CN113034110B - Service processing method, system, medium and electronic equipment based on video auditing - Google Patents

Service processing method, system, medium and electronic equipment based on video auditing Download PDF

Info

Publication number
CN113034110B
CN113034110B CN202110338656.4A CN202110338656A CN113034110B CN 113034110 B CN113034110 B CN 113034110B CN 202110338656 A CN202110338656 A CN 202110338656A CN 113034110 B CN113034110 B CN 113034110B
Authority
CN
China
Prior art keywords
terminal
video
service
user
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110338656.4A
Other languages
Chinese (zh)
Other versions
CN113034110A (en
Inventor
李善婷
石春波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taikang Insurance Group Co Ltd
Original Assignee
Taikang Insurance Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taikang Insurance Group Co Ltd filed Critical Taikang Insurance Group Co Ltd
Priority to CN202110338656.4A priority Critical patent/CN113034110B/en
Publication of CN113034110A publication Critical patent/CN113034110A/en
Application granted granted Critical
Publication of CN113034110B publication Critical patent/CN113034110B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The disclosure provides a service processing method, a system, a storage medium and electronic equipment based on video auditing, and relates to the technical field of computers. The service processing method comprises the following steps: receiving request information of a service to be processed sent by a first terminal, wherein the request information comprises a ready user list, and the ready user list comprises at least two ready users; when judging that the video auditing requirements of the service to be processed are met according to the ready user list, establishing video connection with at least one terminal, and receiving video sent by the at least one terminal, wherein the at least one terminal comprises the first terminal; identifying user identity information in the video; and when the user identity information is verified, starting the business handling flow of the business to be processed. The implementation scheme for on-line transaction of the multi-user service is provided, and service processing efficiency and safety are improved.

Description

Service processing method, system, medium and electronic equipment based on video auditing
Technical Field
The disclosure relates to the field of computer technology, and in particular relates to a service processing method based on video auditing, a service processing system based on video auditing, a computer readable storage medium and electronic equipment.
Background
With the development of the internet and the popularization of terminals such as smart phones, many services are changed from off-line to on-line, for example, users need to go to insurance companies and bank counters before they can handle insurance and finance related services, and most of the services can be handled by mobile phone App (Application program) at present, which is very convenient. However, for an institution responsible for service processing, there is a certain security risk in online service, for example, it is difficult to ensure that the identity and intention of the user are truly and effectively, so that a situation that service fraud cannot be screened out is caused, and loss is easily caused to the institution or the user himself.
Disclosure of Invention
The disclosure provides a service processing method based on video auditing, a service processing system based on video auditing, a computer readable storage medium and electronic equipment, so that the safety of online service handling is improved at least to a certain extent.
According to a first aspect of the present disclosure, there is provided a service processing method based on video auditing, including: receiving request information of a service to be processed sent by a first terminal, wherein the request information comprises a ready user list, and the ready user list comprises at least two ready users; when judging that the video auditing requirements of the service to be processed are met according to the ready user list, establishing video connection with at least one terminal, and receiving video sent by the at least one terminal, wherein the at least one terminal comprises the first terminal; identifying user identity information in the video; and when the user identity information is verified, starting the business handling flow of the business to be processed.
Optionally, the establishing a video connection with at least one terminal includes: sending video invitation information to the first terminal; and when receiving the consent information fed back by the first terminal according to the video invitation information and reaching a first reservation time, establishing video connection with the first terminal.
Optionally, the at least one terminal further comprises at least one second terminal; the establishing video connection with at least one terminal comprises the following steps: sending video invitation information to the first terminal and/or the second terminal; when receiving the consent information fed back by the second terminal according to the video invitation information and reaching a second reservation time, establishing video connection with the second terminal; the identifying the user identity information in the video comprises the following steps: and identifying user identity information in the video sent by the first terminal and the video sent by the second terminal.
Optionally, the method further comprises: forwarding the video sent by the second terminal to the first terminal, and receiving a first verification result fed back by the first terminal; forwarding the video sent by the first terminal to the second terminal, and receiving a second verification result fed back by the second terminal; and determining the verification result of the user identity information according to the first verification result, the second verification result and an identification result obtained by identifying the user identity information in the video sent by the first terminal and the video sent by the second terminal.
Optionally, the receiving the video sent by the at least one terminal includes: providing verification actions and verification codes, enabling a user to make actions in a video according to the verification actions and inputting voice according to the verification codes; receiving video and voice fed back by the at least one terminal in response to the verification action and the verification code; the authentication of the user identity information comprises the following steps: and verifying the face and the action in the video and verifying the voiceprint features in the voice.
Optionally, after starting the business handling process of the to-be-processed business, the method further includes: and when the number of the detected faces in the real-time video sent by the at least one terminal does not accord with the preset number, or the user identity information corresponding to any face in the real-time video sent by the at least one terminal is not verified, risk prompt information is generated.
Optionally, when the at least one terminal further includes at least one second terminal, the method further includes: according to a first mark point in a first real-time video sent by the first terminal and a second mark point in a second real-time video sent by the second terminal, time alignment is carried out on the first real-time video and the second real-time video; and verifying the number of faces in the first real-time video and the second real-time video after time alignment and user identity information corresponding to each face.
Optionally, after starting the business handling process of the to-be-processed business, the method further includes: providing service confirmation content to guide a user to input service feedback information; and when the feedback result is judged to be confirmation according to the service feedback information and the user identity information is verified to pass according to the service feedback information, acquiring a service confirmation result.
Optionally, after obtaining the service confirmation result, the method further includes: providing a person certificate input prompt message to guide a user to input a person certificate acquisition video comprising a face and a certificate; and when the face in the human license acquisition video is successfully matched with the face in the certificate, and the user identity information corresponding to the face in the human license acquisition video in the ready user is successfully matched with the user identity information in the certificate, determining that the human license is successfully input.
According to a second aspect of the present disclosure, there is provided a service processing system based on video auditing, including a server, a first terminal, wherein the first terminal is configured to: sending request information of a service to be processed to the server, and sending a video to the server after video connection is established with the server; the request information comprises a ready user list, and the ready user list comprises at least two ready users; the server is configured to: receiving the request information, establishing video connection with at least one terminal including the first terminal when judging that the video auditing requirement of the service to be processed is met according to the ready user list, receiving the video sent by the at least one terminal, identifying user identity information in the video, and starting the transaction flow of the service to be processed when the user identity information is verified.
Optionally, the system further comprises at least one second terminal configured to: receiving video invitation information sent by the server or video invitation information sent by the server to the first terminal and forwarded by the first terminal, and feeding back consent information to the server in response to preset operation on the video invitation information; the server is configured to: and when the consent information fed back by the second terminal is received and the second reservation time is reached, establishing video connection with the second terminal.
According to a third aspect of the present disclosure, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the service processing method of the first aspect described above and possible implementations thereof.
According to a fourth aspect of the present disclosure, there is provided an electronic device comprising: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to perform the service processing method of the first aspect and possible implementations thereof via execution of the executable instructions.
The technical scheme of the present disclosure has the following beneficial effects:
The implementation scheme for online transaction of the multi-user service is provided, pre-auditing is carried out before video connection is established according to video auditing requirements, service processing efficiency is improved, and safety of online transaction of the service is improved by identifying and verifying user identity information in video.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure. It will be apparent to those of ordinary skill in the art that the drawings in the following description are merely some embodiments of the present disclosure and that other drawings may be derived from these drawings without undue effort.
FIG. 1 shows a schematic architecture diagram of a video-audit-based business processing system in the present exemplary embodiment;
FIG. 2 is a flow chart illustrating a method of video-audit-based business processing in the present exemplary embodiment;
fig. 3 is a flowchart illustrating a service processing method in the present exemplary embodiment;
Fig. 4 is a diagram showing a policy information editing page in the present exemplary embodiment;
fig. 5 is a schematic diagram showing video invitation information in the present exemplary embodiment;
fig. 6 is a schematic diagram showing risk prompt information in the present exemplary embodiment;
fig. 7 shows a flowchart for acquiring a service confirmation result in the present exemplary embodiment;
FIG. 8 is a flowchart showing another video-audit-based business processing method in the present exemplary embodiment;
FIG. 9 is an interactive flow chart of a video-audit-based business processing method in the present exemplary embodiment;
fig. 10 shows a schematic structural diagram of an electronic device in the present exemplary embodiment.
Detailed Description
Exemplary embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the exemplary embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the present disclosure. One skilled in the relevant art will recognize, however, that the aspects of the disclosure may be practiced without one or more of the specific details, or with other methods, components, devices, steps, etc. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus a repetitive description thereof will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in software or in one or more hardware modules or integrated circuits or in different networks and/or processor devices and/or microcontroller devices.
The flow diagrams depicted in the figures are exemplary only and not necessarily all steps are included. For example, some steps may be decomposed, and some steps may be combined or partially combined, so that the order of actual execution may be changed according to actual situations.
In the related art, a scheme of performing service processing through video has appeared. The user is usually required to conduct face recognition authentication when transacting business so as to ensure the authenticity of the user identity. The scheme can be realized only for the business handled by a single person.
However, when a business involves a plurality of users, for example, an insurance application business involves an applicant, an insured, a financial loan business involves a borrower, a guarantor, etc., on-line transaction cannot be realized by the above-described scheme.
In view of the foregoing, exemplary embodiments of the present disclosure provide a video-audit-based service processing method for services involving multiple users. The application scenarios of the service processing method include, but are not limited to: in the insurance application service, an applicant and an insured person (or other related personnel such as beneficiaries, insurance agents and the like) are connected with a server through one or more terminal devices and send video data, the applicant and the insured person both appear in the video, and the server realizes related service processing based on video auditing.
In order to implement the above service processing method, an exemplary embodiment of the present disclosure provides a service processing system based on video auditing. Fig. 1 shows a schematic architecture diagram of the business processing system. As shown in fig. 1, the service processing system 100 may include a server 110 and a first terminal 120. Wherein the server 110 is a background server deployed by a service provider (e.g., insurance company, bank, etc.). The first terminal 120 is a terminal device used by a user who transacts a service, and more specifically, may be a terminal device used by a user who initiates a service transacting request (referred to herein as a service initiating user), such as a smart phone, a personal computer, a tablet computer, or the like. The server 110 and the first terminal 120 may establish a connection through a network to implement service interaction, for example, the first terminal 120 establishes a video connection with the server 110 through the network to perform online service transaction.
It should be understood that the server 110 may be one computer or may be a cluster formed by a plurality of computers, for example, may include a video connection server, an authentication server, a service handling server, and the like, and the present disclosure is not limited to a specific architecture of the server 110.
The first terminal 120 is configured to: the request information of the service to be processed is transmitted to the server 110, and after the video connection is established with the server 110, the video is transmitted to the server 110. Wherein the request information comprises a ready user list comprising at least two ready users.
The server 110 is configured to: receiving request information, establishing video connection with at least one terminal including the first terminal 120 when the video auditing requirement of the service to be processed is judged to be met according to the ready user list, receiving the video sent by the at least one terminal, identifying user identity information in the video, and starting the transaction flow of the service to be processed when the user identity information is verified.
In one embodiment, the first terminal 120 is configured to: the video invitation information transmitted by the server 110 is received, and the consent information is fed back to the server 110 in response to a preset operation for the video invitation information. The video invitation information is used to invite the terminal to establish a video connection with the server, and may be, for example, information including a link pushed by the server 110. The preset operation refers to an operation of accepting the video invitation by the user, for example, an operation of clicking the video invitation information, an operation of selecting to accept after long pressing the video invitation information, and the like. When the user performs the preset operation, the first terminal 120 is triggered to send the consent information about the video invitation information to the server 110, so as to establish video connection with the server 110.
The server 110 is configured to: when the consent information fed back by the first terminal 120 is received and the first reservation time is reached, a video connection is established with the first terminal 120.
In one embodiment, the system 100 may further include at least one second terminal 130, which is a terminal device used by a service related user other than the service initiation user, and may establish a connection with the server 110 through a network. For example, the applicant uses the first terminal 120 and the insured uses the second terminal 130, all to establish a video connection with the insurer's server 110.
The second terminal 130 is configured to: the video invitation information transmitted by the server 110 or the video invitation information transmitted by the server 110 to the first terminal 120 and forwarded by the first terminal 120 is received, and the consent information is fed back to the server 110 in response to a preset operation for the video invitation information.
The server 110 is configured to: when the consent information fed back by the second terminal 130 is received and the second reservation time is reached, a video connection is established with the second terminal 130.
In one embodiment, the server 110 is configured to: and identifying user identity information in the video sent by the first terminal and the video sent by the second terminal.
In one embodiment, the server 110 is configured to: forwarding the video sent by the second terminal 130 to the first terminal 120, and receiving a first verification result fed back by the first terminal 120; forwarding the video sent by the first terminal 120 to the second terminal 130, and receiving a second verification result fed back by the second terminal 130; and determining the verification result of the user identity information according to the first verification result, the second verification result and the identification result obtained by identifying the user identity information in the video sent by the first terminal 120 and the video sent by the second terminal 130.
In one embodiment, the server 110 is configured to: providing verification actions and verification codes, enabling a user to make actions in a video according to the verification actions and inputting voices according to the verification codes; receiving video and voice fed back by the at least one terminal in response to the verification action and the verification code; and verifying the face and the action in the video, and verifying the voiceprint characteristics in the voice to determine the verification result of the user identity information.
In one embodiment, the server 110 is configured to: after the handling flow of the service to be processed is started, when the number of detected faces in the real-time video sent by at least one terminal does not accord with the preset number, or the user identity information corresponding to any face in the real-time video sent by at least one terminal is not verified, risk prompt information is generated.
In one embodiment, the server 110 is configured to: time-aligning the first real-time video with the second real-time video according to the first mark point in the first real-time video transmitted by the first terminal 120 and the second mark point in the second real-time video transmitted by the second terminal 130; and verifying the number of faces in the first real-time video and the second real-time video which are subjected to time alignment and the user identity information corresponding to each face.
In one embodiment, the server 110 is configured to: providing service confirmation content to guide a user to input service feedback information; and when the feedback result is judged to be confirmation according to the service feedback information and the user identity information is verified to pass according to the service feedback information, acquiring a service confirmation result.
In one embodiment, the server 110 is configured to: after a service confirmation result is obtained, providing a personnel identification recording prompt message to guide a user to record personnel identification collection video comprising a face and a certificate; and when the face in the human license acquisition video is successfully matched with the face in the certificate, and the user identity information corresponding to the face in the human license acquisition video in the ready user is successfully matched with the user identity information in the certificate, determining that the human license is successfully input.
The service processing method will be described from the perspective of the server. Fig. 2 illustrates an exemplary flow of a business processing method performed by a server, which may include:
step S210, receiving request information of a service to be processed sent by a first terminal, wherein the request information comprises a ready user list which comprises at least two ready users;
step S220, when judging that the video auditing requirement of the service to be processed is met according to the ready user list, establishing video connection with at least one terminal, and receiving the video sent by the at least one terminal;
step S230, identifying user identity information in the video;
step S240, when the user identity information passes the verification, the business handling process of the business to be processed is started.
Based on the method, the scheme for online transaction of the multi-user service is provided, pre-auditing is carried out before video connection is established according to video auditing requirements, service processing efficiency is improved, and safety of online transaction of the service is improved by identifying and verifying user identity information in video.
Fig. 2 shows a flow of business processing based on video auditing. For online transacted business, video auditing is a relatively strict processing flow, and for some businesses with low security requirements, the video auditing is not needed, and the online transacted business is completed through conventional electronic transaction. In one embodiment, a business condition for video review may be set, and the business process may be classified using the condition. Referring to fig. 3, the business process flow may include:
Step S310, information of the service to be processed is obtained.
Step S320, judging whether the service to be processed involves the blacklist user. The blacklisted users may be users with a certain credit risk. If a blacklisted user is involved, then step S360 is performed; if not, step S330 is performed.
Step S330, judging whether the service to be processed is a high risk service. The high risk service may be determined in advance according to actual service conditions, for example, the loan service is a high risk service. If the service is a high risk service, executing step S360; if not, step S340 is performed.
Step S340, judging whether the related amount of the service to be processed belongs to a high amount. The standard for the high amount of money may be set according to actual business conditions, which is not limited by the present disclosure. If the amount of money is high, executing step S360; if not, step S350 is performed.
And step S350, processing the service to be processed by adopting a conventional electronic processing flow.
In step S360, the service to be processed is processed through the video auditing process, that is, the service processing is completed by executing the method process of fig. 2.
Therefore, video auditing processing is carried out on the business with higher security requirement, which is beneficial to improving the business processing efficiency.
Further, each step in fig. 2 is specifically described.
Referring to fig. 2, in step S210, request information of a service to be processed transmitted by a first terminal is received, the request information including a ready user list including at least two ready users.
The request information is information generated when a user initiates a service handling request. The service initiation user may edit and submit the request information of the service to be processed in the first terminal. Ready users refer to users who are currently ready for service handling through video among related users of the service to be processed.
For example, for an insurance service, the service initiating user may be an applicant who selects to transact the insurance service in the page of the insurance App, entering the relevant page for the transaction of the service. Fig. 4 shows a schematic diagram of an policy information editing page in which a service initiating user can edit information of related users, such as information of filling out an applicant, insured, beneficiary, etc., and check which users are ready for video review, thereby determining ready users, such as the insurance applicant and insured being checked as ready users in fig. 4. The first terminal may generate a ready user list and add it to the request information.
The pending service of the present exemplary embodiment requires at least two users to participate in the transaction, and thus the ready user list includes at least two ready users.
With continued reference to fig. 2, in step S220, when it is determined that the video auditing requirement of the service to be processed is satisfied according to the ready user list, a video connection is established with at least one terminal, and a video transmitted by the at least one terminal is received.
The video auditing requirement refers to which users are required to appear in the video when online handling of the service to be processed is performed. For example, when the insurance service requires that both the applicant and the insured appear in the video, and the ready user list includes the applicant and the insured, the server determines that the video auditing requirement of the service to be processed is satisfied. Before the actual video auditing starts, judging whether the video auditing requirement of the service to be processed is met according to the ready user list, which is equivalent to pre-auditing, if the ready user list provided by the user does not meet the video auditing requirement, the server does not need to establish video connection with the terminal, and can return corresponding prompt information, such as 'personnel participating in the video auditing does not meet the requirement', 'xxx is also required to participate in the video auditing', and the like, so as to ensure that the actual video connection is carried out again under the condition that the user participating in the video auditing meets the video auditing requirement, and improve the service processing efficiency.
The present exemplary embodiment allows all users participating in business transaction to make video connection through one terminal or a plurality of terminals. When only one terminal participates in service handling, the terminal is a first terminal, and after the server establishes video connection with the first terminal, subsequent service handling can be performed; when a plurality of terminals participate in service handling, the server needs to establish a video connection with at least one second terminal in addition to the first terminal. Thus, the at least one terminal includes a first terminal and may further include at least one second terminal, where the second terminal is a terminal device used by a service related user other than the service initiation user.
When meeting the video auditing requirement, the server can establish video connection with at least one terminal, and the terminal shoots videos in real time and sends the videos to the server. The video should contain the ready user's face.
In one embodiment, the establishing a video connection with at least one terminal may include:
sending video invitation information to a first terminal;
and when receiving the consent information fed back by the first terminal according to the video invitation information and reaching the first reservation time, establishing video connection with the first terminal.
When the first terminal receives the video invitation information, corresponding information can be displayed. Referring to fig. 5, the first terminal may display the video invitation information through a pop-up window to ask the user whether to authorize the counterpart to record the video and collect the audio in the whole course, and if the user selects "agree", the first terminal feeds back the agree information to the server.
The first reservation time may be a business handling time previously agreed by the first terminal and the server. For example, when a service initiating user requests a service for the first time, it may not be clear which personnel are required to participate in the video auditing, so that the video auditing requirement is not satisfied, and the service cannot be transacted. In this case, the service handling time can be reserved for the server, and the server can take the first reserved time as one of the preconditions for establishing the video connection, so as to better realize the scheduling of service processing and optimize the allocation of server resources.
The first appointment time may be a time period, e.g., 10:00-10:30 of x years x months x days, within which the current time is indicative of reaching the first appointment time.
In one embodiment, the establishing a video connection with at least one terminal may include:
Sending video invitation information to a first terminal and/or a second terminal;
and receiving the consent information fed back by at least one second terminal according to the video invitation information, and establishing video connection with the second terminal when the second reservation time is reached.
The video invitation information may be directly sent to the second terminal by the server, for example, when the server determines that the video auditing requirement of the service to be processed is met according to the ready user list, the server pushes the video invitation information to all ready users. The video invitation information may also be forwarded by the first terminal to the second terminal, for example, the server sends the video invitation information to the first terminal, where the video invitation information includes a link, the first terminal shares the video invitation information to the second terminal, and when the user clicks the video invitation information, the user may trigger to request to join the video connection to the server through the link therein, where the request corresponds to the consent information, so that the first terminal and the second terminal establish video connection with the server.
Second reservation time the first terminal and the server have previously agreed service handling times for the user of the second terminal. In general, the service initiating user and other service related users can perform service handling at the same time, and the first reserved time is the same as the second reserved time, that is, the first terminal and the second terminal establish video connection with the server at the same time or in the same time period. Or, the service initiating user and other related users can conduct service transaction simultaneously, for example, the applicant conducts the service transaction of the former part alone, the insured person joins the service transaction of the latter part, the first reservation time and the second reservation time can be different, that is, the first terminal and the second terminal establish video connection with the server at different times or different time periods.
In one embodiment, the server may send the video invitation information to the first terminal when the first reservation time is reached, and may also send the video invitation information to the second terminal when the second reservation time is reached.
After the video connection is established between the terminals and the server, each terminal sends the video to the server.
With continued reference to fig. 2, in step S230, user identity information in the video is identified.
In this exemplary embodiment, after receiving the video sent by the terminal, the server may determine the user identity information in the video through biometric identification. Biometric identification includes, but is not limited to: face recognition, voiceprint recognition, and the like.
When a plurality of users are included in the video, the server may recognize identity information of each user, respectively.
In one embodiment, if the first terminal and at least one second terminal each establish a video connection with the server and transmit a video, the server may identify user identity information in the video transmitted by the first terminal and the video transmitted by the second terminal.
An insurance company or a bank or other institution typically creates a user information database to store collected information such as the face, voiceprints, etc. of the user. In step S230, the server may compare the face, voiceprint, etc. in the video with the face, voiceprint, etc. in the user information database to determine user identity information. Or the server can also send the information such as the face, the voiceprint and the like in the video to a third party mechanism, and the third party mechanism can compare the information such as the face, the voiceprint and the like and return the identification result of the user identity information.
With continued reference to fig. 2, in step S240, when the user identity information is verified, a transaction flow of the service to be processed is started.
The user identity information verification mainly comprises two aspects: one is to verify the authenticity of the user identity information, e.g. the authenticity of the video itself, ensuring that it is not a computer synthesized or pre-recorded video; secondly, verifying that the user identity information corresponds to the information in the ready user list one by one, namely, the user in the video is the user in the ready user list, and actually verifying whether the video auditing requirement of the service to be processed is met or not again according to the user identity information in the video. When the verification is passed, the business handling process of the business to be processed can be started.
In one embodiment, to effectively identify composite video or pre-recorded video to prevent business fraud by malicious users, after the video connection is established, the server may perform the steps of:
providing verification actions and verification codes, enabling a user to make actions in a video according to the verification actions and inputting voices according to the verification codes;
and receiving video and voice fed back by the at least one terminal in response to the verification action and the verification code.
For example, the verification action may be blinking, opening mouth, shaking head left, shaking head right, etc., or a group of actions formed by arranging a plurality of actions, and the verification code may be a segment of a character, such as text, a number string, etc. The server may randomly generate the verification action and the verification code, and send information of the verification action and the verification code to the first terminal. The first terminal displays the guiding information of the verification action and the verification code, such as displaying a face frame and an arrow on the upper, lower, left and right in the middle of the screen, so as to guide the user to shake the head on the upper, lower, left and right, and simultaneously display "please think xxx" (xxx represents the verification code) under the screen. The user can send the verification code while making the verification action, and the first terminal sends the video containing the voice to the server for verification.
Further, the server performs triple verification: verifying whether the face in the video is the face of the ready user; verifying whether voiceprint features in voice are matched with voiceprint features of ready users, so that accuracy of user identity information identification is improved through combination of faces and the voiceprint features, and consistency of the user identity information and information in a ready user list is ensured; and verifying whether the action in the video is matched with the verification action, namely, whether the action made by the user is accurate or not, so as to ensure that the video is not synthesized or recorded in advance. Thus, the authentication of the user identity information may include: and verifying the face and the action in the video, and verifying the voiceprint characteristics in the voice.
Therefore, by combining the verification action with the verification code, very high security guarantee can be realized, and the user can make actions and input voice simultaneously when carrying out verification, so that the collection of three information of a face, the actions and the voiceprints is completed, and the method is very convenient.
In one embodiment, if the first terminal and at least one second terminal establish video connection with the server and send video, the server may send the verification action and the verification code to the first terminal and the second terminal respectively, and the verification action and the verification code sent to different terminals may be the same or different. After receiving the fed-back video and voice from the first terminal and the second terminal, the server respectively verifies the video and the voice, and when the video and the voice fed back by the first terminal and the second terminal pass the verification, the server starts the business handling process of the business to be processed.
In one embodiment, if the first terminal and at least one second terminal each establish a video connection with the server and send a video, the first terminal and the second terminal may be mutually authenticated. Specifically, the service processing method may further include the steps of:
forwarding the video sent by the second terminal to the first terminal, and receiving a first verification result fed back by the first terminal;
Forwarding the video sent by the first terminal to the second terminal, and receiving a second verification result fed back by the second terminal;
and determining the verification result of the user identity information according to the first verification result, the second verification result and an identification result obtained by identifying the user identity information in the video sent by the first terminal and the video sent by the second terminal.
The first verification result is a result of manually verifying the video of the second terminal by the user of the first terminal, namely, when the user of the first terminal sees the video of the second terminal, whether the user in the video is correct or not, namely, the first verification result can be fed back. The second verification result is a result of a user of the second terminal manually verifying the video of the first terminal. The server synthesizes the first verification result, the second verification result and the result of identifying the identity information of the user in the video, so as to verify the user in the video. Generally, when the first verification result and the second verification result are verification passing and the identification result of the user identity information is also verification passing, determining that the user identity information is verification passing. Thereby, the reliability of the user identity information verification result can be further improved.
After the process of handling the service to be processed is started, the service to be processed can be handled step by step according to the content of the service to be processed, for example, the server sends related information such as service clauses and the like to the terminal in the form of audio or text, and the terminal can play the audio or display the text on a screen.
In the whole business handling process, the server can keep the real-time video sent by the receiving terminal, and the whole process checks the face information in the real-time video, so that the business handling process is ensured to be participated by the user.
In one embodiment, the service processing method may further include:
and when the number of the detected faces in the real-time video sent by the at least one terminal does not accord with the preset number, or the user identity information corresponding to any face in the real-time video sent by the at least one terminal is not verified, risk prompt information is generated.
The preset number may be the number of ready users, or the number of users in the video when user identity information is identified. Generally, users are not allowed to leave from the video or to appear new users in the video during the whole business process. For example, in the insurance service, both the applicant and the insured person perform video through the first terminal, the applicant and the insured person are required to appear in the video all the way, and no third person can exist in the video. And at any moment in the process of transacting the insurance service, if the server detects that the number of faces in the real-time video is not 2, the risk prompt information is generated if the requirement is violated. The risk prompt information may be sent to the terminal and displayed, for example, "the system detects that the person is inconsistent, please xxx return to the video", "the system detects that the unknown person", etc., to prompt the user to follow the requirements. Of course, in some businesses, the personnel required to participate in different processing stages are different, so the preset number can be changed according to different processing stages, and the server can detect the number of faces in the video according to the preset number of each processing stage.
In addition, the server can also compare whether each face in the real-time video is consistent with the face of the ready user, and if the face is inconsistent with the face of the ready user, a result that the user identity information corresponding to the face is not verified can be obtained, which indicates that the face or the simulation mask of other irrelevant people, the recorded image or video and the like can be obtained. In this case, the risk prompting information may be generated, and the content of the risk prompting information generated when the detected face number does not meet the preset number may be the same as or different from the content of the risk prompting information generated when the detected face number does not meet the preset number, for example, "identify your use of a simulation mask/record video, please ensure that xxx is transacted in the field", etc., and the risk prompting information is sent to the terminal and displayed, as shown in fig. 6, so as to prompt the user to follow the requirements.
Further, after the risk prompt information is generated, the current business handling process can be paused, and after the problem is eliminated, the business handling process is continued. Specifically, if the number of faces does not meet the preset number, continuing to transact the service when the number of faces in the real-time video is detected to meet the preset number, or continuing to transact the service after re-verifying the user identity information, or canceling the service when the number of faces is detected to be not met the preset number for a long time. If the user identity information corresponding to the face is not verified, continuing to transact the service after the face in the real-time video is re-verified, or canceling the service when the face is verified to be not passed for a long time.
In one embodiment, the above two technical means of face number detection and face identity information verification can be combined to realize the safety monitoring of the whole business handling process. For example, considering that the number of detected faces is lower than that of the detected faces for verifying the face identity information, whether the face data in the video accords with the preset number or not can be detected in real time, and whether each face in the video accords with the face of the ready user or not (for example, every 30 seconds or every minute) is detected periodically, so that higher security is realized through lower calculation amount.
If the first terminal and at least one second terminal are connected with the server through videos and send real-time videos, the server can detect the number of faces of the real-time videos sent by each terminal and verify user identity information corresponding to the faces.
Due to the time dyssynchrony among the first terminal, the second terminal, the server, and the network condition difference between the first terminal and the second terminal, there may be a time difference between the two parts of real-time video received by the server. In order to facilitate more accurate and synchronous face number detection and face comparison, time alignment can be performed to eliminate time differences. In one embodiment, the service processing method may further include the steps of:
According to a first mark point in a first real-time video sent by a first terminal and a second mark point in a second real-time video sent by a second terminal, time alignment is carried out on the first real-time video and the second real-time video;
and verifying the number of faces in the first real-time video and the second real-time video which are subjected to time alignment and the user identity information corresponding to each face.
The first real-time video is a real-time video sent by the first terminal, the second real-time video is a real-time video sent by the second terminal, and when the number of the second terminals is multiple, the number of the second real-time videos is also multiple. The marking points are marks made on one or more frames in the video by combining information outside the video, and the first marking points and the second marking points are marks in the first real-time video and the second real-time video respectively. In the process that the first terminal and the second terminal send real-time videos to the server, the first terminal and the second terminal generally need to report to the server when a specific event occurs, for example, a user performs a service-related operation, and a time stamp can be added when an event corresponding to the operation is reported. The server may determine a first mark point in the first real-time video according to the timestamp of the specific event reported by the first terminal, and determine a second mark point in the second real-time video according to the timestamp of the specific event reported by the second terminal.
For example, a service initiating user performs video connection with a server through a first terminal, a service related user performs video connection with the server through a second terminal, and when the two users pass user identity verification and start a service handling process, the server can send a prompt message "about to start xx service handling, please click for confirmation" to the first terminal and the second terminal; the service initiating user clicks the confirmation on the first terminal, triggers to send confirmation starting information to the server, wherein the confirmation starting information comprises a time stamp for sending the information, and meanwhile the first terminal also sends a first real-time video to the server, the first real-time video comprises a time stamp of each frame, and the server can set a first mark point at the position of the same time stamp in the first real-time video according to the time stamp of the confirmation starting information; likewise, the service related user clicks and confirms on the second terminal, triggers to send confirmation starting information containing a time stamp to the server, and the server sets a second mark point at the same time stamp position in the second real-time video; furthermore, the server may align a first marker point in the first real-time video with a second marker point in the second real-time video, thereby achieving time alignment of the two videos. When alignment is performed, the time stamp of the first real-time video or the second real-time video can be integrally adjusted according to the time difference between the first mark point and the second mark point.
In the business handling flow, other marking points can be set according to business content, for example, after a certain business item is displayed to a user, the user is guided to click options such as 'next page' or 'I read', and the marking points are set in the real-time video according to the time stamp of the information sent after the user clicks.
Through the time alignment processing, the business process is used as a unified standard, so that the first real-time video and the second real-time video are accurately synchronized, and the problem that the verification results of the first real-time video and the second real-time video are unreliable due to time difference is solved.
In one embodiment, the first real-time video sent by the first terminal and the second real-time video sent by the second terminal may be spliced into one video, for example, the second real-time video is zoomed to the same height as the first real-time video and spliced to the right side of the first real-time video. And further verifying the number of faces in the spliced video and the user identity information corresponding to the faces. Therefore, processing of a plurality of videos can be converted into processing of one video, for example, at a certain moment, face quantity detection and face comparison are originally required to be carried out on one frame of picture in the first real-time video and one frame of picture in the second real-time video, and by splicing the two videos, face quantity detection and face comparison are only required to be carried out on one frame of picture in the spliced video, so that the calculated amount is reduced. On the basis of the time alignment, the first real-time video and the second real-time video are spliced, so that the spliced video with accurate time synchronization can be obtained, and accurate face verification can be realized.
In one embodiment, referring to fig. 7, the service processing method may further include the steps of:
step S710, providing service confirmation content to guide a user to input service feedback information;
step S720, when the feedback result is judged to be confirmation according to the service feedback information, and the user identity information is verified to pass according to the service feedback information, the service confirmation result is obtained.
The server may send the service confirmation content to the terminal in the form of audio or text, and the terminal may play the audio of the service confirmation content or display the text of the service confirmation content on a screen. The service confirmation content can include information such as 'whether to agree' and 'whether to confirm' so as to guide the user to give service feedback information. The user can input the voice of 'consent' or 'disagreement', and the terminal returns the business feedback information in the form of voice to the server. The server identifies the voice content, when the user gives positive selection (such as consent, confirmation, etc.), the feedback result is confirmation, and the server performs voiceprint feature recognition on the voice to verify the user identity information. And when the feedback result is confirmation and the user identity information verification is passed, the server acquires a service confirmation result.
The user identity information is not verified, and two cases can be included: identifying that the voiceprint features are not matched with the voiceprint features of the ready user, and detecting that other sounds in the voice of the service feedback information are processed by the guiding user. And when the feedback result is judged to be 'disagreement' or 'unacknowledged', or the user identity information is not verified, risk prompt information can be generated to prompt the user whether to reenter the service feedback information. If the user selects yes, the service confirmation content is provided again so as to acquire service feedback information; if the user selects no, the business transaction is canceled.
It should be noted that, in this exemplary embodiment, each user that needs to participate in service transaction submits service feedback information, and the feedback result is identified as confirmation for the service feedback information of each user, and when the user identity information verification is passed, the service confirmation result is obtained.
In one embodiment, after obtaining the service confirmation result, the following steps may be further performed:
providing a person certificate input prompt message to guide a user to input a person certificate acquisition video comprising a face and a certificate;
and when the face in the human license acquisition video is successfully matched with the face in the certificate, and the user identity information corresponding to the face in the human license acquisition video is successfully matched with the user identity information in the certificate, determining that the human license is successfully input.
The personnel identification recording prompt information is used for prompting a user to hold the identification to collect information in the video, and can be audio or text information. The video input by the user comprises a face and a certificate of the user, and the certificate generally comprises the face and the characters, for example, the front surface of the identity card comprises the photo and the identity card information of the user. After the terminal sends the video to the server, the server matches the face in the video with the face in the certificate, and recognizes the user identity information corresponding to the face, and matches the user identity information with the user identity information in the certificate. In one embodiment, the server may identify the user identity information in the certificate through OCR (Optical Character Recognition ) technology. By the matching, the matching of the face in the video, the face in the certificate, the user identity information in the certificate and the identity information of the ready user can be ensured to be successful, so that the business handling safety is further improved.
In one embodiment, the server may also provide signature prompt information to guide the user to sign, e.g., the user may sign in a user interface of the terminal, which generates an electronic signature and sends it to the server. The signing step may be performed when the service confirmation result is obtained, or may be performed after the face in the matching video and the face in the certificate are successful, and the user identity information corresponding to the face is matched with the user identity information in the certificate.
The service processing method will be described from the point of view of the first terminal. Fig. 8 shows an exemplary flow of a service processing method performed by the first terminal, which may include:
step S810, request information of a service to be processed is sent to a server, wherein the request information comprises a ready user list, and the ready user list comprises at least two ready users;
step S820, in response to the server judging that the video auditing requirement of the service to be processed is met according to the ready user list, establishing video connection with the server, and sending the video to the server so that the server can identify user identity information in the video;
in step S830, in response to the server passing the authentication of the user identity information, the transaction process of the service to be processed is started.
The service initiating user can edit and submit the request information of the service to be processed in the first terminal, and fill in and select the ready user when the request information is edited, so that the first terminal generates a ready user list and adds the ready user list in the request information.
And when the server judges that the video auditing requirement of the service to be processed is met according to the ready user list, the server can send the relevant information of the judging result, such as video invitation information, to the first terminal. The user may select "agree" in the video invitation information to trigger the establishment of a video connection with the server, and may then send the video to the server under that connection.
After the server identifies and verifies the user identity information in the video, the first terminal and the server start the handling flow of the service to be processed. For the first terminal, the handling flow of the service to be processed is mainly to receive the content (such as service clauses) of the service to be processed sent by the server and display the content in the form of audio or text.
Fig. 9 shows an interactive flow chart of a video-audit-based business processing method, comprising:
step S901, the first terminal 120 applies for handling the service to be processed, and sends service information to the server 110;
step S902, after receiving the service information, the server 110 determines that the service to be processed adopts video auditing processing, and feeds back the video auditing processing to the first terminal 120;
step S903, the user edits the ready user list, and the first terminal 120 sends request information including the list;
step S904, the server 110 judges whether the video auditing requirement of the service to be processed is satisfied according to the ready user list;
step S905, when the server 110 determines that the video auditing requirement is satisfied, the server 110 establishes a video connection with the first terminal 120 and establishes a video connection with the second terminal 130;
step S906, the first terminal 120 and the second terminal 130 send real-time video to the server 110 under video connection;
Step S907, the server 110 identifies the user identity information in the video, and performs verification;
step S908, when the user identity information verification is passed, the server 110 starts the service handling process, and the first terminal 120 and the second terminal 130 also start the service handling process;
step S909, in the whole business handling process, the server 110 verifies the faces in the real-time video, including verifying the number of faces and verifying the user identity information corresponding to the faces;
step S910, if the server 110 does not pass the face verification in the real-time video, the risk prompting message is sent to the first terminal 120 or the second terminal 130;
step S911, if the user selects to re-authenticate at the first terminal 120 or the second terminal 130, the real-time video is continuously transmitted to the server 110;
step S912, the server 110 verifies the face in the real-time video, and sends the service confirmation content when the service content is sent;
step S913, the user inputs service feedback information according to the service confirmation content, and the first terminal 120 and the second terminal 130 send the service feedback information to the server 110;
step S914, the server 110 sends a person certificate entry prompt;
step S915, the user performs the person identification entry on the first terminal 120 and the second terminal 130, and the first terminal 120 and the second terminal 130 send the person identification entry information to the server 110;
Step S916, the user signs on the first terminal 120 and the second terminal 130, and the first terminal 120 and the second terminal 130 send the user signature information to the server 110;
in step S917, the server 110 stores the user signature information, and performs two-in-one storage on the video or the screen shot, and the business process flow ends.
Exemplary embodiments of the present disclosure also provide a computer readable storage medium, which may be implemented in the form of a program product comprising program code for causing an electronic device to carry out the steps according to the various exemplary embodiments of the disclosure as described in the above section of the "exemplary method" when the program product is run on the electronic device. In one embodiment, the program product may be implemented as a portable compact disc read only memory (CD-ROM) and includes program code and may be run on an electronic device, such as a personal computer. However, the program product of the present disclosure is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable signal medium may include a data signal propagated in baseband or as part of a carrier wave with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The exemplary embodiments of the present disclosure also provide an electronic device, which may be a background server of an information platform. The electronic device is explained below with reference to fig. 10. It should be understood that the electronic device 1000 shown in fig. 10 is merely an example and should not be construed to limit the functionality and scope of use of embodiments of the present disclosure in any way.
As shown in fig. 10, the electronic device 1000 is embodied in the form of a general purpose computing device. Components of electronic device 1000 may include, but are not limited to: at least one processing unit 1010, at least one memory unit 1020, and a bus 1030 that connects the various system components, including the memory unit 1020 and the processing unit 1010.
Wherein the storage unit stores program code that is executable by the processing unit 1010 such that the processing unit 1010 performs steps according to various exemplary embodiments of the present invention described in the above section of the "exemplary method" of the present specification. For example, the processing unit 1010 may perform the method steps shown in fig. 2, etc.
The memory unit 1020 may include volatile memory units such as a random access memory unit (RAM) 1021 and/or a cache memory unit 1022, and may further include a read only memory unit (ROM) 1023.
Storage unit 1020 may also include a program/utility 1024 having a set (at least one) of program modules 1025, such program modules 1025 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
Bus 1030 may include a data bus, an address bus, and a control bus.
The electronic device 1000 can also communicate with one or more external devices 1100 (e.g., keyboard, pointing device, bluetooth device, etc.) via input/output (I/O) interface 1040. Electronic device 1000 can also communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, e.g., the Internet, through network adapter 1050. As shown, network adapter 1050 communicates with other modules of electronic device 1000 via bus 1030. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with the electronic device 1000, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
It should be noted that although in the above detailed description several modules or units of a device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit in accordance with exemplary embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied.
Those skilled in the art will appreciate that the various aspects of the present disclosure may be implemented as a system, method, or program product. Accordingly, various aspects of the disclosure may be embodied in the following forms, namely: an entirely hardware embodiment, an entirely software embodiment (including firmware, micro-code, etc.) or an embodiment combining hardware and software aspects may be referred to herein as a "circuit," module "or" system. Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (12)

1. A method for processing a service based on video auditing, which is applied to a server, the method comprising:
receiving request information of a service to be processed sent by a first terminal, wherein the request information comprises a ready user list, the ready user list comprises at least two ready users, and the ready users refer to users which are ready for service handling through videos currently in related users of the service to be processed;
when judging that the video auditing requirements of the service to be processed are met according to the ready user list, establishing video connection with at least one terminal, and receiving a video sent by the at least one terminal, wherein the video contains the face of the ready user; the at least one terminal comprises the first terminal and at least one second terminal, and the second terminal is terminal equipment used by service related users except service initiating users; the video auditing requirement refers to which users are required to appear in the video when online transaction of the service to be processed is carried out;
identifying each user identity information in the video sent by the first terminal and the video sent by the second terminal respectively, wherein the method specifically comprises the following steps: comparing the face and the voiceprint in the video with the face and the voiceprint in the user information database to determine user identity information; or, the face and the voiceprint in the video are sent to a third party mechanism, the third party mechanism compares the face and the voiceprint, and a recognition result of the user identity information is returned;
Forwarding the video sent by the second terminal to the first terminal for manual verification, and receiving a first verification result fed back by the first terminal; when the user of the first terminal sees the video sent by the second terminal, feeding back whether the user in the video is correct or not, namely a first verification result;
forwarding the video sent by the first terminal to the second terminal for manual verification, and receiving a second verification result fed back by the second terminal; the second verification result is a result of manually verifying the video sent by the first terminal by a user of the second terminal;
determining a verification result of the user identity information according to the first verification result, the second verification result and an identification result obtained by identifying the user identity information in the video sent by the first terminal and the video sent by the second terminal; when the first verification result and the second verification result are verification passing and the identification result of the user identity information is verified, determining that the user identity information is verified;
and when the user identity information is verified, starting the business handling flow of the business to be processed.
2. The method of claim 1, wherein the establishing a video connection with at least one terminal comprises:
sending video invitation information to the first terminal;
and when receiving the consent information fed back by the first terminal according to the video invitation information and reaching a first reservation time, establishing video connection with the first terminal.
3. The method of claim 1, wherein the establishing a video connection with at least one terminal comprises:
sending video invitation information to the first terminal and/or the second terminal;
and when receiving the consent information fed back by the second terminal according to the video invitation information and reaching a second reservation time, establishing video connection with the second terminal.
4. The method of claim 1, wherein the receiving the video transmitted by the at least one terminal comprises:
providing verification actions and verification codes, enabling a user to make actions in a video according to the verification actions and inputting voice according to the verification codes;
receiving video and voice fed back by the at least one terminal in response to the verification action and the verification code;
The verification of the identification result of the user identity information is passed, and the method comprises the following steps:
and verifying the face and the action in the video and verifying the voiceprint features in the voice.
5. The method of claim 1, wherein after initiating the transacted business process, the method further comprises:
and when the number of the detected faces in the real-time video sent by the at least one terminal does not accord with the preset number, or the user identity information corresponding to any face in the real-time video sent by the at least one terminal is not verified, risk prompt information is generated.
6. The method of claim 5, wherein the method further comprises:
according to a first mark point in a first real-time video sent by the first terminal and a second mark point in a second real-time video sent by the second terminal, time alignment is carried out on the first real-time video and the second real-time video;
and verifying the number of faces in the first real-time video and the second real-time video after time alignment and user identity information corresponding to each face.
7. The method of claim 1, wherein after initiating the transacted business process, the method further comprises:
Providing service confirmation content to guide a user to input service feedback information;
and when the feedback result is judged to be confirmation according to the service feedback information and the user identity information is verified to pass according to the service feedback information, acquiring a service confirmation result.
8. The method of claim 7, wherein after obtaining the service confirmation result, the method further comprises:
providing a person certificate input prompt message to guide a user to input a person certificate acquisition video comprising a face and a certificate;
and when the face in the human license acquisition video is successfully matched with the face in the certificate, and the user identity information corresponding to the face in the human license acquisition video in the ready user is successfully matched with the user identity information in the certificate, determining that the human license is successfully input.
9. A service processing system based on video auditing is characterized by comprising a server and a first terminal, wherein,
the first terminal is configured to:
sending request information of a service to be processed to the server, and sending a video to the server after video connection is established with the server; the request information comprises a ready user list, wherein the ready user list comprises at least two ready users, and the ready users refer to users which are ready for business transaction through video currently in related users of the business to be processed;
The server is configured to:
receiving the request information, when judging that the video auditing requirement of the service to be processed is met according to the ready user list, establishing video connection with at least one terminal comprising the first terminal and at least one second terminal, and receiving a video sent by the at least one terminal, wherein the video comprises the face of the ready user; the second terminal is a terminal device used by service related users except the service initiating user; the video auditing requirement refers to which users are required to appear in the video when online transaction of the service to be processed is carried out;
identifying each user identity information in the video sent by the first terminal and the video sent by the second terminal respectively, wherein the method specifically comprises the following steps: comparing the face and the voiceprint in the video with the face and the voiceprint in the user information database to determine user identity information; or, the face and the voiceprint in the video are sent to a third party mechanism, the third party mechanism compares the face and the voiceprint, and a recognition result of the user identity information is returned;
forwarding the video sent by the second terminal to the first terminal for manual verification, and receiving a first verification result fed back by the first terminal, wherein when the user of the first terminal sees the video sent by the second terminal, whether the user in the video is correct or not, namely the first verification result is fed back;
Forwarding the video sent by the first terminal to the second terminal for manual verification, and receiving a second verification result fed back by the second terminal, wherein the second verification result is a result of the user of the second terminal performing manual verification on the video sent by the first terminal;
determining a verification result of the user identity information according to the first verification result, the second verification result and an identification result obtained by identifying the user identity information in the video sent by the first terminal and the video sent by the second terminal; when the first verification result and the second verification result are verification passing and the identification result of the user identity information is verification passing, determining that the user identity information is verification passing;
and when the user identity information is verified, starting the business handling flow of the business to be processed.
10. The system of claim 9, further comprising at least one second terminal configured to: receiving video invitation information sent by the server or video invitation information sent by the server to the first terminal and forwarded by the first terminal, and feeding back consent information to the server in response to preset operation on the video invitation information;
The server is configured to: and when the consent information fed back by the second terminal is received and the second reservation time is reached, establishing video connection with the second terminal.
11. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the method of any one of claims 1 to 8.
12. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the method of any one of claims 1 to 8 via execution of the executable instructions.
CN202110338656.4A 2021-03-30 2021-03-30 Service processing method, system, medium and electronic equipment based on video auditing Active CN113034110B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110338656.4A CN113034110B (en) 2021-03-30 2021-03-30 Service processing method, system, medium and electronic equipment based on video auditing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110338656.4A CN113034110B (en) 2021-03-30 2021-03-30 Service processing method, system, medium and electronic equipment based on video auditing

Publications (2)

Publication Number Publication Date
CN113034110A CN113034110A (en) 2021-06-25
CN113034110B true CN113034110B (en) 2023-12-22

Family

ID=76452839

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110338656.4A Active CN113034110B (en) 2021-03-30 2021-03-30 Service processing method, system, medium and electronic equipment based on video auditing

Country Status (1)

Country Link
CN (1) CN113034110B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113438523B (en) * 2021-07-06 2021-12-21 江西大江传媒网络股份有限公司 Video exhibition and broadcasting intelligent analysis feedback system based on mobile internet
CN113706091B (en) * 2021-07-14 2024-03-22 广州赛宝认证中心服务有限公司 Intelligent remote auditing method, device, system, computer equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105491393A (en) * 2015-12-02 2016-04-13 北京暴风科技股份有限公司 Method for implementing multi-user live video business
WO2018113526A1 (en) * 2016-12-20 2018-06-28 四川长虹电器股份有限公司 Face recognition and voiceprint recognition-based interactive authentication system and method
CN108537501A (en) * 2018-03-22 2018-09-14 平安信托有限责任公司 Business witnesses method, apparatus, computer equipment and storage medium
CN109543507A (en) * 2018-09-29 2019-03-29 深圳壹账通智能科技有限公司 Identity identifying method, device, terminal device and storage medium
CN109862401A (en) * 2018-12-21 2019-06-07 深圳创维-Rgb电子有限公司 Real name register method, device, television set and the readable storage medium storing program for executing of account
CN111126124A (en) * 2019-10-12 2020-05-08 深圳壹账通智能科技有限公司 User identity authentication method and device for multi-party video and computer equipment
CN111340635A (en) * 2020-02-17 2020-06-26 中国平安人寿保险股份有限公司 Data checking method, equipment, server and readable storage medium
CN112528259A (en) * 2020-12-23 2021-03-19 平安普惠企业管理有限公司 Identity authentication method, identity authentication device, computer equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105491393A (en) * 2015-12-02 2016-04-13 北京暴风科技股份有限公司 Method for implementing multi-user live video business
WO2018113526A1 (en) * 2016-12-20 2018-06-28 四川长虹电器股份有限公司 Face recognition and voiceprint recognition-based interactive authentication system and method
CN108537501A (en) * 2018-03-22 2018-09-14 平安信托有限责任公司 Business witnesses method, apparatus, computer equipment and storage medium
CN109543507A (en) * 2018-09-29 2019-03-29 深圳壹账通智能科技有限公司 Identity identifying method, device, terminal device and storage medium
CN109862401A (en) * 2018-12-21 2019-06-07 深圳创维-Rgb电子有限公司 Real name register method, device, television set and the readable storage medium storing program for executing of account
CN111126124A (en) * 2019-10-12 2020-05-08 深圳壹账通智能科技有限公司 User identity authentication method and device for multi-party video and computer equipment
CN111340635A (en) * 2020-02-17 2020-06-26 中国平安人寿保险股份有限公司 Data checking method, equipment, server and readable storage medium
CN112528259A (en) * 2020-12-23 2021-03-19 平安普惠企业管理有限公司 Identity authentication method, identity authentication device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN113034110A (en) 2021-06-25

Similar Documents

Publication Publication Date Title
US11842740B2 (en) Seamless authentication and enrollment
US11636430B2 (en) Device, system and method for summarizing agreements
US20200014642A1 (en) Enhanced Customer Interaction Platform for Enterprises
US11151546B2 (en) Trigger peer to peer payment with financial cards and phone camera
AU2018354129B2 (en) System and method for automated online notarization meeting recovery
CN113034110B (en) Service processing method, system, medium and electronic equipment based on video auditing
CN104021472A (en) Identity verification method and system
CN111754234A (en) Air banking business processing method and device
CN112580306A (en) Method and device for generating insurance letter
CN113159896A (en) Online marketing method, device and system for bank financing products
CN113706091B (en) Intelligent remote auditing method, device, system, computer equipment and storage medium
CN113221529A (en) Event investigation method and device
CN112348486A (en) Method and device for examining and approving insurance letters
CN113112232A (en) Online loan auditing method, auditing device, electronic equipment and storage medium
WO2022109450A1 (en) Making payments through electronic channels
CN112581075A (en) Insurance letter processing method and device for security company
US11587115B2 (en) System and methods for facilitating content promotion transactions between content promoters and artists
US11838139B1 (en) Conferencing platform integration with assent tracking
US20240146879A1 (en) Conferencing platform integration with workflow management
CN118214849A (en) Compliance detection method based on video session, electronic equipment and system
CN116861393A (en) Business service verification method, device, computer equipment and storage medium
CN110874579A (en) Business execution method and device based on handwriting verification
CN114387091A (en) Remote credit method, device, electronic equipment and storage medium
TW201935920A (en) Video conference inviting method and video conference service system
WO2021217067A1 (en) System and methods for facilitating content promotion transactions between content promoters and artists

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant