target terminal, wherein the checking request includes the target terminal Terminal iidentification, the checking request is for requesting the application server that the target terminal is allowed to execute specific function;
First determining module is determined communication identifier associated with the terminal iidentification, and is asked based on communication identifier generation Seek information, wherein the solicited message includes the communication identifier;
First sending module sends the solicited message to communication company server, wherein the solicited message is for requesting The communication company server establishes the voice transfer channel between the application server and the target terminal;And
Second sending module is established the voice transfer based on the communication identifier in response to the communication company server and is led to Verifying voice is sent to the target terminal via the voice transfer channel, wherein the verifying voice is for verifying by road Whether the target terminal has the permission for executing the specific function.
9. a kind of calculating equipment, comprising:
One or more processors;
Memory, for storing one or more programs,
Wherein, when one or more of programs are executed by one or more of processors, so that one or more of Processor realizes method described in any one of claims 1 to 7.
10. a kind of computer readable storage medium, is stored with computer executable instructions, described instruction is used for reality when executed Method described in existing any one of claims 1 to 7.
CN201910679803.7A 2019-07-25 2019-07-25 Speech verification method, apparatus calculates equipment and medium Pending CN110266734A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910679803.7A CN110266734A (en) 2019-07-25 2019-07-25 Speech verification method, apparatus calculates equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910679803.7A CN110266734A (en) 2019-07-25 2019-07-25 Speech verification method, apparatus calculates equipment and medium

Publications (1)

Publication Number Publication Date
CN110266734A true CN110266734A (en) 2019-09-20

Family

ID=67928301

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910679803.7A Pending CN110266734A (en) 2019-07-25 2019-07-25 Speech verification method, apparatus calculates equipment and medium

Country Status (1)

Country Link
CN (1) CN110266734A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113065121A (en) * 2021-04-22 2021-07-02 中国工商银行股份有限公司 Device authentication method, device, computer system and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635743A (en) * 2009-04-02 2010-01-27 浙江亚斯特科技有限公司 System and method using biologic characteristic certification result to validate identity of mobile terminal holder
CN101635629A (en) * 2008-07-21 2010-01-27 李晓东 Secure password authentication method
CN105141427A (en) * 2015-08-18 2015-12-09 赛肯(北京)科技有限公司 Login authentication method, device and system based on voiceprint recognition

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635629A (en) * 2008-07-21 2010-01-27 李晓东 Secure password authentication method
CN101635743A (en) * 2009-04-02 2010-01-27 浙江亚斯特科技有限公司 System and method using biologic characteristic certification result to validate identity of mobile terminal holder
CN105141427A (en) * 2015-08-18 2015-12-09 赛肯(北京)科技有限公司 Login authentication method, device and system based on voiceprint recognition

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113065121A (en) * 2021-04-22 2021-07-02 中国工商银行股份有限公司 Device authentication method, device, computer system and medium

Similar Documents

Publication Publication Date Title
CN105871867B (en) Identity identifying method, system and equipment
CN103581166B (en) Location aware certification
CN106105139B (en) The authentication method and system detected automatically carried out by gateway
CN106710017B (en) Identity verification method, device and system for logistics signing
CN109286633A (en) Single sign-on method, device, computer equipment and storage medium
CN105556919B (en) Dual factor anthentication is carried out using service request bill
CN111062024B (en) Application login method and device
CN110414208A (en) Login validation method, calculates equipment and medium at device
CN106341381A (en) Method and system of key management for rack server system
CN106850794A (en) Method and apparatus, server and terminal for operating group
CN108595628A (en) Method and apparatus for pushed information
CN104767714B (en) A kind of ID and the correlating method of user resources information, terminal and system
CN104769914A (en) Method of processing requests for digital services
CN107231331A (en) Obtain, issue the implementation method and device of electronic certificate
CN108229704A (en) For the method and apparatus of pushed information
CN108491267A (en) Method and apparatus for generating information
US20220070165A1 (en) Identification and authentication of a user using identity-linked device information for facilitation of near-field events
CN108600250A (en) Authentication method
CN110377440A (en) Information processing method and device
EP3777070B1 (en) Deep link authentication
CN108549586A (en) Information processing method and device
CN109962837A (en) Message treatment method, device, storage medium and electronic device
CN107609953A (en) The quick treating method and apparatus of order
CN109495468A (en) Authentication method, device, electronic equipment and storage medium
CN110266734A (en) Speech verification method, apparatus calculates equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190920

RJ01 Rejection of invention patent application after publication