CN116523641A - Intelligent securities trading system, method, equipment and storage medium - Google Patents

Intelligent securities trading system, method, equipment and storage medium Download PDF

Info

Publication number
CN116523641A
CN116523641A CN202310393224.2A CN202310393224A CN116523641A CN 116523641 A CN116523641 A CN 116523641A CN 202310393224 A CN202310393224 A CN 202310393224A CN 116523641 A CN116523641 A CN 116523641A
Authority
CN
China
Prior art keywords
target
service
target user
securities
voice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310393224.2A
Other languages
Chinese (zh)
Inventor
杜国伟
陈红平
李媛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Securities Co Ltd
Original Assignee
China Securities Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Securities Co Ltd filed Critical China Securities Co Ltd
Priority to CN202310393224.2A priority Critical patent/CN116523641A/en
Publication of CN116523641A publication Critical patent/CN116523641A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • G06F16/243Natural language query formulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/108Remote banking, e.g. home banking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/12Fingerprints or palmprints
    • G06V40/1365Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Abstract

The embodiment of the application provides an intelligent securities trading system, an intelligent securities trading method, intelligent securities trading equipment and a storage medium, and relates to the technical field of data processing. The specific implementation mode is as follows: after login is successful, each time a second voice command carrying a target keyword sent by the target user is obtained, determining a target service corresponding to the target keyword carried by the second voice command, and if the target service corresponding to the target keyword carried by the second voice command belongs to a first type of service, if the target keyword in the received second voice command is a target keyword triggering the start of the target service, performing identity authentication on the target user by adopting at least one appointed authentication mode, and after the identity authentication is passed, performing service response processing based on the received second voice command. By applying the scheme provided by the embodiment of the application, the related business operation of securities trade can be realized without manual operation under the condition of ensuring the safety.

Description

Intelligent securities trading system, method, equipment and storage medium
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to an intelligent securities trading system, method, device, and storage medium.
Background
Operations such as selecting securities and buying and selling securities are indispensable business operations in the securities trading process. In the prior art, a user needs to manually log in an account number, log in a securities trading system, find out the entrance of a time machine according to the trend of securities, and buy and sell securities. This approach requires the user to view the security trend in real time and manually perform business operations of selecting securities and buying and selling securities, and is undoubtedly inconvenient for the user who has difficulty in manually moving during the securities exchange.
Moreover, security is important to the user during a securities transaction, and the user's security account must be operated by the user, which may cause significant loss to the user if the security account is operated by another person. Therefore, how to implement the related business operation of securities trade without manual operation under the condition of ensuring the security becomes a problem to be solved.
Disclosure of Invention
An object of the embodiments of the present application is to provide an intelligent securities trade system, method, device and storage medium, so as to implement related business operations of securities trade without manual operation under the condition of ensuring security. The specific technical scheme is as follows:
In a first aspect, the present application provides an intelligent securities trading system comprising: the system comprises a voice receiving module, a login authentication module and a plurality of service modules;
the voice receiving module is used for sending a first voice instruction carrying a specified keyword to the login authentication module when the first voice instruction sent by a target user is obtained; the appointed keywords are keywords for representing system login;
the login authentication module is used for extracting voiceprint information from the first voice command, carrying out matching analysis on the extracted voiceprint information and the voiceprint information of each user stored in advance, and acquiring a target user account corresponding to the matched voiceprint information if voiceprint information matched with the extracted voiceprint information exists; adopting at least one appointed authentication mode, carrying out identity authentication on the target user based on the acquired target user account, and after authentication is passed, carrying out login of the intelligent securities trading system based on the acquired target user account; the appointed authentication mode is a mode for carrying out identity authentication based on the biological characteristic information of the target user;
The voice receiving module is further configured to determine a target service corresponding to a target keyword carried by a second voice instruction after the login is successful, and send the second voice instruction to a target service module for implementing the target service whenever the second voice instruction carrying the target keyword sent by the target user is obtained; wherein, different business corresponds to different target keywords, and each target keyword corresponding to each business is a keyword for indicating the processing process of the business;
the target service module is configured to, in a case that the implemented target service belongs to a first type of service, perform identity authentication on the target user by adopting at least one specified authentication mode if a target keyword in the received second voice instruction is a target keyword triggering the start of the target service, and perform service response processing based on the received second voice instruction after the identity authentication is passed; if the target keyword in the received second voice instruction is the target keyword utilized in the target service execution process, carrying out service response processing based on the received second voice instruction;
And performing service response processing based on the received second voice command under the condition that the realized target service belongs to the second class of service;
wherein the security level requirements of the first type of service are higher than those of the second type of service.
Optionally, the login authentication module adopts at least one specified authentication mode, performs identity authentication on the target user based on the obtained target user account, and includes:
performing primary identity authentication on the target user by using a preset face image corresponding to the target user account and an authentication mode related to face information; the authentication mode of the face information is a mode of authenticating by adopting a video containing a face image;
after the primary identity authentication is passed, adopting an authentication mode related to voice question and answer to perform secondary identity authentication on the target user;
after the identity authentication again passes, judging that the target user passes the identity authentication;
and if the initial identity authentication fails or the second identity authentication fails, judging that the target user fails the identity authentication.
Optionally, the login authentication module is further configured to output notification information for instructing the target user to register when no voiceprint information matching the extracted voiceprint information exists.
Optionally, the target service module includes: an intelligent securities selecting module; the intelligent securities selecting module is used for realizing a business about screening securities; the service realized by the intelligent securities selecting module is a second type service;
and the target service module performs service response processing based on the received second voice command under the condition that the realized service belongs to the second class of service, and comprises the following steps:
if the received second voice command is a command for representing any security screening mode, the target user is prompted by voice to input the value of the appointed screening parameter used by the security screening mode; the security screening mode is a screening mode which is set according to data of any one or more of seven options of plate, technical index, K line form, market price, dominant behavior, company research report and financial data;
if the received second voice command is a value representing a specified screening parameter used by the security screening mode input by the target user, displaying and voice broadcasting the value of the specified screening parameter to the target user, and prompting the target user to confirm whether the value of the specified screening parameter is correct or not;
If the received second voice command is a command for representing the target user to confirm that the value of the specified screening parameter is correct, screening securities according to the security screening mode based on the value of the specified screening parameter, displaying and voice broadcasting the screened securities to the target user, and prompting the target user by voice whether to add the screened securities into a self-selected securities list;
and if the received second voice instruction is used for representing the target user to confirm that the screened securities are added into the self-selected securities list, adding the screened securities into the self-selected securities list.
Optionally, the target service module includes: the system comprises a self-selection security cloud synchronization module, a self-selection security cloud synchronization module and a self-selection security cloud management module, wherein the self-selection security cloud synchronization module is used for realizing a service related to self-selection security cloud synchronization; the service realized by the self-selection security cloud synchronization module is a first type service;
the target keywords triggering the start of the target service are as follows: keywords representing any self-selected security cloud synchronization mode;
after passing the identity authentication, performing service response processing based on the received second voice command, including:
after passing identity authentication, carrying out cloud synchronization processing on securities in a self-selected securities list according to a self-selected securities cloud synchronization mode characterized by target keywords in the received second voice instruction;
The target keywords utilized in the execution process of the target service are as follows: and triggering a self-selection security cloud synchronization module except for the target keywords from which the target business starts to realize other keywords corresponding to the business.
Optionally, the target service module includes: the system comprises a policy trading module, a policy management module and a policy management module, wherein the policy trading module is used for realizing the business of setting the security trading policy of any security; the service realized by the strategy transaction module is a first type service;
the target keywords triggering the start of the target service are as follows: keywords characterizing any target securities, keywords characterizing any securities trading strategy;
after passing the identity authentication, carrying out service response processing based on the received second voice instruction, wherein the service response processing comprises the following steps:
after passing the identity authentication, based on the security trade strategy characterized by the received second voice command, voice prompting the target user to input the value of the trade parameter used by the security trade strategy;
the target keywords utilized in the execution process of the target service are as follows: triggering other keywords which are beyond the target keywords and correspond to the target business from the target business;
If the target keyword in the received second voice command is a target keyword utilized in the target service execution process, performing service response processing based on the received second voice command, including:
if the received second voice command is a value representing a transaction parameter used by a target user for inputting the securities transaction strategy mode, displaying and outputting the value of the transaction parameter in a voice mode, and prompting the target user to confirm whether the value of the transaction parameter is correct in the voice mode;
if the received second voice instruction is an instruction for representing that the target user confirms that the value of the trade parameter is correct, setting the securities trade strategy for the target securities based on the value of the trade parameter;
the policy trading module is further configured to execute the security trading policy or remind a target user to trade when the target security meets the set triggering condition of the security trading policy.
In a second aspect, the present application provides a method of intelligent securities trading, the method being applied to an electronic device, the method comprising:
when a first voice command carrying a specified keyword sent by a target user is obtained, extracting voiceprint information from the first voice command, and carrying out matching analysis on the extracted voiceprint information and the voiceprint information of each user stored in advance;
If voiceprint information matched with the extracted voiceprint information exists, acquiring a target user account corresponding to the matched voiceprint information;
adopting at least one appointed authentication mode, carrying out identity authentication on the target user based on the acquired target user account, and after authentication is passed, carrying out login of the intelligent securities trading system based on the acquired target user account; the appointed authentication mode is a mode for carrying out identity authentication based on the biological characteristic information of the target user; the appointed keywords are keywords for representing system login;
after successful login, each time a second voice command carrying a target keyword sent by the target user is obtained, determining target services corresponding to the target keyword carried by the second voice command, wherein different services correspond to different target keywords, and the target keyword corresponding to each service is a keyword for indicating the processing process of the service;
under the condition that the target service corresponding to the target keyword carried by the second voice command belongs to the first service, if the target keyword in the received second voice command is the target keyword triggering the start of the target service, adopting at least one appointed authentication mode to carry out identity authentication on the target user, and after passing the identity authentication, carrying out service response processing based on the received second voice command;
If the target keyword in the received second voice instruction is the target keyword utilized in the target service execution process, carrying out service response processing based on the received second voice instruction;
and performing service response processing based on the received second voice command under the condition that the realized target service belongs to the second class of service;
wherein the security level requirements of the first type of service are higher than those of the second type of service.
In a third aspect, the present application provides an intelligent securities trading apparatus for application to an electronic device, the apparatus comprising:
the analysis unit is used for extracting voiceprint information from a first voice instruction which is sent by a target user and carries a specified keyword, and carrying out matching analysis on the extracted voiceprint information and the voiceprint information of each user stored in advance;
the acquisition unit is used for acquiring a target user account corresponding to the matched voiceprint information if the voiceprint information matched with the extracted voiceprint information exists;
the login unit is used for carrying out identity authentication on the target user based on the acquired target user account by adopting at least one appointed authentication mode, and carrying out login of the intelligent securities trading system based on the acquired target user account after the authentication is passed; the appointed authentication mode is a mode for carrying out identity authentication based on the biological characteristic information of the target user; the appointed keywords are keywords for representing system login;
The determining unit is used for determining target services corresponding to the target keywords carried by the second voice command after successful login, each time the second voice command carrying the target keywords sent by the target user is obtained, wherein different services correspond to different target keywords, and each target keyword corresponding to each service is a keyword for indicating the processing process of the service;
the service response unit is used for carrying out identity authentication on the target user by adopting at least one appointed authentication mode if the target keyword in the received second voice instruction is the target keyword triggering the start of the target service under the condition that the target service corresponding to the target keyword carried by the second voice instruction belongs to the first service, and carrying out service response processing based on the received second voice instruction after passing the identity authentication;
if the target keyword in the received second voice instruction is the target keyword utilized in the target service execution process, carrying out service response processing based on the received second voice instruction;
and performing service response processing based on the received second voice command under the condition that the realized target service belongs to the second class of service;
Wherein the security level requirements of the first type of service are higher than those of the second type of service.
In a fourth aspect, the present application provides an electronic device, including a processor, a communication interface, a memory, and a communication bus, where the processor, the communication interface, and the memory complete communication with each other through the communication bus;
a memory for storing a computer program;
and the processor is used for realizing the intelligent securities trading method when executing the program stored in the memory.
In a fifth aspect, the present application provides a computer readable storage medium having a computer program stored therein, which when executed by a processor, implements the above-described smart securities trading method.
The beneficial effects of the embodiment of the application are that:
according to the intelligent securities trading system, voice is used in the whole process to achieve login and related business operation of securities trading, the business achieved by each module is divided into the first type of business and the second type of business, the business with high safety requirements is used as the first type of business, when the first type of business is executed, if the target keyword in the received second voice command is the target keyword triggering the target business to start, identity authentication is carried out on the target user, and after the authentication is passed, the target business is executed, so that the security performance is ensured when the first type of business with high safety level is executed. Therefore, the method and the device can realize the related business operation of securities trade without manual operation under the condition of ensuring the safety.
Of course, not all of the above-described advantages need be achieved simultaneously in practicing any one of the products or methods of the present application.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the following description will briefly introduce the drawings that are required to be used in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are only some embodiments of the present application, and other embodiments may also be obtained according to these drawings to those skilled in the art.
FIG. 1 is a schematic diagram of a smart securities trading system according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an intelligent securities selecting module according to an embodiment of the present application;
fig. 3 is a schematic flow chart of security cloud synchronization according to an embodiment of the present application;
FIG. 4 is a schematic flow chart of another security cloud synchronization provided in an embodiment of the present application;
FIG. 5 is a schematic flow chart of another security cloud synchronization provided in an embodiment of the present application;
FIG. 6 is a schematic diagram of a security trading strategy according to an embodiment of the present application;
FIG. 7 is a schematic diagram of another securities trading strategy according to an embodiment of the present application;
FIG. 8 is a schematic diagram of another securities trading strategy provided by an embodiment of the present application;
FIG. 9 is a schematic diagram of another securities trading strategy provided by an embodiment of the present application;
FIG. 10 is a schematic diagram of another smart securities trading system according to an embodiment of the present application;
FIG. 11 is a schematic flow chart of a login account of an intelligent securities trading system according to an embodiment of the present application;
FIG. 12 is a flow chart of a method for intelligent securities trade according to an embodiment of the present application;
FIG. 13 is a schematic structural diagram of an intelligent securities trade apparatus according to an embodiment of the present application;
fig. 14 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. Based on the embodiments herein, a person of ordinary skill in the art would be able to obtain all other embodiments based on the disclosure herein, which are within the scope of the disclosure herein.
In the following, some terms are explained;
plate block: the market is divided into: shanghai city plate, deep city plate, north certificate plate, innovative plate, port securities, etc., can also be divided according to industry: automobile chip boards, communication equipment boards, semiconductor boards, software service boards and the like;
The technical indexes are as follows: technical indexes such as MACD (exponential smooth moving average line), MA (moving average line), WR (Williams index) hammer line, DMI (trends index) and CYE (market trend);
k-wire form: deep-falling rebound, stage new and high, whole disc breakthrough and other forms, wherein the deep-falling rebound refers to continuous pressing of parties due to continuous falling of securities, and finally, the parties are extremely necessary, so that rising of securities occurs; the stage new height means that the securities price creates a new height at a certain stage; the whole disc breakthrough refers to the breakthrough that the price of the certificate encounters resistance and supporting line after a period of rapid rising or falling;
market price amount: the data comprises the data of the expansion and fall amplitude, the volume of the exchange, the hand exchange rate, the volume of the exchange and the like;
dominant force behavior: the method comprises the actions of continuously buying a large bill, selling the large bill in a mechanism, re-selling the large bill in a foundation, adding the large bill to the stock dealer, and adding the large bill to the stock dealer;
corporate research report: the most of the mechanism attention, the mechanism rating heightening, the profit prediction heightening and other research reports, wherein the most of the mechanism attention refers to counting the securities which are ranked to be top by the mechanism attention in the past month research report according to the degree of attention of the securities of the research report; rating prediction heightening refers to rating securities higher than the upper period according to the investment rating of the securities under study report by a statistical organization; the profit prediction heightening refers to the fact that a statistical organization predicts securities with higher profit per securities according to the investment rating of the securities under study.
Financial data: including market rate, net market rate, liability rate, and security benefits.
In order to realize the related operation of securities trade without manual operation under the condition of ensuring safety, the embodiment of the application provides an intelligent securities trade system, an intelligent securities trade method and a storage medium.
An intelligent securities trading system according to an embodiment of the present application will be described first. The intelligent securities trading system provided by the embodiment of the application is applied to electronic equipment. In a specific application, the electronic device may be a terminal device, a server, etc., and the terminal device may be a tablet computer, a desktop computer, a transaction counter, a mobile device, etc.; the present application is not limited thereto. The modules in the intelligent securities trading system provided by the embodiment of the application can be deployed on the same equipment or different equipment, and the application is not limited in this regard.
The intelligent securities trading system provided in the embodiment of the application may include: the system comprises a voice receiving module, a login authentication module and a plurality of service modules;
the voice receiving module is used for sending a first voice instruction carrying a specified keyword to the login authentication module when the first voice instruction sent by a target user is obtained; the appointed keywords are keywords for representing system login;
The login authentication module is used for extracting voiceprint information from the first voice command, carrying out matching analysis on the extracted voiceprint information and the voiceprint information of each user stored in advance, and acquiring a user account corresponding to the matched voiceprint information if voiceprint information matched with the extracted voiceprint information exists; adopting at least one appointed authentication mode, carrying out identity authentication on the target user based on the acquired user account, and after the authentication is passed, carrying out login of the intelligent securities trading system based on the acquired user account; the appointed authentication mode is a mode for carrying out identity authentication based on the biological characteristic information of the target user;
the voice receiving module is further configured to determine a target service corresponding to a target keyword carried by a second voice instruction after the login is successful, and send the second voice instruction to a target service module for implementing the target service whenever the second voice instruction carrying the target keyword sent by the target user is obtained; wherein, different business corresponds to different target keywords, and each target keyword corresponding to each business is a keyword for indicating the processing process of the business;
The target service module is configured to, in a case that the implemented target service belongs to a first type of service, perform identity authentication on the target user by adopting at least one specified authentication mode if a target keyword in the received second voice instruction is a target keyword triggering the start of the target service, and perform service response processing based on the received second voice instruction after the identity authentication is passed; if the target keyword in the received second voice instruction is the target keyword utilized in the target service execution process, carrying out service response processing based on the received second voice instruction;
and performing service response processing based on the received second voice command under the condition that the realized target service belongs to the second class of service;
wherein the security level requirements of the first type of service are higher than those of the second type of service.
According to the intelligent securities trading system, voice is used in the whole process to achieve login and related business operation of securities trading, the business achieved by each module is divided into the first type of business and the second type of business, the business with high safety requirements is used as the first type of business, when the first type of business is executed, if the target keyword in the received second voice command is the target keyword triggering the target business to start, identity authentication is carried out on the target user, and after the authentication is passed, the target business is executed, so that the security performance is ensured when the first type of business with high safety level is executed. Therefore, the method and the device can realize the related business operation of securities trade without manual operation under the condition of ensuring the safety.
An intelligent securities trading system according to an embodiment of the present application is described below with reference to the accompanying drawings.
As shown in fig. 1, the smart securities trading system may include: a voice receiving module 101, a login authentication module 102, and a plurality of service modules 103;
the voice receiving module 101 is configured to, when a first voice instruction carrying a specified keyword sent by a target user is obtained, issue the first voice instruction to the login authentication module; the appointed keywords are keywords for representing system login;
in the operation process of the intelligent securities trading system, the voice receiving module detects the voice sent by the target user in the environment in real time and recognizes the keywords in the voice command of the target user.
When the system does not have the login account, the first voice command carrying the specified keyword may be a voice command carrying a keyword representing that the system login is performed, and by way of example, the target user sends out voice of the login account, the login is the specified keyword, and other words such as entry, log in, etc. may be used as the specified keyword.
When the system logs in the account, but the target user does not operate for a long time, the system can lock the account, at this time, the first voice instruction carrying the specified keyword may also be a voice instruction carrying a keyword for characterizing unlocking the system, and the target user sends out a voice of "unlocking account", wherein the unlocking is the specified keyword, and other words such as opening and unblock can be used as the specified keyword, which is not limited in the application.
The login authentication module 102 is configured to extract voiceprint information from the first voice command, perform matching analysis on the extracted voiceprint information and voiceprint information of each user stored in advance, and obtain a user account corresponding to the voiceprint information matched with the extracted voiceprint information if the voiceprint information matched with the extracted voiceprint information exists; adopting at least one appointed authentication mode, carrying out identity authentication on the target user based on the acquired user account, and after the authentication is passed, carrying out login of the intelligent securities trading system based on the acquired user account; the appointed authentication mode is a mode for carrying out identity authentication based on the biological characteristic information of the target user;
because the first voice command is audio content, and the audio content can extract the voiceprint information of the target user which sends the first voice command currently, the voiceprint information can be extracted from the first voice command, and whether the target user which sends the first voice command is a pre-registered target user or not is estimated by analyzing whether the extracted voiceprint information is matched with the voiceprint information of each target user which is stored in advance; if the voiceprint information matched with the extracted voiceprint information exists, it is estimated that the target user sending the first voice instruction may be a registered target user from the voiceprint angle, then, for safety, a target user account corresponding to the matched voiceprint information may be obtained, and after the target user account is obtained, at least one specified authentication mode is adopted to perform identity authentication on the target user. And in response to the authentication passing, logging in the intelligent securities trading system based on the acquired target user account, and realizing automatic logging in based on voice.
Optionally, the login authentication module adopts at least one specified authentication mode, and performs identity authentication on the target user based on the obtained user account, including steps A1-A4;
a1, carrying out primary identity authentication on the target user by using a preset face image corresponding to the user account and an authentication mode related to face information; the authentication mode of the face information is a mode of authenticating by adopting a video containing a face image;
the authentication mode about the face information may specifically include authentication of the face information, and authentication of the target user for head or face movements according to voice prompts, for example, voice prompts of the target user for blinking and nodding movements. The present application is not limited to a specific authentication method regarding face information.
Step A2, after the primary identity authentication is passed, adopting an authentication mode related to voice question-answering to perform secondary identity authentication on the target user;
the question of the voice question-answer may be a question that the target user has predetermined at the time of pre-registration, for example: "what you like the animal is" to verify the identity of the target user as the account owner, and the voice question-answering is to further verify the identity of the target user, and the specific form of the question of the voice question-answering is not limited in this application.
A3, after the identity authentication again passes, judging that the target user passes the identity authentication;
and step A4, judging that the target user fails the identity authentication when the initial identity authentication fails or the second identity authentication fails.
Of course, the specified authentication method is not limited to the face recognition and the voice question-answering, but may also include a secure recognition method such as iris recognition and fingerprint recognition, which is not limited in this application.
Whether the first voice instruction received by the login authentication module characterizes unlocking or logging in, the account can be logged in the manner described above for the target user to use. Of course, for simplicity of flow, when the received first voice instruction is to characterize unlocking, the login authentication module may directly adopt at least one specified authentication mode, perform identity authentication on the target user based on the target user account, and unlock the target user account after the authentication is passed.
The login authentication module 102 is further configured to output notification information for instructing the target user to register when there is no voiceprint information matching the extracted voiceprint information.
At this time, the login authentication module may output notification information on a voice for instructing the target user to register; when the target user receives notification information for indicating the target user to register, the target user can register through voice selection, at the moment, the system enters a registration process, in the registration process, the system prompts the target user to operate, for example, voice prompts the target user to input registration information, voice outputs risk assessment questions to the target user, voice prints of the target user are identified, face information of the target user is identified, privacy protocol information, service terms and the like are output to the target user, the target user can input the registration information through voice, answer questions, agree privacy protocol information, service terms and the like according to the prompt of the system, the account is registered, after the account is registered successfully, the account is automatically logged in, and at the moment, the target user can conduct business operations related to securities trade in the system.
The voice receiving module 101 is further configured to determine, after the login is successful, a target service corresponding to a target keyword carried by a second voice command whenever the second voice command carrying the target keyword sent by the target user is obtained, and send the second voice command to a target service module for implementing the target service; wherein, different business corresponds to different target keywords, and each target keyword corresponding to each business is a keyword for indicating the processing process of the business;
the application refers to an instruction triggering the service functions realized by a plurality of target service modules except the voice receiving module and the login authentication module in the intelligent securities trading system as a second voice instruction. And, different target keywords can be preset for different services, so that the service required to be executed by the target user is identified when the received second voice command contains the preset target keywords.
The target service module 103 is configured to, in a case where the implemented target service belongs to a first type of service, perform identity authentication on the target user by adopting at least one specified authentication mode if the target keyword in the received second voice command is a target keyword that triggers the start of the target service, and perform service response processing based on the received second voice command after the identity authentication is passed; if the target keyword in the received second voice instruction is the target keyword utilized in the target service execution process, carrying out service response processing based on the received second voice instruction;
And performing service response processing based on the received second voice command under the condition that the realized target service belongs to the second class of service;
wherein the security level requirements of the first type of service are higher than those of the second type of service.
According to the method and the system, the safety requirements corresponding to different services are different, so that different services are divided into the first type of service and the second type of service according to the safety level, the first type of service corresponds to the service with high safety requirements, when the first type of service is triggered, safety verification is needed, the first type of service can be executed by the system after the safety verification is successful, the safety requirements of the second type of service are low, and when the second type of service is triggered, the second type of service can be directly executed by the system. In particular, since the intelligent securities trading system can have various services and different security requirements for the services, in a specific application, each service can be set as a first type service or a second type service according to actual requirements.
The target service module is a service module in the plurality of service modules, which can realize the target service corresponding to the target keyword carried by the second voice command carrying the target keyword and sent by the target user.
By way of example, in one implementation, the plurality of target business modules may include one or more of an intelligent securities selection module, a discretionary securities cloud synchronization module, and a policy trading module,
the intelligent securities selecting module is used for realizing a business about screening securities; the service realized by the intelligent securities selecting module is a second type service;
in the case that the target service module includes an intelligent security module, the target service module performs service response processing based on the received second voice command when the implemented service belongs to the second class of service, including:
if the received second voice command is a command for representing any security screening mode, the target user is prompted by voice to input the value of the appointed screening parameter used by the security screening mode; the security screening mode is a screening mode which is set according to data of any one or more of seven options of plate, technical index, K line form, market price, dominant behavior, company research report and financial data;
if the received second voice command is a value representing a specified screening parameter used by the security screening mode input by the target user, displaying and voice broadcasting the value of the specified screening parameter to the target user, and prompting the target user to confirm whether the value of the specified screening parameter is correct or not;
If the received second voice command is a command for representing the target user to confirm that the value of the specified screening parameter is correct, screening securities according to the security screening mode based on the value of the specified screening parameter, displaying and voice broadcasting the screened securities to the target user, and prompting the target user by voice whether to add the screened securities into a self-selected securities list;
and if the received second voice instruction is used for representing the target user to confirm that the screened securities are added into the self-selected securities list, adding the screened securities into the self-selected securities list.
It can be understood that, when the screened securities are displayed and voice-broadcast to the target user, information representing the identity of the securities, such as the name and/or code of the securities, can be displayed and broadcast, and the screened securities can also be recorded in the self-selected securities list in the mode of the name and/or code of the securities.
The security screening mode is preset according to the data of the 7 options, and the name of the security screening mode and the corresponding keywords are also preset.
As shown in fig. 2, optionally, the intelligent security selection module may include an algorithm unit, where the algorithm unit is configured to execute the step of screening the intelligent security selection module based on the value of the specified screening parameter according to the security screening mode, specifically, each security screening mode sets a corresponding algorithm formula according to the data of the 7 options utilized by the intelligent security selection module, and the target user only needs to input the value of the screening parameter corresponding to the security screening mode, so as to screen the security according to the specified screening parameter based on the value of the specified screening parameter, and the algorithm unit is configured to screen the security according to the algorithm formula corresponding to each security screening mode based on the value of the specified screening parameter.
In the following, an algorithm of the securities screening method will be described by taking the securities screening method of screening daily stock.
The algorithm formula for screening the stock corresponding to the daily ration is as follows:
VOL/Q2>N AND(IF((SETCODE==0||SETCODE==1),100*VOL,VOL))/CAPITAL>M;
q2, simply moving average of the volume (hand) of the transaction in a set time period; 0 is Shenzhen market, 1 is Shanghai market; n and M are screening values which are set independently and are between 0 and 1;
paraphrasing: today's volume (hand)/Q2 > N AND (if (market type equal to 0 or market type equal to 1), return 100 volume (hand), otherwise return volume (hand))/current flow-through stock (hand) > M;
the simple moving average of the volume (hand) in the set time period refers to the average value of the volume of the stock in the set time period, wherein the set time period can be any time period in the history time period, for example, the simple moving average of 5 days refers to the average value of the volume of the stock in the first 5 days of the current date; screening single daily ration stocks is a screening mode set according to the data of the market price options in the 7 options, wherein the volume of the bargain is the data in the market price; in the algorithm formula, the set time periods in N, M and Q2 are all the filtering parameters described in the above embodiment, and the specific values are determined by the target user.
The system can select all securities meeting the conditions in the market based on the conditions set by the voice of the target user through calculation by the algorithm module, thereby realizing intelligent securities selection.
The above-described screening of daily stock is only one security screening method, and there are a plurality of security screening methods using the data setting of the 7 options, the user may not be fully aware of the security screening method,
optionally, if the received second voice command is a command for representing that the target user views the security screening mode, displaying and voice broadcasting the name of each security screening mode;
and if the received second voice instruction is an instruction for representing the target user to check any security screening mode, displaying specific information of the security screening mode and performing voice broadcasting.
The target user sends out a voice instruction for representing the security screening mode of the target user, for example, a 'viewing security screening mode name', and the intelligent security selection module can display and voice broadcast the names of the security screening modes. When the target user wants to know the specific content of a certain security screening mode, the target user can send out instructions for representing and checking any security screening mode, for example, checking and screening daily ration security information, and after the system detects keywords representing the instructions for checking any security screening mode, the intelligent security selecting module can display the specific information of the security screening mode, namely the security screening mode for screening daily ration security, and conduct voice broadcasting.
The target user can know the individual security screening modes by checking the specific information of the individual security screening modes, so that the target user can select the appropriate security screening mode to screen out the wanted security.
The self-selection security cloud synchronization module is used for realizing a service related to self-selection security cloud synchronization; the service realized by the self-selection security cloud synchronization module is a first type service;
the target keywords triggering the start of the target service are as follows: keywords representing any self-selected security cloud synchronization mode;
after passing the identity authentication, performing service response processing based on the received second voice command, including:
after passing identity authentication, carrying out cloud synchronization processing on securities in a self-selected securities list according to a self-selected securities cloud synchronization mode characterized by target keywords in the received second voice instruction;
the target keywords utilized in the execution process of the target service are as follows: and triggering a self-selection security cloud synchronization module except for the target keywords from which the target business starts to realize other keywords corresponding to the business.
The target user may log in the account numbers on a plurality of devices, and after the target user operates in different devices, the securities in the local security list of each device may be different, so that a service related to security cloud synchronization is realized through the security cloud synchronization module, and cloud synchronization of the security in different devices is realized.
And each terminal device synchronizes the local self-selected securities with the face and the voice as main keys to the cloud data service center, so that the cloud synchronization of the self-selected securities of different devices is realized.
The following describes a self-selection security cloud synchronization method through a specific embodiment.
In one implementation, the self-selected securities cloud synchronization mode is "upload self-selected securities"; as shown in fig. 3;
s301, uploading a selected strand;
the target user voice sends out a voice instruction for representing the uploading of the optional strand, for example, the target user voice sends out 'uploading of the optional strand'; the 'optional stock uploading' is the target keyword for triggering the start of the target service; the option in this embodiment corresponds to the above-described option securities.
S302, whether the face is recognized by voice;
the 'optional stock uploading' is the target keyword for triggering the start of the target service, so that the face voice recognition is triggered; the step of face voice recognition is corresponding to the step of carrying out identity authentication on the target user by adopting at least one appointed authentication mode; if the target user does not perform the facial speech recognition, a speech prompt of 'please recognize' is sent to the target user, and the user can perform the facial speech recognition again after hearing the prompt.
S303, displaying the quantity difference after uploading merging and uploading covering;
after the identity authentication of the target user is completed through the face voice recognition, the step is executed.
The uploading merging refers to uploading stock data in a local optional stock list of the terminal equipment to the cloud end, and merging the stock data in the optional stock list of the latest version in the cloud end cloud synchronous list to obtain the optional stock list of the latest version in the cloud end cloud synchronous list; uploading and covering means that stock data in a local optional share list of the terminal equipment is uploaded to the cloud, the stock data in the optional share list of the latest version in a cloud synchronous table of the cloud is covered by the stock data in the local optional share list of the terminal equipment, the optional share list of the latest version in the cloud synchronous table of the cloud is obtained, and only the stock data in the optional share list of the equipment local is stored in the optional share list of the latest version in the cloud synchronous table of the cloud after uploading and covering. And uploading merging and uploading coverage only affect cloud data, and have no effect on local data of the terminal equipment. The target user can use any terminal equipment to perform self-selection security cloud synchronization aiming at the same account number of the target user, when self-selection security cloud synchronization processing is performed each time, a self-selection stock list of the latest version in a current cloud synchronization table is used as a target synchronization self-selection stock list, if the target synchronization self-selection stock list is subjected to self-selection security cloud synchronization processing and data change to obtain the target self-selection stock list, the target self-selection stock list is the self-selection stock list of the latest version in the cloud synchronization table, and the target synchronization self-selection stock list becomes a history version, so that after cloud synchronization is performed for many times in the self-selection security cloud synchronization mode, a plurality of history versions are generated, and the self-selection stock lists of all versions are stored in the cloud synchronization table. The optional shares in this embodiment correspond to the optional securities, and the optional share list corresponds to the optional securities list.
The system displays and outputs the difference of the number of the selected stocks after uploading and merging or uploading and covering, and the target user can select two options of uploading and merging or uploading and covering; uploading merging or uploading covering are two options of uploading the optional strand; the target user can determine to select uploading combination or uploading coverage according to the displayed data;
of course; if the target user directly sends out an uploading merging or uploading covering instruction in the step S301 of starting the flow, the uploading merging or uploading covering instruction is the target keyword for triggering the starting of the target service, and the uploading merging or uploading covering service is directly carried out after the face voice recognition is completed; the target keyword belongs to a target keyword triggering the start of the target service or a target keyword utilized in the execution process of the target service, and needs to be judged in combination with specific scenes.
S304, merging or covering;
the target user may send out keywords characterizing the instruction to select upload merge or upload overlay, e.g., the target user may speak "upload merge" to indicate select upload merge; the tokens issued by the target user determine whether to upload the keywords of the combined or overlaid instruction, that is, the target keywords utilized in the target service execution process described in the above embodiment.
S305, uploading and merging or uploading coverage;
specifically, after uploading coverage is selected, uploading the local optional strand of the terminal equipment to a cloud database interface, and the cloud end covers the optional strand data to an optional strand list of the latest version in a cloud synchronization table of the cloud end. For example, BCD is set in the latest version of the optional strand list in the cloud synchronization table of the cloud end, CDE is set in the terminal equipment, and after the terminal equipment is uploaded and covered, CDE is set in the latest version of the optional strand list in the cloud synchronization table of the cloud end; and after the uploading and merging are selected, uploading the self-selected strand data of the local terminal equipment to a cloud database interface, and merging the self-selected strand data into a self-selected strand list of the latest version in a cloud synchronization table of the cloud. For example, the cloud end has BCD, the terminal device has CDE, and after uploading and merging, the BCDE is found in the latest version of the optional strand list in the cloud synchronization table of the cloud end.
S306, prompting a result.
And sending the uploading or covering successful voice prompt information to the target user, and displaying and voice outputting the result to the target user.
In one implementation, the self-selecting securities cloud synchronization mode is 'download self-selecting securities'; as shown in fig. 4;
s401, downloading a selection strand;
the target user voice sends out a keyword representing a self-selection strand downloading instruction, for example, the target user voice sends out 'self-selection strand downloading'; the keywords representing the download instruction of the selected strand are the target keywords triggering the start of the target service; the optional shares in this embodiment correspond to the optional securities, and the optional share list corresponds to the optional securities list.
S402, whether face voice recognition is performed;
since the keywords representing the download instruction of the optional strand are the target keywords triggering the start of the target service, the face voice recognition is triggered; the step of face voice recognition is corresponding to the step of carrying out identity authentication on the target user by adopting at least one appointed authentication mode; if the target user does not perform the facial speech recognition, a speech prompt of 'please recognize' is sent to the target user, and the user can perform the facial speech recognition again after hearing the prompt.
S403, showing the number difference after download merging and download coverage;
after the identity authentication of the target user is completed through the face voice recognition, the step is executed.
The downloading and merging means that stock data in the latest version of the self-selected stock list in the cloud synchronous table of the cloud is downloaded to the local of the terminal equipment and merged with stock data in the self-selected stock list of the local of the terminal equipment; the downloading and covering refers to downloading stock data in the latest version of the optional stock list in the cloud synchronization table of the cloud end to the local terminal equipment, covering the stock data in the optional stock list locally stored in the terminal equipment with the stock data in the latest version of the optional stock list in the cloud synchronization table of the cloud end, and only storing the stock data in the optional stock list of the latest version in the cloud synchronization table of the cloud end after the downloading and covering. And the downloading coverage and the downloading combination only affect the local data of the terminal equipment, and have no effect on cloud data. The target user can use any terminal equipment to perform self-selection security cloud synchronization aiming at the same account number of the target user, when self-selection security cloud synchronization processing is performed each time, a self-selection stock list of the latest version in a current cloud synchronization table is used as a target synchronization self-selection stock list, if the target synchronization self-selection stock list is subjected to self-selection security cloud synchronization processing and data change to obtain the target self-selection stock list, the target self-selection stock list is the self-selection stock list of the latest version in the cloud synchronization table, and the target synchronization self-selection stock list becomes a history version, so that after cloud synchronization is performed for many times in the self-selection security cloud synchronization mode, a plurality of history versions are generated, and the self-selection stock lists of all versions are stored in the cloud synchronization table. The optional shares in this embodiment correspond to the optional securities, and the optional share list corresponds to the optional securities list.
The system displays and outputs the download merging or download covering, then the target user can select two options of download merging or download covering according to the displayed data; download merge or download overlay are two options for downloading the option strand;
of course; if the target user directly sends a download merging or download covering instruction in the step S401 of starting the flow, the download merging or download covering instruction is the target keyword for triggering the starting of the target service, and the download merging or download covering service is directly carried out after the face speech recognition is finished; the target keyword belongs to a target keyword triggering the start of the target service or a target keyword utilized in the execution process of the target service, and needs to be judged in combination with specific scenes.
S404, merging or covering;
the target user sends out keywords representing instructions for selecting download merge or download overlay to select download merge or download overlay, for example, the target user can send out 'upload merge' by voice to indicate that upload merge is selected; the tokens issued by the target user determine whether to download the keywords of the instructions for merging or downloading the overlays, i.e., the target keywords utilized in the target business execution process described in the above embodiments.
S405, downloading merging or downloading covering;
specifically, after the downloading coverage is selected, the cloud end downloads and covers the selected data in the selected list of the latest version in the cloud synchronization table to the local of the terminal equipment. If the self-selection stock data returned by the cloud is consistent with the self-selection stock data of the terminal equipment, the local is not modified. For example, the cloud has BCD, the terminal device has CDE, and after downloading the coverage, the terminal device has BCD. And after the downloading combination is selected, the cloud end downloads the stock data of the latest version of the self-selected stock list in the cloud synchronous table to the local of the terminal equipment, and combines the stock data with the stock data in the self-selected stock list of the local of the terminal equipment. If the self-selection stock data returned by the cloud is consistent with the self-selection stock data of the terminal equipment, the local is not modified. For example, the cloud has BCD, the terminal device has CDE, and after downloading and merging, the terminal device has BCDE.
S406, prompting a result.
And sending the voice prompt information of successful downloading or covering to the target user, and displaying and voice outputting the result to the target user.
In one implementation, the self-selected securities cloud synchronization mode is 'self-selected stock recovery'; as shown in fig. 5;
s501, recovering the selected strand;
the target user voice sends out a keyword representing the self-selection strand recovery instruction, wherein the keyword representing the self-selection strand recovery instruction is the target keyword for triggering the starting of the target service; and the optional share recovery is to download and cover the optional share list of the selected historical version to local data, wherein the optional share list of the latest version in the current cloud synchronization list is used as a target synchronous optional share list when the optional security cloud synchronization processing is carried out each time by using any terminal equipment for the same account number of the target user to carry out optional security cloud synchronization, if the target synchronous optional share list is subjected to the optional security cloud synchronization processing and the data is changed, the target optional share list is the optional share list of the latest version in the cloud synchronization list and becomes the historical version, so that a plurality of historical versions are generated after the optional share list of each version is cloud-synchronized for a plurality of times by using the optional security cloud synchronization mode, and the optional share list of each version is stored in the cloud synchronization list. The optional shares in this embodiment correspond to the optional securities, and the optional share list corresponds to the optional securities list.
S502, whether face speech recognition is performed;
since the keywords representing the selected strand recovery instruction are the target keywords for triggering the start of the target service, the face voice recognition is triggered; the step of face voice recognition is corresponding to the step of carrying out identity authentication on the target user by adopting at least one appointed authentication mode; if the target user does not perform the facial speech recognition, a speech prompt of 'please recognize' is sent to the target user, and the user can perform the facial speech recognition again after hearing the prompt.
S503, returning to the version list and displaying the version list;
after the face voice recognition of the target user is completed, the self-selection security cloud synchronization module displays and outputs a version list to the target user in a voice manner; the version list may include a plurality of old versions, and the specific number is not limited in this application, and the number displayed at a time is also determined according to factors such as the screen size and the resolution, which is not limited in this application.
S504, selecting a version to restore and view the detailed code list
The target user can send out the keywords of the instruction for selecting any version to check the detailed stock code list in the version, and at this time, the keywords of the instruction for selecting any version are the target keywords utilized in the target service executing process in the embodiment; after the target user selects the version, the self-selection securities cloud synchronizing module displays and outputs the detailed codes and names of securities in the version to the target user in a voice way.
S505, selecting cloud synchronization recovery;
after the target user determines the restored version, sending out keywords representing the restored version; the keywords representing the recovery of the version are target keywords utilized in the target service execution process in the embodiment; the terminal equipment uploads local self-selection strand to the cloud end as the latest version, and the cloud end downloads and covers the self-selection strand list data of the version selected in the cloud synchronous table to the local. If the return result is null, the local is not covered.
S506, prompting a result;
and displaying and voice outputting the result to the target user.
The self-selection security cloud synchronization modes described in the above embodiments are only 3 of the plurality of self-selection security cloud synchronization modes, and the self-selection security cloud synchronization modes are not limited in this application. The discretionary securities cloud synchronizing module may also be used to synchronize securities trade data on different devices.
The strategy trading module is used for realizing the business of setting the securities trading strategy of any securities; the service realized by the strategy transaction module is a first type service;
the target keywords triggering the start of the target service are as follows: keywords characterizing any target securities, keywords characterizing any securities trading strategy;
After passing the identity authentication, carrying out service response processing based on the received second voice instruction, wherein the service response processing comprises the following steps:
after passing the identity authentication, based on the security trade strategy characterized by the received second voice command, voice prompting the target user to input the value of the trade parameter used by the security trade strategy;
the target keywords utilized in the execution process of the target service are as follows: triggering other keywords which are beyond the target keywords and correspond to the target business from the target business;
if the target keyword in the received second voice command is a target keyword utilized in the target service execution process, performing service response processing based on the received second voice command, including:
if the received second voice command is a value representing a transaction parameter used by a target user for inputting the securities transaction strategy mode, displaying and outputting the value of the transaction parameter in a voice mode, and prompting the target user to confirm whether the value of the transaction parameter is correct in the voice mode;
if the received second voice instruction is an instruction for representing that the target user confirms that the value of the trade parameter is correct, setting the securities trade strategy for the target securities based on the value of the trade parameter;
The policy trading module is further configured to execute the security trading policy or remind a target user to trade when the target security meets the set triggering condition of the security trading policy.
The scheme can realize the semi-bracket type ordering of the target user, the target user sets the algorithm strategy of the selected securities, the terminal equipment detects the stock quotation value in real time according to the strategy set in advance, and when the triggering condition of the target user strategy is met, the terminal equipment autonomously entrusts to the counter to report the securities or the target user to conduct the transaction, so that the time of the target user can be saved, and the target user does not need to stare at a tray in real time.
The securities trade strategy is described below by way of specific embodiments.
And (3) interference and loss prevention strategy transaction: the selling price, the entrusting quantity, the conditions of stopping profit and stopping loss and the execution mode (including the need of user confirmation entrusting or direct automatic entrusting) are set for the target securities selected by the financial user, and when the price reaches the conditions of stopping profit and stopping loss, the selling entrusting is reported to the trading system.
As shown in fig. 6, assuming that the target user holds a stock, intends to make a profit by 10 percent or intends to make a trade at a specific price, but cannot stare at the disc in real time, the profit and loss stopping function may be used to set the profit and loss stopping price, and when the stock price reaches the profit and loss stopping price, automatic newspaper is performed, that is, the stock exchange strategy is performed or the target user determines to place a bill.
Rebound purchase strategy transaction: setting a buying price, buying quantity, rebound buying condition and executing mode for the target securities selected by the user, and reporting buying commission to the trading system after the stock price reaches the buying condition.
As shown in fig. 7, assuming that the target user has seen a stock, it has recently begun to drop, and the latest price is 12 yuan, ready to buy after the rebound from the drop. The rebound buying is used, the price is set to be less than 10 yuan, and the callback proportion is 2%. When the stock price drops below 10 yuan, the system can continuously track the stock price, and when the stock price is rebounded by more than 2% compared with the lowest point, the stock price can be automatically reported, namely the stock exchange strategy is executed, or the target user is reminded to manually order.
Fallback sell policy transaction: setting selling price, selling quantity, back-drop selling condition and executing mode for the target securities selected by the user, and reporting selling commission to the trade system after the stock price reaches the selling condition.
As shown in fig. 8, assuming that the target user holds a stock, the latest starts to rise, and the latest price is 9 yuan. Ready to sell after rising and falling. When the price is set to be more than 10 yuan and the return proportion is set to be 2 percent, the system can continuously track the stock price when the stock price rises to be more than 10 yuan, and can automatically report the stock price to execute the stock exchange strategy or remind a target user to manually order when the stock price returns more than 2 percent compared with the highest point.
Grid policy transaction: setting a reference price, tracking price difference, commission price and commission quantity for the target securities selected by the user, and reporting the buying/selling commission to the trading system after the stock price reaches the buying/selling condition.
As shown in FIG. 9, the grid trade is a kind of quantitative trade, if the target user sees a stock, he wants to take the price of 20 yuan as the basis, and trace the operation of buying and selling 100 shares with the price difference of 0.2 yuan, namely buying 100 shares every 0.2 yuan, selling 100 shares every 0.2 yuan. The target user may select the grid transaction function. When the stock price reaches the condition set by the target user, the stock price can be automatically reported, namely the stock trading strategy is executed or the target user is reminded to manually issue the order. To circumvent the risk, the target user may set a price range, i.e. only grid transactions will be performed within this price interval. The target user can also set the range of stock holding, i.e. after buying or selling, the number of stock holding will not exceed the interval.
The securities trade policies described in the above embodiments are only 4 of a plurality of securities trade policies, and the securities trade policies are not limited in the present application.
The system provides a plurality of strategy transaction modes, and after a target user sets the corresponding conditions of any strategy transaction mode, the terminal equipment automatically scans quotations, meets the conditions and gives an order or notifies the target user.
The intelligent securities selecting module, the self-selecting securities cloud synchronizing module and the strategy trading module are only three of a plurality of target service modules in the intelligent securities trading system, and the intelligent securities trading system can also have other target service modules to realize the service functions of the other target service modules.
And all operations of the system are implemented after voice confirmation, so that the fund safety of a target user is ensured, and the multi-platform pushing processing result is ensured after the system operation is finished, so that investors can know the investment progress in real time.
According to the intelligent securities trading system, voice is used in the whole process to achieve login and related business operation of securities trading, the business achieved by each target business module is divided into the first type of business and the second type of business, the business with high safety requirements is used as the first type of business, when the first type of business is executed, if the target keyword in the received second voice command is the target keyword triggering the target business to start, identity authentication is required to be carried out on the target user, and after the authentication is passed, the target business is executed, so that the security performance is ensured when the first type of business with high safety level is executed. Therefore, the method and the device can realize the related business operation of securities trade without manual operation under the condition of ensuring the safety.
For a better understanding of the present solution, a smart securities trading system will be described by means of specific embodiments. As shown in fig. 10, the smart securities trading system may include: the system comprises a video and voice authentication module, an intelligent stock selection module, a self-stock selection cloud synchronization module, a strategy transaction module, a cloud message module and a video or voice control module; the video and voice authentication module corresponds to the login authentication module in the embodiment, and the realized function is the same as that of the login authentication module;
the specific login flow is shown in fig. 11;
s1101, whether to register;
after a target user speaks a keyword representing a login instruction, the system firstly adjusts a counter database according to voiceprint information of the target user, compares the voiceprint information with data in the database, judges whether registration information of the target user exists, and prompts voice after registration, the next step is carried out if the registration information does not exist; the target user may register in the manner of registration in the above-described embodiments if he wants to register.
S1102, whether face recognition is performed;
the face recognition authentication part integrates artificial intelligence to carry out face feature point scanning judgment, and enables a target user to blink and nod according to prompt so as to prevent photos from logging in, the target user can carry out the next step after the face recognition authentication is successful, if the target user does not carry out the face recognition authentication, prompt 'please carry out face recognition', and the user can carry out face recognition again after hearing the prompt;
S1103, whether the voice is recognized;
after the face recognition authentication is successful, voice recognition is carried out, the part answers the questions according to voice broadcasting prompts, if the recognition is wrong or no match exists, the recognition is reminded to be carried out again, and the next step can be carried out after the target user voice recognition authentication is successful; if the target user does not perform voice recognition authentication, prompting that the voice recognition is performed, and after hearing the prompting, the user can perform voice recognition again;
s1104, searching account stakeholder information;
after the face recognition and the voice recognition are all successful, the counter returns the information of the target user account stakeholder, namely the information in the target user account;
s1105, successful login.
After the login is successful, the target user enters an operation page, can see the information of the account number, and performs service operation.
The video or voice control module corresponds to the voice receiving module, and the realized function is the same as the voice receiving module;
the intelligent stock selection module, the self-stock selection cloud synchronization module, the strategy transaction module and the cloud message module are four modules in the plurality of service modules in the embodiment; the intelligent stock selection module corresponds to the intelligent stock selection module, the self-selection stock cloud synchronization module corresponds to the self-selection stock cloud synchronization module, the strategy transaction module corresponds to the strategy transaction module, and functions realized by the three modules are similar to functions of the corresponding modules, and are not repeated herein. The cloud message module is used for sending out voice to the user, that is, the action of sending out voice to the user by each module in the embodiment can trigger the cloud message module to operate, of course, the cloud message module is only used for sending out voice, if the cloud message module is not available, when the system is deployed with a sounding device, each module of the system has a sounding requirement, each module can trigger the sounding device to sound by itself. In fig. 10, the arrows between the cloud end message module and the video or voice control module represent the interaction relationship between the voice command sent by the user and the sound sent by the cloud end message module, and the arrows between the intelligent strand selection module, the self-selection cloud synchronization module, the policy transaction module and the cloud end message module represent the intelligent strand selection module, the self-selection cloud synchronization module and the policy transaction module trigger the cloud end message module to send the sound.
According to the intelligent securities trading system, voice is used in the whole process to achieve login and related business operation of securities trading, the business achieved by each module is divided into the first type of business and the second type of business, the business with high safety requirements is used as the first type of business, when the first type of business is executed, if the target keyword in the received second voice command is the target keyword triggering the target business to start, identity authentication is carried out on the target user, and after the authentication is passed, the target business is executed, so that the security performance is ensured when the first type of business with high safety level is executed. Therefore, the method and the device can realize the related business operation of securities trade without manual operation under the condition of ensuring the safety.
In addition, the method solves the problem of unsafe manual input of the fund account passwords and the problem of inconvenient action operation of the target user, and realizes double authentication of human faces and voices by comparing videos and voices with background data, thereby ensuring account and fund safety.
An embodiment of the present application provides an intelligent securities trading method, the method is applied to an electronic device, fig. 12 is a flow chart of the intelligent securities trading method provided in the embodiment of the present application, the method includes:
S1201, when a first voice instruction carrying a specified keyword sent by a target user is obtained, extracting voiceprint information from the first voice instruction, and carrying out matching analysis on the extracted voiceprint information and the voiceprint information of each user stored in advance;
s1202, if voiceprint information matched with the extracted voiceprint information exists, acquiring a user account corresponding to the matched voiceprint information;
s1203, adopting at least one appointed authentication mode, carrying out identity authentication on the target user based on the acquired user account, and after authentication is passed, carrying out login of the intelligent securities trading system based on the acquired user account; the appointed authentication mode is a mode for carrying out identity authentication based on the biological characteristic information of the target user; the appointed keywords are keywords for representing system login;
s1204, after successful login, determining target services corresponding to target keywords carried by the second voice instruction every time the second voice instruction carrying the target keywords is obtained, wherein different services correspond to different target keywords, and the target keywords corresponding to each service are keywords used for indicating the processing process of the service;
S1205, under the condition that the target service corresponding to the target keyword carried by the second voice command belongs to the first service type, if the target keyword in the received second voice command is the target keyword triggering the start of the target service, adopting at least one appointed authentication mode to carry out identity authentication on the target user, and after passing the identity authentication, carrying out service response processing based on the received second voice command;
if the target keyword in the received second voice instruction is the target keyword utilized in the target service execution process, carrying out service response processing based on the received second voice instruction;
s1206, under the condition that the realized target service belongs to the second class of service, service response processing is carried out based on the received second voice command;
wherein the security level requirements of the first type of service are higher than those of the second type of service.
For a specific implementation manner of each step in the above method, reference may be made to the content in the above embodiment for an intelligent securities trading system, which is not described herein.
According to the intelligent securities trading method, voice is used in the whole process to achieve login and related business operation of securities trading, the system divides businesses achieved by each module into first type businesses and second type businesses, the businesses with high security requirements are used as the first type businesses, when the first type businesses are executed, if target keywords in received second voice commands are target keywords triggering the target businesses to start, identity authentication is conducted on the target users, and after the authentication is passed, the target businesses are executed, so that the security performance is guaranteed when the first type businesses with high security level are executed. Therefore, the method and the device can realize the related business operation of securities trade without manual operation under the condition of ensuring the safety.
FIG. 13 is a schematic structural diagram of an intelligent securities trade apparatus according to an embodiment of the present application; the apparatus is applied to an electronic device, and the apparatus includes:
an analysis unit 1301, configured to extract voiceprint information from a first voice instruction that is sent by a target user and carries a specified keyword, and perform matching analysis on the extracted voiceprint information and voiceprint information of each user stored in advance;
an obtaining unit 1302, configured to obtain a user account corresponding to the voiceprint information that matches the extracted voiceprint information if the voiceprint information exists;
a login unit 1303, configured to perform identity authentication on the target user based on the obtained user account by using at least one specified authentication method, and perform login of the intelligent securities trading system based on the obtained user account after the authentication is passed; the appointed authentication mode is a mode for carrying out identity authentication based on the biological characteristic information of the target user; the appointed keywords are keywords for representing system login;
a determining unit 1304, configured to determine, after a login is successful, each time a second voice command carrying a target keyword sent by the target user is obtained, a target service corresponding to the target keyword carried by the second voice command, where different services correspond to different target keywords, and each target keyword corresponding to a service is a keyword for indicating a processing procedure of the service;
A service response unit 1305, configured to, if a target service corresponding to a target keyword carried by the second voice instruction belongs to a first type of service, perform identity authentication on the target user by adopting at least one specified authentication mode if the target keyword in the received second voice instruction is a target keyword triggering the start of the target service, and perform service response processing based on the received second voice instruction after the identity authentication is passed;
if the target keyword in the received second voice instruction is the target keyword utilized in the target service execution process, carrying out service response processing based on the received second voice instruction;
and performing service response processing based on the received second voice command under the condition that the realized target service belongs to the second class of service;
wherein the security level requirements of the first type of service are higher than those of the second type of service.
According to the intelligent securities trading method, voice is used in the whole process to achieve login and related business operation of securities trading, the system divides businesses achieved by each module into first type businesses and second type businesses, the businesses with high security requirements are used as the first type businesses, when the first type businesses are executed, if target keywords in received second voice commands are target keywords triggering the target businesses to start, identity authentication is conducted on the target users, and after the authentication is passed, the target businesses are executed, so that the security performance is guaranteed when the first type businesses with high security level are executed. Therefore, the method and the device can realize the related business operation of securities trade without manual operation under the condition of ensuring the safety.
The embodiment of the present application further provides an electronic device, as shown in fig. 14, including a processor 1401, a communication interface 1402, a memory 1403, and a communication bus 1404, where the processor 1401, the communication interface 1402, and the memory 1403 perform communication with each other through the communication bus 1404,
a memory 1403 for storing a computer program;
the processor 1401 is configured to execute the program stored in the memory 1403 to implement any one of the steps of the intelligent securities trading method.
The communication bus mentioned above for the electronic devices may be a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the electronic device and other devices.
The Memory may include random access Memory (Random Access Memory, RAM) or may include Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; but also digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
In yet another embodiment provided herein, there is also provided a computer readable storage medium having a computer program stored therein, which when executed by a processor, implements the steps of any of the intelligent securities trading methods described above.
In yet another embodiment provided herein, there is also provided a computer program product containing instructions that, when run on a computer, cause the computer to perform any of the intelligent securities trading methods of the above embodiments.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In this specification, each embodiment is described in a related manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for system embodiments, since they are substantially similar to method embodiments, the description is relatively simple, as relevant to see a section of the description of method embodiments.
The foregoing description is only of the preferred embodiments of the present application and is not intended to limit the scope of the present application. Any modifications, equivalent substitutions, improvements, etc. that are within the spirit and principles of the present application are intended to be included within the scope of the present application.

Claims (10)

1. A smart securities trading system, comprising: the system comprises a voice receiving module, a login authentication module and a plurality of service modules;
the voice receiving module is used for sending a first voice instruction carrying a specified keyword to the login authentication module when the first voice instruction sent by a target user is obtained; the appointed keywords are keywords for representing system login;
the login authentication module is used for extracting voiceprint information from the first voice command, carrying out matching analysis on the extracted voiceprint information and the voiceprint information of each user stored in advance, and acquiring a target user account corresponding to the matched voiceprint information if voiceprint information matched with the extracted voiceprint information exists; adopting at least one appointed authentication mode, carrying out identity authentication on the target user based on the acquired target user account, and after authentication is passed, carrying out login of the intelligent securities trading system based on the acquired target user account; the appointed authentication mode is a mode for carrying out identity authentication based on the biological characteristic information of the target user;
The voice receiving module is further configured to determine a target service corresponding to a target keyword carried by a second voice instruction after the login is successful, and send the second voice instruction to a target service module for implementing the target service whenever the second voice instruction carrying the target keyword sent by the target user is obtained; wherein, different business corresponds to different target keywords, and each target keyword corresponding to each business is a keyword for indicating the processing process of the business;
the target service module is configured to, in a case that the implemented target service belongs to a first type of service, perform identity authentication on the target user by adopting at least one specified authentication mode if a target keyword in the received second voice instruction is a target keyword triggering the start of the target service, and perform service response processing based on the received second voice instruction after the identity authentication is passed; if the target keyword in the received second voice instruction is the target keyword utilized in the target service execution process, carrying out service response processing based on the received second voice instruction;
And performing service response processing based on the received second voice command under the condition that the realized target service belongs to the second class of service;
wherein the security level requirements of the first type of service are higher than those of the second type of service.
2. The intelligent securities trading system of claim 1, wherein said login authentication module employs at least one specified authentication method to authenticate the identity of the target user based on the obtained target user account, comprising:
performing primary identity authentication on the target user by using a preset face image corresponding to the target user account and an authentication mode related to face information; the authentication mode of the face information is a mode of authenticating by adopting a video containing a face image;
after the primary identity authentication is passed, adopting an authentication mode related to voice question and answer to perform secondary identity authentication on the target user;
after the identity authentication again passes, judging that the target user passes the identity authentication;
and if the initial identity authentication fails or the second identity authentication fails, judging that the target user fails the identity authentication.
3. The intelligent securities trading system of claim 1, wherein the login authentication module is further configured to output notification information for instructing the target user to register when there is no voiceprint information matching the extracted voiceprint information.
4. The intelligent securities trading system of claim 1, wherein said target business module comprises: an intelligent securities selecting module; the intelligent securities selecting module is used for realizing a business about screening securities; the service realized by the intelligent securities selecting module is a second type service;
and the target service module performs service response processing based on the received second voice command under the condition that the realized service belongs to the second class of service, and comprises the following steps:
if the received second voice command is a command for representing any security screening mode, the target user is prompted by voice to input the value of the appointed screening parameter used by the security screening mode; the security screening mode is a screening mode which is set according to data of any one or more of seven options of plate, technical index, K line form, market price, dominant behavior, company research report and financial data;
If the received second voice command is a value representing a specified screening parameter used by the security screening mode input by the target user, displaying and voice broadcasting the value of the specified screening parameter to the target user, and prompting the target user to confirm whether the value of the specified screening parameter is correct or not;
if the received second voice command is a command for representing the target user to confirm that the value of the specified screening parameter is correct, screening securities according to the security screening mode based on the value of the specified screening parameter, displaying and voice broadcasting the screened securities to the target user, and prompting the target user by voice whether to add the screened securities into a self-selected securities list;
and if the received second voice instruction is used for representing the target user to confirm that the screened securities are added into the self-selected securities list, adding the screened securities into the self-selected securities list.
5. The intelligent securities trading system of claim 1, wherein said target business module comprises: the system comprises a self-selection security cloud synchronization module, a self-selection security cloud synchronization module and a self-selection security cloud management module, wherein the self-selection security cloud synchronization module is used for realizing a service related to self-selection security cloud synchronization; the service realized by the self-selection security cloud synchronization module is a first type service;
The target keywords triggering the start of the target service are as follows: keywords representing any self-selected security cloud synchronization mode;
after passing the identity authentication, performing service response processing based on the received second voice command, including:
after passing identity authentication, carrying out cloud synchronization processing on securities in a self-selected securities list according to a self-selected securities cloud synchronization mode characterized by target keywords in the received second voice instruction;
the target keywords utilized in the execution process of the target service are as follows: and triggering a self-selection security cloud synchronization module except for the target keywords from which the target business starts to realize other keywords corresponding to the business.
6. The intelligent securities trading system of claim 1, wherein said target business module comprises: the system comprises a policy trading module, a policy management module and a policy management module, wherein the policy trading module is used for realizing the business of setting the security trading policy of any security; the service realized by the strategy transaction module is a first type service;
the target keywords triggering the start of the target service are as follows: keywords characterizing any target securities, keywords characterizing any securities trading strategy;
After passing the identity authentication, carrying out service response processing based on the received second voice instruction, wherein the service response processing comprises the following steps:
after passing the identity authentication, based on the security trade strategy characterized by the received second voice command, voice prompting the target user to input the value of the trade parameter used by the security trade strategy;
the target keywords utilized in the execution process of the target service are as follows: triggering other keywords which are beyond the target keywords and correspond to the target business from the target business;
if the target keyword in the received second voice command is a target keyword utilized in the target service execution process, performing service response processing based on the received second voice command, including:
if the received second voice command is a value representing a transaction parameter used by a target user for inputting the securities transaction strategy mode, displaying and outputting the value of the transaction parameter in a voice mode, and prompting the target user to confirm whether the value of the transaction parameter is correct in the voice mode;
if the received second voice instruction is an instruction for representing that the target user confirms that the value of the trade parameter is correct, setting the securities trade strategy for the target securities based on the value of the trade parameter;
The policy trading module is further configured to execute the security trading policy or remind a target user to trade when the target security meets the set triggering condition of the security trading policy.
7. A method of intelligent securities trading, the method being applied to an electronic device, the method comprising:
when a first voice command carrying a specified keyword sent by a target user is obtained, extracting voiceprint information from the first voice command, and carrying out matching analysis on the extracted voiceprint information and the voiceprint information of each user stored in advance;
if voiceprint information matched with the extracted voiceprint information exists, acquiring a target user account corresponding to the matched voiceprint information;
adopting at least one appointed authentication mode, carrying out identity authentication on the target user based on the acquired target user account, and after authentication is passed, carrying out login of the intelligent securities trading system based on the acquired target user account; the appointed authentication mode is a mode for carrying out identity authentication based on the biological characteristic information of the target user; the appointed keywords are keywords for representing system login;
After successful login, each time a second voice command carrying a target keyword sent by the target user is obtained, determining target services corresponding to the target keyword carried by the second voice command, wherein different services correspond to different target keywords, and the target keyword corresponding to each service is a keyword for indicating the processing process of the service;
under the condition that the target service corresponding to the target keyword carried by the second voice command belongs to the first service, if the target keyword in the received second voice command is the target keyword triggering the start of the target service, adopting at least one appointed authentication mode to carry out identity authentication on the target user, and after passing the identity authentication, carrying out service response processing based on the received second voice command;
if the target keyword in the received second voice instruction is the target keyword utilized in the target service execution process, carrying out service response processing based on the received second voice instruction;
and performing service response processing based on the received second voice command under the condition that the realized target service belongs to the second class of service;
Wherein the security level requirements of the first type of service are higher than those of the second type of service.
8. An intelligent securities trading apparatus, wherein the apparatus is applied to an electronic device, the apparatus comprising:
the analysis unit is used for extracting voiceprint information from a first voice instruction which is sent by a target user and carries a specified keyword, and carrying out matching analysis on the extracted voiceprint information and the voiceprint information of each user stored in advance;
the acquisition unit is used for acquiring a target user account corresponding to the matched voiceprint information if the voiceprint information matched with the extracted voiceprint information exists;
the login unit is used for carrying out identity authentication on the target user based on the acquired target user account by adopting at least one appointed authentication mode, and carrying out login of the intelligent securities trading system based on the acquired target user account after the authentication is passed; the appointed authentication mode is a mode for carrying out identity authentication based on the biological characteristic information of the target user; the appointed keywords are keywords for representing system login;
the determining unit is used for determining target services corresponding to the target keywords carried by the second voice command after successful login, each time the second voice command carrying the target keywords sent by the target user is obtained, wherein different services correspond to different target keywords, and each target keyword corresponding to each service is a keyword for indicating the processing process of the service;
The service response unit is used for carrying out identity authentication on the target user by adopting at least one appointed authentication mode if the target keyword in the received second voice instruction is the target keyword triggering the start of the target service under the condition that the target service corresponding to the target keyword carried by the second voice instruction belongs to the first service, and carrying out service response processing based on the received second voice instruction after passing the identity authentication;
if the target keyword in the received second voice instruction is the target keyword utilized in the target service execution process, carrying out service response processing based on the received second voice instruction;
and performing service response processing based on the received second voice command under the condition that the realized target service belongs to the second class of service;
wherein the security level requirements of the first type of service are higher than those of the second type of service.
9. The electronic equipment is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the communication bus;
A memory for storing a computer program;
a processor for implementing the steps of the method of claim 7 when executing a program stored on a memory.
10. A computer readable storage medium, characterized in that the computer readable storage medium has stored therein a computer program which, when executed by a processor, implements the steps of the method of claim 7.
CN202310393224.2A 2023-04-13 2023-04-13 Intelligent securities trading system, method, equipment and storage medium Pending CN116523641A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310393224.2A CN116523641A (en) 2023-04-13 2023-04-13 Intelligent securities trading system, method, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310393224.2A CN116523641A (en) 2023-04-13 2023-04-13 Intelligent securities trading system, method, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116523641A true CN116523641A (en) 2023-08-01

Family

ID=87395070

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310393224.2A Pending CN116523641A (en) 2023-04-13 2023-04-13 Intelligent securities trading system, method, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116523641A (en)

Similar Documents

Publication Publication Date Title
US10846426B2 (en) Methods and systems for secure document management
US10009332B2 (en) Method and apparatus for remote identity proofing service issuing trusted identities
US10452909B2 (en) System and method for identity proofing and knowledge based authentication
EP3623976B1 (en) Toggling biometric authentication
US7231657B2 (en) User authentication system and methods thereof
CN109272381B (en) Service recommendation method and device, electronic equipment and readable storage medium
US20120281058A1 (en) Virtual Inmate Visitation
CN109165940A (en) A kind of theft preventing method, device and electronic equipment
DE102015006934A1 (en) Verifying a user's identity based on adaptive identity assurance levels
US11734650B2 (en) System and method for transferring data
CN111526173A (en) System for safely accelerating resource allocation
US10192043B2 (en) Identity verification
WO2016144632A2 (en) Method and apparatus for remote identity proofing service issuing trusted identities
US20220029981A1 (en) Voice biometric authentication in a virtual assistant
US20150348048A1 (en) Customer communication analysis tool
JP2019511755A (en) Financial transaction management system, financial transaction management method and server
US20150120581A1 (en) Computer implemented frameworks and methodologies configured to enable processing and management of data relating to lease applications
US11172046B2 (en) Intermediated access to entity information profiles
WO2018232443A1 (en) Method and system for identity proofing
CN116523641A (en) Intelligent securities trading system, method, equipment and storage medium
CN114598562A (en) Asset securitization security conference management method and device, conference platform and medium
WO2019100112A1 (en) A system, method, computer program and data signal for communicating and event based verification
US20150347518A1 (en) Associate communication analysis tool
CN113221529A (en) Event investigation method and device
US20210336951A1 (en) Fusion template for user authentication and vault for storing and using the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination