CN111160928A - Identity verification method and device - Google Patents
Identity verification method and device Download PDFInfo
- Publication number
- CN111160928A CN111160928A CN201911296105.5A CN201911296105A CN111160928A CN 111160928 A CN111160928 A CN 111160928A CN 201911296105 A CN201911296105 A CN 201911296105A CN 111160928 A CN111160928 A CN 111160928A
- Authority
- CN
- China
- Prior art keywords
- voiceprint
- user
- verification
- verification process
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 183
- 238000000034 method Methods 0.000 title claims abstract description 136
- 230000008569 process Effects 0.000 claims abstract description 104
- 238000012545 processing Methods 0.000 claims description 21
- 238000012549 training Methods 0.000 claims description 5
- 230000004044 response Effects 0.000 claims 1
- 238000005516 engineering process Methods 0.000 abstract description 8
- 238000010586 diagram Methods 0.000 description 10
- 238000004590 computer program Methods 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 230000001815 facial effect Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
- G10L17/22—Interactive procedures; Man-machine interfaces
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- Development Economics (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Entrepreneurship & Innovation (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention relates to the field of financial technology (Fintech) and discloses a method and a device for verifying identity, wherein the method comprises the following steps: acquiring verification information, sequentially executing a plurality of preset verification processes, and determining that a user passes identity verification after the user passes each verification process; wherein, executing any verification process comprises: determining a first verification problem from a problem library of a verification process, and displaying the first verification problem to a user; acquiring voice data of a user for answering a first verification question by voice; extracting a first voiceprint and a first answer of the user from the voice data; and determining whether the user passes the verification process or not according to the first voiceprint and the first answer of the user, and if so, entering the next verification process. The technical scheme is used for improving the accuracy of user identity authentication under the condition that a user does not sense.
Description
Technical Field
The embodiment of the invention relates to the field of financial technology (Fintech), in particular to a method and a device for verifying identity.
Background
With the development of computer technology, more and more technologies are applied in the financial field, the traditional financial industry is gradually changing to financial technology (Finteh), and the speech recognition technology is no exception, but due to the requirements of the financial industry on safety and real-time performance, higher requirements are also put forward on the technology.
When bank business is developed, the identity of a user needs to be verified, whether the real identity of the user is a legal identity is judged, in the existing identity verification, face verification is mainly adopted, but the face verification may have risks of non-self, such as twins, masks and the like, so that insecurity of bank business development is caused.
Disclosure of Invention
The embodiment of the invention provides a method and a device for verifying identity, which are used for improving the accuracy of user identity verification under the condition that a user does not sense the identity.
The method for verifying the identity provided by the embodiment of the invention comprises the following steps:
acquiring verification information; the authentication information is used for authenticating the identity of the user;
sequentially executing a plurality of preset verification processes, and determining that the user passes the identity verification after the user passes each verification process; wherein, executing any verification process comprises:
determining a first verification problem from a problem library of the verification process, and displaying the first verification problem to the user;
acquiring voice data of the user for answering the first verification question by voice;
extracting a first voiceprint and a first answer of the user from the speech data;
determining whether the user passes the verification process or not according to the first voiceprint and the first answer of the user; if yes, entering the next verification process.
Optionally, the determining whether the user passes the verification process according to the first voiceprint and the first answer of the user includes:
generating a voiceprint score corresponding to the first voiceprint and a question score corresponding to the first answer;
if the voiceprint score exceeds a first threshold and the question score exceeds a second threshold, determining that the user passes the verification process;
if the voiceprint score does not exceed the first threshold value or the question score does not exceed the second threshold value, determining a second verification question in a question bank of the verification process so as to execute the verification process again for the user, and if the number of times of repeatedly executing the verification process reaches a preset number of times, determining that the user does not pass the verification process.
Optionally, the generating a voiceprint score corresponding to the first voiceprint includes:
determining whether a second voice print corresponding to the identity exists in a voice print database or not according to the identity in the verification information; the standard voiceprint of each user is recorded in the voiceprint database;
and if so, generating the voiceprint score according to the first voiceprint and the second voiceprint.
Optionally, the method further includes:
if it is determined that the second voiceprint corresponding to the identity does not exist in the voiceprint database, pre-registering the first voiceprint into the voiceprint database;
and after the user is determined to pass the identity authentication, taking the first voiceprint pre-registered in the voiceprint database as a standard voiceprint of the user.
Optionally, before determining that the user passes the verification process according to the first voiceprint and the first answer of the user, the method further includes:
and matching the first voiceprint with each voiceprint in a voiceprint blacklist, and if determining that a third voiceprint matched with the first voiceprint exists in the voiceprint blacklist, determining that the user does not pass the identity authentication.
Optionally, after determining that the user passes the authentication, the method further includes:
and inputting the first voiceprint into a voiceprint training model so as to update the standard voiceprint of the user.
In the technical scheme, when the user is authenticated, a plurality of authentication processes need to be performed on the user, voiceprints and problem answers of the user for answering questions are extracted in each authentication process, and the voiceprints and the problem answers of the user are scored respectively to determine whether the user passes through the current authentication process. In addition, the comprehensiveness of the problem of user identity verification can be realized through multiple verification processes, and the accuracy of the whole user identity verification is further improved.
Correspondingly, the embodiment of the invention also provides a device for verifying the identity, which comprises:
an acquisition unit and a processing unit;
the acquisition unit is used for acquiring verification information; the authentication information is used for authenticating the identity of the user;
the processing unit is used for sequentially executing a plurality of preset verification processes, and after the user passes each verification process, determining that the user passes the identity verification; wherein, executing any verification process comprises:
determining a first verification problem from a problem library of the verification process, and displaying the first verification problem to the user;
acquiring voice data of the user for answering the first verification question by voice;
extracting a first voiceprint and a first answer of the user from the speech data;
determining whether the user passes the verification process or not according to the first voiceprint and the first answer of the user; if yes, entering the next verification process.
Optionally, the processing unit is specifically configured to:
generating a voiceprint score corresponding to the first voiceprint and a question score corresponding to the first answer;
if the voiceprint score exceeds a first threshold and the question score exceeds a second threshold, determining that the user passes the verification process;
if the voiceprint score does not exceed the first threshold value or the question score does not exceed the second threshold value, determining a second verification question in a question bank of the verification process so as to execute the verification process again for the user, and if the number of times of repeatedly executing the verification process reaches a preset number of times, determining that the user does not pass the verification process.
Optionally, the processing unit is specifically configured to:
determining whether a second voice print corresponding to the identity exists in a voice print database or not according to the identity in the verification information; the standard voiceprint of each user is recorded in the voiceprint database;
and if so, generating the voiceprint score according to the first voiceprint and the second voiceprint.
Optionally, the processing unit is further configured to:
if it is determined that the second voiceprint corresponding to the identity does not exist in the voiceprint database, pre-registering the first voiceprint into the voiceprint database;
and after the user is determined to pass the identity authentication, taking the first voiceprint pre-registered in the voiceprint database as a standard voiceprint of the user.
Optionally, the processing unit is further configured to:
and matching the first voiceprint with each voiceprint in a voiceprint blacklist before the user passes the verification process according to the first voiceprint and the first answer of the user, and determining that the user does not pass the identity verification if a third voiceprint matched with the first voiceprint is determined to exist in the voiceprint blacklist.
Optionally, the processing unit is further configured to:
after the user is determined to be verified, inputting the first voiceprint to a voiceprint training model to update a standard voiceprint of the user.
Correspondingly, an embodiment of the present invention further provides a computing device, including:
a memory for storing program instructions;
and the processor is used for calling the program instructions stored in the memory and executing the identity verification method according to the obtained program.
Accordingly, embodiments of the present invention also provide a computer-readable non-volatile storage medium, which includes computer-readable instructions, and when the computer-readable instructions are read and executed by a computer, the computer is caused to execute the above method for verifying an identity.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram of a system architecture according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a method for verifying an identity according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an apparatus for verifying an identity according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 schematically shows a system architecture to which the method for authenticating identity provided by the embodiment of the present invention is applicable, and the system architecture may include an anti-fraud authentication system, a video authentication system, a telephone authentication system, a voiceprint authentication system, a decision making system, and a question bank.
The anti-fraud verification system is configured with various anti-fraud policy models for performing anti-fraud verification on the user, specifically, order information, credit investigation information and the like of the user are input into each anti-fraud policy model, whether the user is a fraudulent user is judged, if yes, a service request initiated by the user is directly rejected, and if not, the next verification can be performed.
The phone verification system verifies the identity of the user in a phone form, the video verification system verifies the identity of the user in a video form, after the user is confirmed to pass anti-fraud verification, the phone verification system or the video verification system can be selected, then questions can be selected from a question bank to the user, answer of the questions answered by the user through voice is obtained, the voiceprint verification system identifies the voiceprint of the user in the voice of the user, and the voiceprint of the user is matched with the standard voiceprint of the user, which is configured in the voiceprint verification system in advance, so that a matching result is generated.
And the decision-making system determines whether the user passes the identity authentication or not by combining the question answers of the user and the voiceprint matching result of the user.
Based on the above description, fig. 2 exemplarily shows a flow of a method for verifying an identity according to an embodiment of the present invention.
As shown in fig. 2, the process specifically includes:
The authentication information is used for authenticating the identity of the user when the user requests banking business; the authentication information may include an identification of the user, a contact address, and the like.
In order to ensure the accuracy of the verification, a plurality of verification processes are preset, when the user is subjected to identity verification, the plurality of verification processes are sequentially executed, a second verification process is executed after a first verification process passes, and a third verification process is executed after a second verification process passes until all verification processes pass. Each verification process corresponds to a problem library of the verification process, and the types of the problem libraries of different verification processes are different.
When any verification process is executed, a first verification problem can be determined from a problem library of the verification process and displayed to a user, so that voice data of the user for answering the first verification problem in a voice mode is obtained, a first voiceprint and a first answer of the user are extracted from the voice data, whether the user passes the verification process or not is determined according to the first voiceprint and the first answer of the user, if yes, the next verification process is started, and if not, the user is directly determined to fail in identity verification.
When determining whether the user passes the verification process according to the first voiceprint and the first answer of the user, the first voiceprint and the first answer may be scored respectively, and then whether the user passes the verification process is determined according to the scores.
Specifically, a voiceprint score corresponding to the first voiceprint and a question score corresponding to the first answer are generated, and the voiceprint score and the question score are respectively compared with corresponding threshold values, and the following conditions can be provided:
in the first situation, if the voiceprint score exceeds a first threshold and the problem score exceeds a second threshold, determining that the user can enter the next verification process after passing the verification process;
determining a second verification problem in a problem base of the verification process if the voiceprint score does not exceed a first threshold or the problem score does not exceed a second threshold, so that the verification process is executed again for the user by adopting the second verification problem, and if the voiceprint score of the user is determined to exceed the first threshold and the problem score exceeds the second threshold within the preset times, determining that the user passes through the verification process and can enter the next verification process; if the voiceprint score of the user does not exceed the first threshold value and the problem score does not exceed the second threshold value after the number of times of repeatedly executing the verification process reaches the preset number of times, it can be determined that the user does not pass the verification process, namely, the user does not pass the whole identity verification;
and in a third case, if the voiceprint score does not exceed the first threshold and the problem score does not exceed the second threshold, it can be determined that the user does not pass the verification process, that is, the user does not pass the whole identity verification.
In the embodiment of the present invention, when generating the voiceprint score corresponding to the first voiceprint, the voiceprint database may be read according to the identity in the verification information, where the standard voiceprint of each user is recorded in the voiceprint database. And if a second voiceprint corresponding to the identity in the verification information, namely a standard voiceprint corresponding to the user identity, is read in the voiceprint database, comparing the first voiceprint with the second voiceprint to generate a voiceprint score.
In addition, the standard voiceprint of the user may not be recorded in the voiceprint database, that is, the second voiceprint corresponding to the identity is not determined according to the identity in the verification information, and the first voiceprint of the user is pre-registered in the voiceprint database; and if the user passes the identity authentication after the subsequent determination, taking the first voiceprint pre-registered in the voiceprint database as the standard voiceprint of the user.
In any one verification process, if the video verification system is adopted to verify the identity of the user, the first face image of the user can be obtained, and whether the user passes the verification process or not is determined according to the first voiceprint, the first answer and the first face image of the user. Specifically, the face score, the voiceprint score and the question score of the user are determined, and whether the user passes the verification process or not is determined by combining the three scores. In determining the facial score of the user, the first facial image of the user may be compared to facial images indicated by the identifiers in the image database to generate a facial score.
In the embodiment of the present invention, a voiceprint blacklist may also be set, a voiceprint of each fraudulent user is configured in the voiceprint blacklist, and the voiceprint blacklist is used to determine in advance whether the user is a fraudulent user, that is, before generating a voiceprint score corresponding to a first voiceprint, the first voiceprint is matched with each voiceprint in the voiceprint blacklist, and if it is determined that a third voiceprint matched with the first voiceprint exists, it is determined that the user does not pass the verification. And a voiceprint blacklist is set, and the accuracy of blacklist identification is effectively improved based on blacklist comparison of living body characteristics.
After the user is determined to pass the verification, the standard voiceprint of the user in the voiceprint database can be updated by adopting the first voiceprint in the current identity verification, specifically, the first voiceprint is input into the voiceprint training model to update the standard voiceprint of the user, and the updated standard voiceprint of the user is updated into the voiceprint database.
It should be noted that, whether a video authentication system or a telephone authentication system is adopted, the voiceprint database and the voiceprint blacklist can be shared by the embodiments of the present invention.
In practical application, the embodiment of the invention can be used in the borrowing scene of banking business, and when a user initiates a transaction, the anti-fraud verification system can make a decision to directly pass, reject or need further verification according to the wind control variable of the user transaction. And when the fact that one-step verification is needed is determined, a telephone verification system or a video verification system is selected, and therefore the next step of identity verification is conducted. For example, a user enters a video verification room through a cloud live broadcast technology, a bypass is opened for live broadcast, after a video stream starts to be pushed, the bypass pushes the video stream to a recording platform, a question bank generates verification questions and displays the verification questions to the user, the user answers the questions through voice, the recording platform converts the real-time video stream into an audio stream and pushes the audio stream to a voiceprint verification system, voiceprint features are extracted through voiceprint application in the voiceprint verification system and are compared with stored voiceprints in a voiceprint database, and if the voiceprint database is determined to have standard voiceprints of the user, the comparison is carried out according to the standard voiceprints and the extracted voiceprints; if the voiceprint database does not have the standard voiceprint of the user, the extracted voiceprint is pre-registered in the voiceprint database. And sending the question result answered by the user and the voiceprint comparison result into a decision system, carrying out weighting decision by the decision system, and determining whether the user passes the identity authentication or fails the identity authentication or enters the next authentication process. Here, if the user passes the authentication, the voiceprint pre-registration is converted into the formal registration, and the voiceprint model is re-run by combining the voiceprint feature which passes the comparison with the voiceprint feature which passes the latest, so that the voiceprint feature is optimized. In this example, the voiceprint feature passed through by the borrowing scene can also be used for identity verification in other scenes such as customer service consultation, card change, password change and the like.
In the technical scheme, when the user is authenticated, a plurality of authentication processes need to be performed on the user, voiceprints and problem answers of the user for answering questions are extracted in each authentication process, and the voiceprints and the problem answers of the user are scored respectively to determine whether the user passes through the current authentication process. In addition, the comprehensiveness of the problem of user identity verification can be realized through multiple verification processes, and the accuracy of the whole user identity verification is further improved.
Based on the same inventive concept, fig. 3 exemplarily shows a structure of an apparatus for verifying an identity, which may perform a flow of a method for verifying an identity according to an embodiment of the present invention.
An apparatus for verifying identity, comprising:
an acquisition unit 301 and a processing unit 302;
the obtaining unit 301 is configured to obtain authentication information; the authentication information is used for authenticating the identity of the user;
the processing unit 302 is configured to sequentially execute a plurality of predefined authentication procedures, and after the user passes each authentication procedure, determine that the user passes the identity authentication; wherein, executing any verification process comprises:
determining a first verification problem from a problem library of the verification process, and displaying the first verification problem to the user;
acquiring voice data of the user for answering the first verification question by voice;
extracting a first voiceprint and a first answer of the user from the speech data;
determining whether the user passes the verification process or not according to the first voiceprint and the first answer of the user; if yes, entering the next verification process.
Optionally, the processing unit 302 is specifically configured to:
generating a voiceprint score corresponding to the first voiceprint and a question score corresponding to the first answer;
if the voiceprint score exceeds a first threshold and the question score exceeds a second threshold, determining that the user passes the verification process;
if the voiceprint score does not exceed the first threshold value or the question score does not exceed the second threshold value, determining a second verification question in a question bank of the verification process so as to execute the verification process again for the user, and if the number of times of repeatedly executing the verification process reaches a preset number of times, determining that the user does not pass the verification process.
Optionally, the processing unit 302 is specifically configured to:
determining whether a second voice print corresponding to the identity exists in a voice print database or not according to the identity in the verification information; the standard voiceprint of each user is recorded in the voiceprint database;
and if so, generating the voiceprint score according to the first voiceprint and the second voiceprint.
Optionally, the processing unit 302 is further configured to:
if it is determined that the second voiceprint corresponding to the identity does not exist in the voiceprint database, pre-registering the first voiceprint into the voiceprint database;
and after the user is determined to pass the identity authentication, taking the first voiceprint pre-registered in the voiceprint database as a standard voiceprint of the user.
Optionally, the processing unit 302 is further configured to:
and matching the first voiceprint with each voiceprint in a voiceprint blacklist before the user passes the verification process according to the first voiceprint and the first answer of the user, and determining that the user does not pass the identity verification if a third voiceprint matched with the first voiceprint is determined to exist in the voiceprint blacklist.
Optionally, the processing unit 302 is further configured to:
after the user is determined to be verified, inputting the first voiceprint to a voiceprint training model to update a standard voiceprint of the user.
Based on the same inventive concept, an embodiment of the present invention further provides a computing device, including:
a memory for storing program instructions;
and the processor is used for calling the program instructions stored in the memory and executing the identity verification method according to the obtained program.
Based on the same inventive concept, the embodiment of the present invention also provides a computer-readable non-volatile storage medium, which includes computer-readable instructions, and when the computer-readable instructions are read and executed by a computer, the computer-readable instructions cause the computer to execute the above method for verifying the identity.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (10)
1. A method of verifying identity, comprising:
acquiring verification information; the authentication information is used for authenticating the identity of the user;
sequentially executing a plurality of preset verification processes, and determining that the user passes the identity verification after the user passes each verification process; wherein, executing any verification process comprises:
determining a first verification problem from a problem library of the verification process, and displaying the first verification problem to the user;
acquiring voice data of the user for answering the first verification question by voice;
extracting a first voiceprint and a first answer of the user from the speech data;
determining whether the user passes the verification process or not according to the first voiceprint and the first answer of the user; if yes, entering the next verification process.
2. The method of claim 1, wherein said determining whether the user passed the authentication process based on the user's first voice print and first answer comprises:
generating a voiceprint score corresponding to the first voiceprint and a question score corresponding to the first answer;
if the voiceprint score exceeds a first threshold and the question score exceeds a second threshold, determining that the user passes the verification process;
if the voiceprint score does not exceed the first threshold value or the question score does not exceed the second threshold value, determining a second verification question in a question bank of the verification process so as to execute the verification process again for the user, and if the number of times of repeatedly executing the verification process reaches a preset number of times, determining that the user does not pass the verification process.
3. The method of claim 2, wherein the generating the voiceprint score corresponding to the first voiceprint comprises:
determining whether a second voice print corresponding to the identity exists in a voice print database or not according to the identity in the verification information; the standard voiceprint of each user is recorded in the voiceprint database;
and if so, generating the voiceprint score according to the first voiceprint and the second voiceprint.
4. The method of claim 3, wherein the method further comprises:
if it is determined that the second voiceprint corresponding to the identity does not exist in the voiceprint database, pre-registering the first voiceprint into the voiceprint database;
and after the user is determined to pass the identity authentication, taking the first voiceprint pre-registered in the voiceprint database as a standard voiceprint of the user.
5. The method of claim 1, wherein said determining that the user passed the authentication process based on the first voiceprint and the first response of the user further comprises:
and matching the first voiceprint with each voiceprint in a voiceprint blacklist, and if determining that a third voiceprint matched with the first voiceprint exists in the voiceprint blacklist, determining that the user does not pass the identity authentication.
6. The method of any of claims 1 to 5, wherein after determining that the user is authenticated, further comprising:
and inputting the first voiceprint into a voiceprint training model so as to update the standard voiceprint of the user.
7. An apparatus for verifying an identity, comprising:
an acquisition unit and a processing unit;
the acquisition unit is used for acquiring verification information; the authentication information is used for authenticating the identity of the user;
the processing unit is used for sequentially executing a plurality of preset verification processes, and after the user passes each verification process, determining that the user passes the identity verification; wherein, executing any verification process comprises:
determining a first verification problem from a problem library of the verification process, and displaying the first verification problem to the user;
acquiring voice data of the user for answering the first verification question by voice;
extracting a first voiceprint and a first answer of the user from the speech data;
determining whether the user passes the verification process or not according to the first voiceprint and the first answer of the user; if yes, entering the next verification process.
8. The apparatus as claimed in claim 7, wherein said processing unit is specifically configured to:
generating a voiceprint score corresponding to the first voiceprint and a question score corresponding to the first answer;
if the voiceprint score exceeds a first threshold and the question score exceeds a second threshold, determining that the user passes the verification process;
if the voiceprint score does not exceed the first threshold value or the question score does not exceed the second threshold value, determining a second verification question in a question bank of the verification process so as to execute the verification process again for the user, and if the number of times of repeatedly executing the verification process reaches a preset number of times, determining that the user does not pass the verification process.
9. A computing device, comprising:
a memory for storing program instructions;
a processor for calling program instructions stored in said memory to execute the method of any one of claims 1 to 6 in accordance with the obtained program.
10. A computer-readable non-transitory storage medium including computer-readable instructions which, when read and executed by a computer, cause the computer to perform the method of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911296105.5A CN111160928A (en) | 2019-12-16 | 2019-12-16 | Identity verification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911296105.5A CN111160928A (en) | 2019-12-16 | 2019-12-16 | Identity verification method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111160928A true CN111160928A (en) | 2020-05-15 |
Family
ID=70557148
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911296105.5A Pending CN111160928A (en) | 2019-12-16 | 2019-12-16 | Identity verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111160928A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111814732A (en) * | 2020-07-23 | 2020-10-23 | 上海优扬新媒信息技术有限公司 | Identity verification method and device |
CN112637282A (en) * | 2020-12-08 | 2021-04-09 | 平安普惠企业管理有限公司 | Information pushing method and device, computer equipment and storage medium |
CN112733830A (en) * | 2020-12-31 | 2021-04-30 | 上海芯翌智能科技有限公司 | Shop signboard identification method and device, storage medium and computer equipment |
CN112990051A (en) * | 2021-03-26 | 2021-06-18 | 国网河北省电力有限公司信息通信分公司 | Auxiliary authentication method and device, electronic equipment and storage medium |
CN113592626A (en) * | 2021-07-29 | 2021-11-02 | 中国工商银行股份有限公司 | Method and device for checking application information of anti-fraud credit card |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102737634A (en) * | 2012-05-29 | 2012-10-17 | 百度在线网络技术(北京)有限公司 | Authentication method and device based on voice |
WO2014190742A1 (en) * | 2013-05-29 | 2014-12-04 | Tencent Technology (Shenzhen) Company Limited | Method, device and system for identity verification |
CN106981016A (en) * | 2017-03-30 | 2017-07-25 | 广东微模式软件股份有限公司 | A kind of remote self-help real name buys the method and system of phonecard |
WO2017198014A1 (en) * | 2016-05-19 | 2017-11-23 | 阿里巴巴集团控股有限公司 | Identity authentication method and apparatus |
CN109428719A (en) * | 2017-08-22 | 2019-03-05 | 阿里巴巴集团控股有限公司 | A kind of auth method, device and equipment |
CN109473108A (en) * | 2018-12-15 | 2019-03-15 | 深圳壹账通智能科技有限公司 | Auth method, device, equipment and storage medium based on Application on Voiceprint Recognition |
CN110265037A (en) * | 2019-06-13 | 2019-09-20 | 中信银行股份有限公司 | Auth method, device, electronic equipment and computer readable storage medium |
-
2019
- 2019-12-16 CN CN201911296105.5A patent/CN111160928A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102737634A (en) * | 2012-05-29 | 2012-10-17 | 百度在线网络技术(北京)有限公司 | Authentication method and device based on voice |
WO2014190742A1 (en) * | 2013-05-29 | 2014-12-04 | Tencent Technology (Shenzhen) Company Limited | Method, device and system for identity verification |
WO2017198014A1 (en) * | 2016-05-19 | 2017-11-23 | 阿里巴巴集团控股有限公司 | Identity authentication method and apparatus |
CN106981016A (en) * | 2017-03-30 | 2017-07-25 | 广东微模式软件股份有限公司 | A kind of remote self-help real name buys the method and system of phonecard |
CN109428719A (en) * | 2017-08-22 | 2019-03-05 | 阿里巴巴集团控股有限公司 | A kind of auth method, device and equipment |
CN109473108A (en) * | 2018-12-15 | 2019-03-15 | 深圳壹账通智能科技有限公司 | Auth method, device, equipment and storage medium based on Application on Voiceprint Recognition |
CN110265037A (en) * | 2019-06-13 | 2019-09-20 | 中信银行股份有限公司 | Auth method, device, electronic equipment and computer readable storage medium |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111814732A (en) * | 2020-07-23 | 2020-10-23 | 上海优扬新媒信息技术有限公司 | Identity verification method and device |
CN111814732B (en) * | 2020-07-23 | 2024-02-09 | 度小满科技(北京)有限公司 | Identity verification method and device |
CN112637282A (en) * | 2020-12-08 | 2021-04-09 | 平安普惠企业管理有限公司 | Information pushing method and device, computer equipment and storage medium |
CN112637282B (en) * | 2020-12-08 | 2023-02-03 | 平安普惠企业管理有限公司 | Information pushing method and device, computer equipment and storage medium |
CN112733830A (en) * | 2020-12-31 | 2021-04-30 | 上海芯翌智能科技有限公司 | Shop signboard identification method and device, storage medium and computer equipment |
CN112990051A (en) * | 2021-03-26 | 2021-06-18 | 国网河北省电力有限公司信息通信分公司 | Auxiliary authentication method and device, electronic equipment and storage medium |
CN113592626A (en) * | 2021-07-29 | 2021-11-02 | 中国工商银行股份有限公司 | Method and device for checking application information of anti-fraud credit card |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111160928A (en) | Identity verification method and device | |
CN106373575B (en) | User voiceprint model construction method, device and system | |
CA2736133C (en) | Voice authentication system and methods | |
US8548208B2 (en) | Multifactor multimedia biometric authentication | |
WO2020077885A1 (en) | Identity authentication method and apparatus, computer device and storage medium | |
CN108429619A (en) | Identity identifying method and system | |
CN110533288A (en) | Business handling process detection method, device, computer equipment and storage medium | |
CN108510290B (en) | Customer information amending method, device, computer equipment and storage medium in call | |
CN105991593A (en) | Method and device for identifying risk of user | |
US20220318349A1 (en) | Liveness detection using audio-visual inconsistencies | |
EP4055592B1 (en) | Systems and methods for customer authentication based on audio-of-interest | |
CN111726365B (en) | Method and device for online identity authentication | |
CN110379433A (en) | Method, apparatus, computer equipment and the storage medium of authentication | |
WO2022236386A1 (en) | Access control system | |
CN115906028A (en) | User identity verification method and device and self-service terminal | |
KR20190044945A (en) | Apparatus and Method for Speaker Identification | |
CN111695905B (en) | Payment method, device, computing equipment and storage medium | |
US20220139402A1 (en) | Voice authentication apparatus, voice authentication method, and a recording medium | |
US11031016B2 (en) | Graph-based approach for voice authentication | |
TWI778234B (en) | Speaker verification system | |
KR20140029990A (en) | System and method for authetificate the user using biometrics | |
CN111598577A (en) | Resource transfer method, device, computer equipment and storage medium | |
US20230325481A1 (en) | Method and System for Authentication of a Subject by a Trusted Contact | |
Goel et al. | Security Identity: An Audio-Video Biometric Approach | |
CN116186668A (en) | Identity authentication method and device, storage medium and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200515 |
|
RJ01 | Rejection of invention patent application after publication |