WO2021169469A1 - 声纹数据处理方法、装置、计算机设备和存储介质 - Google Patents
声纹数据处理方法、装置、计算机设备和存储介质 Download PDFInfo
- Publication number
- WO2021169469A1 WO2021169469A1 PCT/CN2020/134470 CN2020134470W WO2021169469A1 WO 2021169469 A1 WO2021169469 A1 WO 2021169469A1 CN 2020134470 W CN2020134470 W CN 2020134470W WO 2021169469 A1 WO2021169469 A1 WO 2021169469A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- identification information
- voiceprint
- device identification
- current
- Prior art date
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 14
- 238000012795 verification Methods 0.000 claims abstract description 135
- 238000000034 method Methods 0.000 claims abstract description 24
- 238000012545 processing Methods 0.000 claims description 25
- 238000011022 operating instruction Methods 0.000 claims description 10
- 238000012986 modification Methods 0.000 claims description 9
- 230000004048 modification Effects 0.000 claims description 9
- 238000007781 pre-processing Methods 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000001413 cellular effect Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000000877 morphologic effect Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L17/00—Speaker identification or verification techniques
Definitions
- This application relates to the field of computer technology, in particular to a voiceprint data processing method, device, computer equipment and storage medium.
- terminal devices such as mobile phones, tablet computers, etc.
- voiceprints can collect voiceprints.
- Different applications can collect different voiceprints.
- the collected voiceprints can serve different functions, such as login verification voiceprint, payment verification voiceprint Wait.
- a method for processing voiceprint data is provided.
- a method for processing voiceprint data including:
- the valid device identification information is based on Generated by the device universal unique identification code of the device where the first application is located and historical operation information of the first application;
- the voiceprint verification request includes the valid device identification information and the first voiceprint, so that the server obtains the standard corresponding to the first application according to the valid device identification information Voiceprint, verifying the consistency of the standard voiceprint and the first voiceprint to obtain a verification result;
- a voiceprint data processing device including:
- the acquiring module is configured to acquire the first voiceprint collected by the first application, acquire the target storage space corresponding to the first application, and acquire the valid device identification information corresponding to the first application from the target storage space.
- the device identification information is generated based on the device universal unique identification code of the device where the first application is located and historical operation information of the first application;
- the sending module is configured to send a voiceprint verification request to a server, where the voiceprint verification request includes the valid device identification information and the first voiceprint, so that the server obtains the first voiceprint according to the valid device identification information 1. Apply the corresponding standard voiceprint to verify the consistency of the standard voiceprint and the first voiceprint to obtain a verification result; and
- the execution module is configured to receive the verification result returned by the server, and execute corresponding operations according to the verification result.
- a computer device including a memory and one or more processors, the memory stores computer readable instructions, and when the computer readable instructions are executed by the processor, the one or more processors execute Computer readable instructions for the following steps:
- the valid device identification information is based on Generated by the device universal unique identification code of the device where the first application is located and historical operation information of the first application;
- the voiceprint verification request includes the valid device identification information and the first voiceprint, so that the server obtains the standard corresponding to the first application according to the valid device identification information Voiceprint, verifying the consistency of the standard voiceprint and the first voiceprint to obtain a verification result;
- One or more computer storage media storing computer-readable instructions.
- the one or more processors When the computer-readable instructions are executed by one or more processors, the one or more processors perform the following steps: computer-readable instructions, computer-readable instructions:
- the valid device identification information is based on Generated by the device universal unique identification code of the device where the first application is located and historical operation information of the first application;
- the voiceprint verification request includes the valid device identification information and the first voiceprint, so that the server obtains the standard corresponding to the first application according to the valid device identification information Voiceprint, verifying the consistency of the standard voiceprint and the first voiceprint to obtain a verification result;
- Fig. 1 is an application environment diagram of a voiceprint data processing method according to one or more embodiments
- FIG. 2 is a schematic flowchart of a voiceprint data processing method according to one or more embodiments
- Fig. 3 is a structural block diagram of a voiceprint data processing device according to one or more embodiments.
- Fig. 4 is a diagram of the internal structure of a computer device according to one or more embodiments.
- Fig. 1 is a diagram of an application environment in which a voiceprint data processing method operates in an embodiment.
- the application environment includes a terminal 110 and a server 120.
- the terminal and the server communicate through the network.
- the communication network may be a wireless or wired communication network, such as an IP network, a cellular mobile communication network, etc., and the number of terminals and servers is not limited.
- the terminal 110 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices.
- the server can be implemented as an independent server or a server cluster composed of multiple servers.
- the terminal 110 obtains the first voiceprint collected by the first application, obtains the target storage space corresponding to the first application, and obtains the valid device identification information corresponding to the first application from the target storage space.
- the valid device identification information is based on the device where the first application is located.
- the device universal unique identification code and the historical operation information of the first application are generated, and a voiceprint verification request is sent to the server 120.
- the voiceprint verification request includes valid device identification information and the first voiceprint, so that the server can obtain the first voiceprint according to the valid device identification information. 1. Apply the corresponding standard voiceprint to verify the consistency between the standard voiceprint and the first voiceprint to obtain a verification result; receive the verification result returned by the server 120, and execute the corresponding operation according to the verification result.
- a method for processing voiceprint data is provided. Taking the method applied to the terminal 110 in FIG. 1 as an example for description, the method includes the following steps:
- Step 210 Obtain the first voiceprint collected by the first application, obtain the target storage space corresponding to the first application, and obtain the effective device identification information corresponding to the first application from the target storage space.
- the effective device identification information is based on the device where the first application is located.
- the device universal unique identification code and the historical operation information of the first application are generated.
- the first application may be an application that comes with the system on the device, or an application installed by downloading.
- the type of the first application is not limited, and may be a login application, a payment application, a social application, a game application, and so on.
- the first application may be one or more sub-applications in the main application, and each sub-application is attached to the main application to run and enter the sub-application through the main application's page.
- each application has a corresponding storage space, and this storage space still exists after the application is uninstalled. If it is installed again after uninstallation, the application data of the application previously stored in the storage space can still be used.
- the data in the target storage space can be stored in the form of key-value pairs.
- storage is performed by the keyChain in the iOS operating system.
- the keyChain is a storage space in which data is stored in the form of "key-value", and four operations can be performed on the data in addition, deletion, modification, and query.
- Voiceprint refers to the sound wave spectrum of a voice signal. Voiceprint has specificity and stability. Through voiceprint recognition, user identity can be detected. The collected voice data can be extracted through the voiceprint feature extraction model to obtain the voiceprint feature, so as to obtain the first voiceprint according to the voiceprint feature.
- Voiceprint features can include: acoustic features, morphological features, prosodic features, language, dialect and accent information, channel information, etc.
- the universal unique identification code of the device is generated every time the application is called by the system that comes with the device. For example, the UUID generated by the ios system is not stored by the system itself, so it is stored in the target storage space corresponding to the application.
- the device universal unique identification code can ensure that all elements in the distributed system have unique identification information, but there may be two identical device universal unique identification codes.
- the value of the valid device identification information is unique, because the valid device identification information is generated by the universal unique identification code of the device and the historical operation information of the first application to further ensure uniqueness.
- the historical operation information includes at least one of time operation information, space operation information, and equipment space status.
- Time operation information includes current operation time
- system time can be converted to Timestamp
- spatial operation information includes geographic location information
- geographic location information can be converted to region through "World and Region Name Code” and "National Region Code Table” Code Location.
- the space state of the device can be the current space position of the device, including the tilt angle and movement speed, which can be collected by a gyroscope.
- the historical operation information may also include operation object information, such as application identification, user identification of the operating application, and so on. Multiple different types of historical operation information and device universal unique identification codes can be combined to generate valid device identification information.
- Step 220 Send a voiceprint verification request to the server.
- the voiceprint verification request includes valid device identification information and the first voiceprint, so that the server obtains the standard voiceprint corresponding to the first application according to the valid device identification information, and verifies the standard voiceprint The consistency with the first voiceprint is verified.
- the voiceprint verification request is used to verify whether the currently collected voiceprint is consistent with the historically bound voiceprint. If they are consistent, it means that the user's identity has been verified and the corresponding operation can be performed on the first application. If the verification fails, it means that the user identity verification has failed, and there is no operating authority for the first application.
- the server Since the valid device identification information is unique, the corresponding standard voiceprint can be uniquely determined, effectively avoiding the problem of incorrect standard voiceprint obtained by the same device identification information in different applications of multiple different devices, resulting in inaccurate verification results , And because of the uniqueness of the effective device identification information, the server only needs to store the association relationship between the effective device identification information and the standard voiceprint, so that different devices can be distinguished, and the same applications on different devices can also be distinguished. Different applications on the device can also be distinguished, which improves the accuracy of voiceprint verification and ensures the effectiveness of voiceprint information management.
- Step 230 Receive the verification result returned by the server, and perform a corresponding operation according to the verification result.
- the corresponding operation can be performed on the first application.
- the valid device identification information corresponding to the first application is obtained from the target storage space, and the valid device identification information is the device universal unique identification code of the device where the first application is located and historical operation information for the first application Generate and obtain the corresponding standard voiceprint from the server according to the valid device identification information. Since the effective device identification information is unique for different applications of different devices, the accuracy of obtaining the standard voiceprint on different devices is ensured and the standard voiceprint is verified. The consistency between the pattern and the first voiceprint obtains the verification result, thereby improving the accuracy of the voiceprint verification and ensuring the accuracy of the operation authority for performing the corresponding operation according to the voiceprint verification result.
- the voiceprint data processing method further includes: obtaining an operation instruction acting on the first application, obtaining current operation information corresponding to the operation instruction, collecting the standard voiceprint corresponding to the first application through the first application, and obtaining the first application.
- the device universal unique identification code of the device where the application is located the current device identification information corresponding to the first application is generated according to the universal unique identification code of the device and the current operation information, and the target storage space corresponding to the first application is obtained.
- the corresponding valid device identification information is applied, the current device identification information is stored as valid device identification information in the target storage space, and the valid device identification information and standard voiceprint are sent to the server so that the server can store the effective device identification information and standard voiceprint information. connection relation.
- the operation instruction is used to perform a corresponding operation on the first application, and may be an installation operation instruction, a startup operation instruction, a login operation instruction, an add friend operation instruction, a payment operation instruction, and the like. It is understandable that there can be one or more operation instructions, but as long as valid device identification information already exists in the target storage space, there is no need to generate the current device identification information again for subsequent acquisitions of the operation instructions. The same device is the same.
- the various operations of the application that need to verify the voiceprint all share the same standard voiceprint.
- the standard voiceprint may be the voiceprint of the user of the device owner, and only users who match the standard voiceprint have the authority to operate applications on the device. Since the effective device identification information generated by different applications of the same device is different, different standard voiceprints can be set for different applications.
- the generated valid device identification information corresponding to each application is stored in the private storage space corresponding to each application, thereby ensuring the convenience and accuracy of subsequent acquisition of the valid device identification information corresponding to each application, and the effective device identification information is stored in the server in advance.
- the correlation between the identification information and the standard voiceprint facilitates subsequent voiceprint verification.
- the operation instruction acting on the first application is obtained, the current operation information corresponding to the operation instruction is obtained, the standard voiceprint corresponding to the first application is collected through the first application, and the device universal uniqueness of the device where the first application is located is obtained.
- An identification code is obtained.
- Generating the current device identification information corresponding to the first application according to the universal unique identification code of the device and the current operation information includes: acquiring an application startup instruction for starting the first application for the first time; acquiring the current device corresponding to the application startup instruction System time, obtain the current device geographic location information corresponding to the application startup instruction, obtain the device universal unique identification code generated by the device where the first application is located according to the current device system time; combine the current device system time, current device geographic location information, and device universal unique identifier The code combination generates current device identification information corresponding to the first application.
- the first application as the current voiceprint recognition application, is launched on the current device for the first time, it obtains the universal unique identification code UUID of the device generated by the system and the system time and geographic location of the device at the same time, and the system time can be converted into Timestamp Timestamp, and convert the geographic location to the area code Location through the "world country and area name code” and the "national area code table”.
- the character string generated by the combination of "UUID+Timestamp+Location" as the current device identification information of the device, and the application will not need to be regenerated later on this device.
- storing the current device identification information as valid device identification information in the target storage space includes: generating a random prefix and a random suffix, and combining the random prefix, current device identification information, and random suffix in order to generate processing device identification information.
- the processing device identification information is encrypted to obtain the encrypted device identification information, and the encrypted device identification information is stored in the target storage space.
- the current device identification information generated by the above method reduces the recognizability of the identification through combination, but the encryption of the current device identification information is also extremely important.
- the identification code generated by the combined encryption is stored in the keyChain as the unique identification of the device corresponding to the first application, and the value is sent back to the server at the same time Store with standard voiceprint.
- step 210 before step 210, it further includes: obtaining the current operation instruction type, and the target storage space stores data in the form of key-value pairs, where the key is the current operation instruction type, and the value is valid device identification information.
- the current operation instruction type and the current device identification information are stored in the target storage space in the form of key-value pairs, and the target standard voiceprint corresponding to the current operation instruction type is obtained , Send the effective device identification information and the target standard voiceprint to the server so that the server stores the association relationship between the effective device identification information and the target standard voiceprint.
- the method further includes: acquiring a first operation instruction that acts on the first application, determining a first operation instruction type corresponding to the first operation instruction; acquiring, from the target storage space, a valid version corresponding to the first application that matches the first operation instruction type.
- Device identification information includes the valid device identification information and the first voiceprint, so that the server obtains the target standard voiceprint matching the first operation instruction type according to the valid device identification information, and verifies that the target standard voiceprint is compatible with the first voiceprint.
- the consistency obtains the verification result corresponding to the first operation instruction.
- the operation instruction of the same function can be regarded as the same type of operation instruction, such as payment type operation instruction, login type operation instruction, and friend type operation instruction.
- Different types of operation instructions have different levels of priority. Level and security can be verified by the voiceprints of users with different levels of identity. If the payment type requires a higher level of priority, it will be verified by the voiceprint of the user with a higher level of identity.
- the current operation instruction type and current device identification information are stored in the target storage space in the form of key-value pairs, so that different effective device identification information can be obtained according to different operation instruction types, and different types of operation instructions of the same application correspond to different
- the effective device identification information can be used to obtain the standard voiceprint corresponding to the target operation instruction type corresponding to the target application from the server through the effective device identification information, so that different types of operation instructions of the same application have different standard voiceprints.
- Identity verification Due to the uniqueness of the effective device identification information generation, the accuracy of the standard voiceprint acquisition is guaranteed.
- the verification result includes verification results corresponding to a plurality of different operation instructions
- step 230 includes: obtaining the operation instruction whose verification result is passed as the target execution operation instruction, and execute the operation instruction that acts on the first application according to each target.
- the target operation, the target operation includes at least one of a login operation, a payment operation, and an information modification operation.
- steps in the flowchart of FIG. 2 are displayed in sequence as indicated by the arrows, these steps are not necessarily performed in sequence in the order indicated by the arrows. Unless specifically stated in this article, the execution of these steps is not strictly limited in order, and these steps can be executed in other orders. Moreover, at least part of the steps in FIG. 2 may include multiple sub-steps or multiple stages. These sub-steps or stages are not necessarily executed at the same time, but can be executed at different times. The execution of these sub-steps or stages The sequence is not necessarily performed sequentially, but may be performed alternately or alternately with at least a part of other steps or sub-steps or stages of other steps.
- a voiceprint data processing device including: an acquisition module 310, a sending module 320, and an execution module 330, wherein:
- the obtaining module 310 is configured to obtain the first voiceprint collected by the first application, obtain the target storage space corresponding to the first application, and obtain the valid device identification information corresponding to the first application from the target storage space.
- the valid device identification information is generated based on the device universal unique identification code of the device where the first application is located and historical operation information of the first application.
- the sending module 320 is configured to send a voiceprint verification request to a server, where the voiceprint verification request includes the valid device identification information and the first voiceprint, so that the server can obtain the The first application of the corresponding standard voiceprint verifies the consistency of the standard voiceprint and the first voiceprint to obtain a verification result.
- the execution module 330 is configured to receive the verification result returned by the server, and execute a corresponding operation according to the verification result.
- the device further includes:
- the first preprocessing module 340 is configured to obtain operation instructions acting on the first application, and obtain current operation information corresponding to the operation instructions; collect the standard voiceprint corresponding to the first application through the first application; and obtain the location of the first application
- the device universal unique identification code of the device, the current device identification information corresponding to the first application is generated according to the universal unique identification code of the device and the current operation information; the target storage space corresponding to the first application is obtained, and when the target storage space does not exist,
- the valid device identification information corresponding to the first application is stored, the current device identification information is stored in the target storage space as valid device identification information, and the valid device identification information and standard voiceprint are sent to the server, so that the server stores the valid device identification information Correlation with standard voiceprint.
- the first preprocessing module 340 is also configured to obtain the application startup instruction for starting the first application for the first time; obtain the current device system time corresponding to the application startup instruction, and obtain the current device geographic location information corresponding to the application startup instruction ; Obtain the device universal unique identification code generated by the device where the first application is based on the current device system time; combine the current device system time, current device geographic location information, and the device universal unique identification code to generate the current device identification information corresponding to the first application .
- the first preprocessing module 340 is also used to generate a random prefix and a random suffix, and combine the random prefix, current device identification information, and random suffix in order to generate processing device identification information; encrypt the processing device identification information to obtain encryption Device identification information, storing encrypted device identification information in the target storage space.
- the device further includes:
- the second preprocessing module 350 is used to obtain the current operation instruction type.
- the target storage space stores data in the form of key-value pairs, where the key is the current operation instruction type and the value is the valid device identification information; when the current operation instruction type is stored in the target storage When there is no corresponding valid device identification information in the space, the current operation instruction type and current device identification information are stored in the target storage space in the form of key-value pairs; the target standard voiceprint corresponding to the current operation instruction type is obtained, and the valid device identification is sent The information and target standard voiceprint are sent to the server, so that the server stores the association relationship between the valid device identification information and the target standard voiceprint.
- the processing module 360 is configured to obtain the first operation instruction that acts on the first application, and determine the first operation instruction type corresponding to the first operation instruction; obtain from the target storage space the valid data corresponding to the first application that matches the first operation instruction type.
- Device identification information; the voiceprint verification request includes valid device identification information and the first voiceprint, so that the server obtains the target standard voiceprint matching the first operation instruction type according to the valid device identification information, and verifies the target standard voiceprint and the first voiceprint
- the consistency of the pattern obtains the verification result corresponding to the first operation instruction.
- the verification result includes a plurality of verification results corresponding to different operation instructions
- the execution module 330 is further configured to obtain the operation instruction whose verification result is passed as the target execution operation instruction; execute the operation instruction according to each target and execute the operation on the The target operation of the first application, the target operation includes at least one of a login operation, a payment operation, and an information modification operation.
- Each module in the aforementioned voiceprint data processing device can be implemented in whole or in part by software, hardware, and a combination thereof.
- the above-mentioned modules may be embedded in the form of hardware or independent of the processor in the computer equipment, or may be stored in the memory of the computer equipment in the form of software, so that the processor can call and execute the operations corresponding to the above-mentioned modules.
- a computer device is provided.
- the computer device may be a terminal.
- the internal structure diagram of the computer device may be as shown in FIG. 4.
- the computer device includes a processor, a memory, a network interface, and an input device connected by a system bus. And display.
- the memory includes a non-volatile storage medium and an internal memory.
- the non-volatile storage medium of the computer device stores an operating system, and may also store computer-readable instructions.
- the processor can execute a voiceprint data processing method.
- the internal memory may also store computer-readable instructions, and when the computer-readable instructions are executed by the processor, the processor can execute the data processing method.
- the display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen. It can be an external keyboard, touchpad, or mouse.
- FIG. 4 is only a block diagram of part of the structure related to the solution of the present application, and does not constitute a limitation on the computer device to which the solution of the present application is applied.
- the specific computer device may Including more or fewer parts than shown in the figure, or combining some parts, or having a different arrangement of parts.
- a computer device includes a memory and one or more processors.
- the memory stores computer-readable instructions.
- the one or more processors execute the following steps:
- the valid device identification information is based on the device common to the device where the first application is located.
- the unique identification code and the historical operation information of the first application are generated;
- the voiceprint verification request includes valid device identification information and the first voiceprint, so that the server obtains the standard voiceprint corresponding to the first application according to the valid device identification information, and verifies that the standard voiceprint and the The consistency of the first voiceprint is verified;
- the processor further implements the following steps when executing the computer-readable instructions: acquiring an operating instruction acting on the first application, acquiring current operating information corresponding to the operating instruction; Standard voiceprint corresponding to the application; obtain the device universal unique identification code of the device where the first application is located, and generate the current device identification information corresponding to the first application according to the device universal unique identification code and current operation information; obtain the target storage space corresponding to the first application
- the current device identification information is stored in the target storage space as valid device identification information, and the valid device identification information and standard voiceprint are sent to the server so that The server stores the association relationship between the valid device identification information and the standard voiceprint.
- the acquiring operation instructions acting on the first application acquiring the current operation information corresponding to the operation instructions, acquiring the standard voiceprint corresponding to the first application through the first application, and acquiring the device where the first application is located
- generating the current device identification information corresponding to the first application according to the universal unique identification code of the device and the current operation information includes: obtaining an application startup instruction for starting the first application for the first time; obtaining an application startup instruction corresponding to the application startup instruction
- the current device system time obtain the current device geographic location information corresponding to the application startup instruction; obtain the device universal unique identification code generated by the device where the first application is located according to the current device system time; generalize the current device system time, current device geographic location information and the device
- the unique identification code combination generates current device identification information corresponding to the first application.
- storing the current device identification information as valid device identification information in the target storage space includes: generating a random prefix and a random suffix, and combining the random prefix, current device identification information, and random suffix in order to generate a processing device identification Information; encrypt the processing device identification information to obtain the encrypted device identification information, and store the encrypted device identification information in the target storage space.
- the processor before the processor executes to obtain the first voiceprint collected by the first application, it further includes: obtaining the current operation instruction type, and the target storage space stores data in the form of key-value pairs, where the key is the current operation instruction type, The value is valid device identification information; when the current operation instruction type does not have corresponding valid device identification information in the target storage space, the current operation instruction type and current device identification information are stored in the target storage space in the form of key-value pairs Obtain the target standard voiceprint corresponding to the current operation instruction type, and send the effective device identification information and the target standard voiceprint to the server, so that the server stores the association relationship between the effective device identification information and the target standard voiceprint;
- the processor also implements the following steps when executing the computer-readable instructions: acquiring the first operating instruction acting on the first application, determining the first operating instruction type corresponding to the first operating instruction; acquiring the first operating instruction corresponding to the first application from the target storage space A valid device identification information matching the type of operation instruction; the voiceprint verification request includes valid device identification information and the first voiceprint, so that the server obtains the target standard voiceprint that matches the first operation instruction type according to the valid device identification information, and verifies the target The consistency of the standard voiceprint and the first voiceprint obtains the verification result corresponding to the first operation instruction.
- the verification result includes verification results corresponding to a plurality of different operation instructions
- the receiving the verification result returned by the server, and executing the corresponding operation according to the verification result includes: obtaining the verification result as passed
- the operation instruction is used as a target execution operation instruction; the target operation that acts on the first application is executed according to each target execution operation instruction, and the target operation includes at least one of a login operation, a payment operation, and an information modification operation.
- One or more computer storage media storing computer-readable instructions.
- the one or more processors perform the following steps:
- the valid device identification information is based on the device common to the device where the first application is located.
- the unique identification code and the historical operation information of the first application are generated;
- the voiceprint verification request includes valid device identification information and the first voiceprint, so that the server obtains the standard voiceprint corresponding to the first application according to the valid device identification information, and verifies that the standard voiceprint and the The consistency of the first voiceprint is verified;
- the computer storage medium is a readable storage medium, and the readable storage medium may be non-volatile or volatile.
- the following steps are further implemented: acquiring the operating instructions acting on the first application, acquiring the current operating information corresponding to the operating instructions; 1. Standard voiceprint corresponding to the application; obtain the device universal unique identification code of the device where the first application is located, and generate the current device identification information corresponding to the first application according to the device universal unique identification code and current operation information; obtain the target storage corresponding to the first application
- the current device identification information is stored as valid device identification information in the target storage space, and the valid device identification information and standard voiceprint are sent to the server to The server stores the association relationship between the valid device identification information and the standard voiceprint.
- the acquiring operation instructions acting on the first application acquiring the current operation information corresponding to the operation instructions, acquiring the standard voiceprint corresponding to the first application through the first application, and acquiring the device where the first application is located
- generating the current device identification information corresponding to the first application according to the universal unique identification code of the device and the current operation information includes: obtaining an application startup instruction for starting the first application for the first time; obtaining an application startup instruction corresponding to the application startup instruction
- the current device system time obtain the current device geographic location information corresponding to the application startup instruction; obtain the device universal unique identification code generated by the device where the first application is located according to the current device system time; generalize the current device system time, current device geographic location information and the device
- the unique identification code combination generates current device identification information corresponding to the first application.
- storing the current device identification information as valid device identification information in the target storage space includes: generating a random prefix and a random suffix, and combining the random prefix, current device identification information, and random suffix in order to generate a processing device identification Information; encrypt the processing device identification information to obtain the encrypted device identification information, and store the encrypted device identification information in the target storage space.
- the method before the computer-readable instructions are executed by the processor to achieve the step of obtaining the first voiceprint collected by the first application, the method further includes: obtaining the current operation instruction type, and the target storage space stores the data in the form of key-value pairs, The key is the current operation instruction type, and the value is the effective device identification information; when the current operation instruction type does not have the corresponding effective device identification information in the target storage space, the current operation instruction type and the current device identification information are the key-value pair The form is stored in the target storage space; the target standard voiceprint corresponding to the current operation instruction type is obtained, and the valid device identification information and the target standard voiceprint are sent to the server, so that the server stores the effective device identification information and the target standard voiceprint. connection relation;
- the following steps are also implemented: obtaining the first operation instruction acting on the first application, determining the type of the first operation instruction corresponding to the first operation instruction; obtaining the and corresponding to the first application from the target storage space The valid device identification information matching the first operation instruction type; the voiceprint verification request includes the valid device identification information and the first voiceprint, so that the server obtains the target standard voiceprint that matches the first operation instruction type according to the valid device identification information, and verifies The consistency between the target standard voiceprint and the first voiceprint obtains the verification result corresponding to the first operation instruction.
- the verification result includes verification results corresponding to a plurality of different operation instructions
- the receiving the verification result returned by the server, and executing the corresponding operation according to the verification result includes: obtaining the verification result as passed
- the operation instruction is used as a target execution operation instruction; the target operation that acts on the first application is executed according to each target execution operation instruction, and the target operation includes at least one of a login operation, a payment operation, and an information modification operation.
- Non-volatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
- Volatile memory may include random access memory (RAM) or external cache memory.
- RAM is available in many forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain Channel (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.
Landscapes
- Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Biomedical Technology (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
Abstract
一种声纹数据处理方法、装置、设备和存储介质,涉及大数据,包括:获取第一应用采集的第一声纹,获取所述第一应用对应的目标存储空间,从目标存储空间获取第一应用对应的有效设备标识信息,有效设备标识信息是根据所述第一应用所在设备的设备通用唯一标识码和第一应用的历史操作信息生成的;发送声纹验证请求至服务器,声纹验证请求包括有效设备标识信息和所述第一声纹,以使服务器根据有效设备标识信息获取第一应用对应的标准声纹,验证标准声纹与第一声纹的一致性得到验证结果;接收服务器返回的验证结果,根据验证结果执行对应的操作。
Description
相关申请的交叉引用
本申请要求于2020年02月24日提交中国专利局,申请号为2020101128898,申请名称为“声纹数据处理方法、装置、计算机设备和存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及计算机技术领域,特别是涉及一种声纹数据处理方法、装置、计算机设备和存储介质。
目前,大多数终端设备(如移动手机、平板电脑等)可以采集声纹,不同的应用可采集不同的声纹,采集的声纹可作用不同的功能,如登录验证声纹、支付验证声纹等。
目前iOS设备中比较常用的设备唯一标识符存在获取难度大,不能唯一标识的问题,随着声纹信息的规模增大,发明人意识到,若做不好标识工作,将会带来声纹信息混乱、丢失等可能,所以为特定声纹采集设备做好标识提取以提供声纹与设备的唯一匹配变得愈发重要。
发明内容
根据本申请公开的各种实施例,提供一种声纹数据处理方法。
一种声纹数据处理方法,包括:
获取第一应用采集的第一声纹,获取所述第一应用对应的目标存储空间,从所述目标存储空间获取所述第一应用对应的有效设备标识信息,所述有效设备标识信息是根据所述第一应用所在设备的设备通用唯一标识码和所述第一应用的历史操作信息生成的;
发送声纹验证请求至服务器,所述声纹验证请求包括所述有效设备标识信息和所述第一声纹,以使所述服务器根据所述有效设备标识信息获取所述第一应用对应的标准声纹,验证所述标准声纹与所述第一声纹的一致性得到验证结果;及
接收所述服务器返回的所述验证结果,根据所述验证结果执行对应的操作。
一种声纹数据处理装置,包括:
获取模块,用于获取第一应用采集的第一声纹,获取所述第一应用对应的目标存储空间,从所述目标存储空间获取所述第一应用对应的有效设备标识信息,所述有效设备标识信息是根据所述第一应用所在设备的设备通用唯一标识码和所述第一应用的历史操作信息生成的;
发送模块,用于发送声纹验证请求至服务器,所述声纹验证请求包括所述有效设备标识信息和所述第一声纹,以使所述服务器根据所述有效设备标识信息获取所述第一应用对应的标准声纹,验证所述标准声纹与所述第一声纹的一致性得到验证结果;及
执行模块,用于接收所述服务器返回的所述验证结果,根据所述验证结果执行对应的操作。
一种计算机设备,包括存储器和一个或多个处理器,所述存储器中储存有计算机可读指令,所述计算机可读指令被所述处理器执行时,使得所述一个或多个处理器执行以下步骤计算机可读指令计算机可读指令:
获取第一应用采集的第一声纹,获取所述第一应用对应的目标存储空间,从所述目标存储空间获取所述第一应用对应的有效设备标识信息,所述有效设备标识信息是根据所述第一应用所在设备的设备通用唯一标识码和所述第一应用的历史操作信息生成的;
发送声纹验证请求至服务器,所述声纹验证请求包括所述有效设备标识信息和所述第一声纹,以使所述服务器根据所述有效设备标识信息获取所述第一应用对应的标准声纹,验证所述标准声纹与所述第一声纹的一致性得到验证结果;及
接收所述服务器返回的所述验证结果,根据所述验证结果执行对应的操作。
一个或多个存储有计算机可读指令的计算机存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤:计算机可读指令计算机可读指令:
获取第一应用采集的第一声纹,获取所述第一应用对应的目标存储空间,从所述目标存储空间获取所述第一应用对应的有效设备标识信息,所述有效设备标识信息是根据所述第一应用所在设备的设备通用唯一标识码和所述第一应用的历史操作信息生成的;
发送声纹验证请求至服务器,所述声纹验证请求包括所述有效设备标识信息和所述第一声纹,以使所述服务器根据所述有效设备标识信息获取所述第一应用对应的标准声纹,验证所述标准声纹与所述第一声纹的一致性得到验证结果;及
接收所述服务器返回的所述验证结果,根据所述验证结果执行对应的操作。
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其它特征和优点将从说明书、附图以及权利要求书变得明显。
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。
图1为根据一个或多个实施例中声纹数据处理方法的应用环境图;
图2为根据一个或多个实施例中声纹数据处理方法的流程示意图;
图3为根据一个或多个实施例中声纹数据处理装置的结构框图;
图4为根据一个或多个实施例中计算机设备的内部结构图。
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
本申请提供的声纹数据处理方法,可以应用于如图1所示的应用环境中。图1为一个实施例中声纹数据处理方法运行的应用环境图。如图1所示,该应用环境包括终端110、服务器120。终端、服务器之间通过网络进行通信,通信网络可以是无线或者有线通信网络,例如IP网络、蜂窝移动通信网络等,终端和服务器的个数不限。
终端110可以但不限于是各种个人计算机、笔记本电脑、智能手机、平板电脑和便携式可穿戴设备。服务器可以用独立的服务器或者是多个服务器组成的服务器集群来实现。终端110获取第一应用采集的第一声纹,获取第一应用对应的目标存储空间,从目标存储空间获取第一应用对应的有效设备标识信息,有效设备标识信息是根据第一应用所在设备的设备通用唯一标识码和第一应用的历史操作信息生成的,发送声纹验证请求至服务器120,声纹验证请求包括有效设备标识信息和第一声纹,以使服务器根据有效设备标识信息获取第一应用对应的标准声纹,验证标准声纹与第一声纹的一致性得到验证结果;接收服务器120返回的验证结果,根据验证结果执行对应的操作。
在一些实施例中,如图2所示,提供了一种声纹数据处理方法,以该方法应用于图1中的终端110为例进行说明,包括以下步骤:
步骤210,获取第一应用采集的第一声纹,获取第一应用对应的目标存储空间,从目标存储空间获取第一应用对应的有效设备标识信息,有效设备标识信息是根据第一应用所在设备的设备通用唯一标识码和第一应用的历史操作信息生成的。
第一应用可以是设备上系统自带的应用,也可以是通过下载安装的应用,第一应用的类型不限,可以是登录应用、支付应用、社交应用、游戏应用等。第一应用可以是主应用内的一个或多个子应用,各个子应用依附于主应用运行,通过主应用的页面进入子应用。
具体地,各个应用都存在对应的存储空间,这个存储空间在应用卸载后仍然存在,如果卸载后再次安装,则此存储空间之前存储的此应用的应用数据仍然可以使用。目标存储空间中的数据可以以键值对key-value的形式进行存储。在一些实施例中,key是编辑的一个唯一的名字,例如:key=voice:print:username,value是应用对应的有效设备标识信息。在一些实施例中,通过iOS操作系统中的keyChain进行存储,keyChain为一个存储空间,其中数据以“key-value”形式进行存储,可以对其中数据进行增、删、改、查四种操作。
声纹是指语音信号的声波频谱,声纹具有特定性和稳定性,通过声纹识别,可以进行检测用户身份。可以将采集的声音数据通过声纹特征提取模型,提取得到声纹特征,从而根据声纹特征得到第一声纹。声纹特征可以包括:声学特征、词法特征、韵律特征、语种、方言和口音信息、通道信息等。
设备通用唯一标识码是由设备自带的系统每次调用应用时生成,如ios系统生成的UUID,系统本身不进行存储,所以通过应用对应的目标存储空间进行存储。设备通用唯一标识码可以保证分布式系统中所有元素都具有唯一的辨识信息,但可能存在2个相同的设备通用唯一标识码。有效设备标识信息的值是唯一的,由于有效设备标识信息通过设备通用唯一标识码和第一应用的历史操作信息生成进一步保证了唯一性。历史操作信息包括时间操作信息、空间操作信息、设备空间状态中的至少一种信息。时间操作信息包括当前操作时间,可以将系统时间转换为时间戳Timestamp,空间操作信息包括地理位置信息,可以通过“世界各国和地区名称代码”和“全国地区代码表”将地理位置信息转换为地区编码Location。设备空间状态可以是设备的当前空间位置,包括倾斜角度,运动速度,可通过陀螺仪采集得到。历史操作信息还可以包括操作对象信息,如可以是应用标识、操作应用的用户标识等。可以将多种不同类型历史操作信息和设备通用唯一标识码组合用于生成有效设备标识信息。
各个不同的应用即使属于同一个设备,但由于历史操作信息不同,且设备通用唯一标识码的生成时间不同,具有不同的唯一的有效设备标识信息。
步骤220,发送声纹验证请求至服务器,声纹验证请求包括有效设备标识信息和所述第一声纹,以使服务器根据有效设备标识信息获取第一应用对应的标准声纹,验证标准声纹与第一声纹的一致性得到验证结果。
具体地,声纹验证请求用于验证当前采集的声纹与历史绑定的声纹是否一致,如果一致则说明用户身份通过验证,可以对第一应用执行对应的操作。如果验证不通过,则说明用户身份验证失败,不存在对第一应用的操作权限。为了获取与此设备此应用对应的标准声纹,需要发送此设备此应用对应的有效设备标识信息至服务器以获取对应的标准声纹。由于有效设备标识信息是唯一的,所以可唯一确定对应的标准声纹,有效避免多个不同的设备不同的应用存在相同的设备标识信息获取到错误的标准声纹,导致验证结果不准确的问题,且由于有效设备标识信息的唯一性,服务器只需要存储有效设备标识信息与标准声纹的关联关系,便可对不同的设备进行区分,对不同设备上的相同应用也能进行区分,对相同设备上不同的应用也能进行区分,提高了声纹验证的准确性,保证了声纹信息管理的有效性。
步骤230,接收所服务器返回的验证结果,根据验证结果执行对应的操作。
具体地,如果验证成功,则可对第一应用执行对应的操作。当需要对应用的不同页面不同功能进行操作时,可一次性发送一个或多个声纹验证请求至服务器,如果多个不同的应用操作指令验证时采用同一声纹,则声纹验证请求只需包括同一个采集声纹,如果不同的应用操作指令验证时采用不同的声纹,则声纹验证请求可包括多个第一声纹,与各个应用操作指令相对应,得到多个与应用操作指令对应的不同验证结果,只有验证结果为验证通过的操作指令的操作才能执行。在这种情况下,需要保证同一个设备每个不同的操作指令都存在相应的标准声纹。
上述声纹数据处理方法中,通过从目标存储空间中获取第一应用对应的有效设备标识信息,有效设备标识信息是第一应用所在设备的设备通用唯一标识码和针对第一应用的历史操作信息生成,从服务器根据有效设备标识信息获取对应的标准声纹,由于有效设备标识信息针对不同的设备不同的应用是唯一的,从而保证了标准声纹在不同设备上获取的准确性,验证标准声纹与第一声纹的一致性得到验证结果,从而提高了声纹验证的准确性,保证了根据声纹验证结果执行对应的操作的操作权限的准确性。
在一些实施例中,声纹数据处理方法还包括:获取作用于第一应用的操作指令,获取操作指令对应的当前操作信息,通过第一应用采集与第一应用对应的标准声纹,获取第一应用所在设备的设备通用唯一标识码,根据设备通用唯一标识码和当前操作信息生成第一应用对应的当前设备标识信息,获取第一应用对应的目标存储空间,当目标存储空间不存在第一应用对应的有效设备标识信息时,将当前设备标识信息作为有效设备标识信息存储至目标存储空间,发送有效设备标识信息、标准声纹至服务器,以使服务器存储有效设备标识信息和标准声纹的关联关系。
其中,操作指令用于对第一应用执行对应的操作,可以为安装操作指令、启动操作指令、登录操作指令、加好友操作指令、支付操作指令等。可以理解的是,操作指令可以为一种或多种,但只要目标存储空间己经存在有效设备标识信息了,则后续再获取操作指令也无需再次生成当前设备标识信息了,同一个设备同一个应用的各种需要验证声纹的操作都共享同一个标准声纹。
具体地,标准声纹可以是设备所有者的用户的声纹,只有与标准声纹匹配的用户才具有对设备上的应用操作的权限。由于即使同一个设备不同的应用生成的有效设备标识信息也不同,则可针对不同的应用设置不同的标准声纹。将生成的各个应用对应的有效设备标识信息存储至各个应用对应的私有存储空间,从而保证各个应用对应的有效设备标识信息后续获取的便利性与准确性,且通过在服务器预先存储所述有效设备标识信息和标准声纹的关联关系便于后续进行声纹验证。
在一些实施例中,获取作用于第一应用的操作指令,获取操作指令对应的当前操作信息,通过第一应用采集与第一应用对应的标准声纹,获取第一应用所在设备的设备通用唯一标识码,根据所述设备通用唯一标识码和所述当前操作信息生成所述第一应用对应的当前设备标识信息包括:获取首次启动第一应用的应用启动指令;获取应用启动指令对应的当前设备系统时间,获取应用启动指令对应的当前设备地理位置信息,获取第一应用所在设备根据当前设备系统时间生成的设备通用唯一标识码;将当前设备系统时间、当前设备地理位置信息和设备通用唯一标识码组合生成第一应用对应的当前设备标识信息。
具体地,第一应用作为当前声纹识别的应用在当前设备上第一次启动时同时获得系统生成的设备通用唯一标识码UUID和设备的系统时间及所处地理位置,可将系统时间转换为时间戳Timestamp,并通过“世界各国和地区名称代码”和“全国地区代码表”将地理位置转换为地区编码Location。最终使用“UUID+Timestamp+Location”结合生成的字 符串作为设备的当前设备标识信息,后面再在这个设备上启动这个应用就不需要再重新生成了。
在一些实施例中,将当前设备标识信息作为有效设备标识信息存储至目标存储空间包括:生成随机前缀和随机后缀,将随机前缀、当前设备标识信息、随机后缀按顺序组合生成处理设备标识信息。将处理设备标识信息加密得到加密设备标识信息,将加密设备标识信息存储至目标存储空间。
具体地,通过上述方法生成的当前设备标识信息,经过组合降低了标识的可识别性,但对当前设备标识信息的加密也极为重要。使用生成随机数字方法为当前设备标识信息增加随机前缀和随机后缀得到处理设备标识信息,再采取加密算法,如base62进行编码得到加密设备标识信息,可以大大增加标识码的安全性,保证不会轻易被攻击者破解。在一些实施例中,在第一应用第一次启动时,将组合加密生成的标识码存储进keyChain中,以此作为设备对应于第一应用的唯一标识,同时将该值传回给服务器端与标准声纹进行存储。之后要进行设备标识匹配时,只需检查设备的keyChain中是否有存储数值,若已存储则直接取出值进行匹配工作,获取对应的标准声纹,若没有存储则代表匹配失败并将此次生成的值进行存储。
在一些实施例中,步骤210之前还包括:获取当前操作指令类型,目标存储空间以键值对的形式存储数据,其中键为当前操作指令类型,值为有效设备标识信息,当当前操作指令类型在目标存储空间中不存在对应的有效设备标识信息时,将当前操作指令类型和所述当前设备标识信息以键值对的形式存储至目标存储空间,获取当前操作指令类型对应的目标标准声纹,发送有效设备标识信息、目标标准声纹至服务器,以使服务器存储有效设备标识信息、目标标准声纹的关联关系。方法还包括:获取作用于第一应用的第一操作指令,确定所述第一操作指令对应的第一操作指令类型;从目标存储空间获取第一应用对应的与第一操作指令类型匹配的有效设备标识信息。声纹验证请求包括有效设备标识信息和第一声纹,以使服务器根据有效设备标识信息获取与第一操作指令类型匹配的目标标准声纹,验证目标标准声纹与所述第一声纹的一致性得到第一操作指令对应的验证结果。
具体地,可以根据操作指令的功能,将相同功能的操作指令作为同一类型的操作指令,如支付类型操作指令、登录类型操作指令、加好友类型操作指令,不同类型的操作指令具有不同级别的优先级与安全性,可以由不同级别身份的用户的声纹进行验证。如支付类型要求更高级别的优先级,则由身份级别高的用户的声纹进行验证。将当前操作指令类型和当前设备标识信息以键值对的形式存储至目标存储空间,从而可以根据不同的操作指令类型,获取对应的不同的有效设备标识信息,同一应用不同类型的操作指令对应不同的有效设备标识信息,从而可以通过有效设备标识信息从服务器获取目标应用对应的目标操作指令类型所对应的标准声纹,使得同一应用不同类型的操作指令具有不同的标准声纹,通过不同的用户身份进行验证。由于有效设备标识信息生成的唯一性,保证了标准声纹获取的准确性。
在一些实施例中,验证结果包括多个不同操作指令对应的验证结果,步骤230包括:获取验证结果为通过的操作指令作为目标执行操作指令,根据各个目标执行操作指令执行作用于第一应用的目标操作,目标操作包括登录操作、支付操作、信息修改操作中的至少一种。
具体地,由于不同类型的指令可以通过不同身份的用户进行验证,从而也可能对应不同的验证结果,只有验证结果为通过的操作指令才能执行对应的操作,且一次性可并行验证多个操作指令的操作权限,通过携带与操作指令对应的声纹的声纹验证请求进行并行验证,提高了声纹验证的效率和权限分发的便利性。
应该理解的是,虽然图2的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,图2中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些子步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。
在一些实施例中,如图3所示,提供了一种声纹数据处理装置,包括:获取模块310、发送模块320、执行模块330,其中:
获取模块310,用于获取第一应用采集的第一声纹,获取所述第一应用对应的目标存储空间,从所述目标存储空间获取所述第一应用对应的有效设备标识信息,所述有效设备标识信息是根据所述第一应用所在设备的设备通用唯一标识码和所述第一应用的历史操作信息生成的。
发送模块320,用于发送声纹验证请求至服务器,所述声纹验证请求包括所述有效设备标识信息和所述第一声纹,以使所述服务器根据所述有效设备标识信息获取所述第一应用对应的标准声纹,验证所述标准声纹与所述第一声纹的一致性得到验证结果。
执行模块330,用于接收所述服务器返回的所述验证结果,根据所述验证结果执行对应的操作。
在一些实施例中,装置还包括:
第一预处理模块340,用于获取作用于第一应用的操作指令,获取操作指令对应的当前操作信息;通过第一应用采集与所述第一应用对应的标准声纹;获取第一应用所在设备的设备通用唯一标识码,根据设备通用唯一标识码和所述当前操作信息生成所述第一应用对应的当前设备标识信息;获取第一应用对应的目标存储空间,当目标存储空间不存在所述第一应用对应的有效设备标识信息时,将所述当前设备标识信息作为有效设备标识信息存储至目标存储空间,发送有效设备标识信息、标准声纹至服务器,以使服务器存储有效 设备标识信息和标准声纹的关联关系。
在一些实施例中,第一预处理模块340还用于获取首次启动第一应用的应用启动指令;获取所述应用启动指令对应的当前设备系统时间,获取应用启动指令对应的当前设备地理位置信息;获取第一应用所在设备根据当前设备系统时间生成的设备通用唯一标识码;将当前设备系统时间、当前设备地理位置信息和所述设备通用唯一标识码组合生成第一应用对应的当前设备标识信息。
在一些实施例中,第一预处理模块340还用于生成随机前缀和随机后缀,将随机前缀、当前设备标识信息、随机后缀按顺序组合生成处理设备标识信息;将处理设备标识信息加密得到加密设备标识信息,将加密设备标识信息存储至目标存储空间。
在一些实施例中,装置还包括:
第二预处理模块350,用于获取当前操作指令类型,目标存储空间以键值对的形式存储数据,其中键为当前操作指令类型,值为有效设备标识信息;当当前操作指令类型在目标存储空间中不存在对应的有效设备标识信息时,将当前操作指令类型和当前设备标识信息以键值对的形式存储至目标存储空间;获取当前操作指令类型对应的目标标准声纹,发送有效设备标识信息、目标标准声纹至服务器,以使服务器存储有效设备标识信息、目标标准声纹的关联关系。
处理模块360,用于获取作用于第一应用的第一操作指令,确定第一操作指令对应的第一操作指令类型;从目标存储空间获取第一应用对应的与第一操作指令类型匹配的有效设备标识信息;声纹验证请求包括有效设备标识信息和第一声纹,以使服务器根据有效设备标识信息获取与第一操作指令类型匹配的目标标准声纹,验证目标标准声纹与第一声纹的一致性得到第一操作指令对应的验证结果。
在一些实施例中,验证结果包括多个不同操作指令对应的验证结果,执行模块330还用于获取验证结果为通过的操作指令作为目标执行操作指令;根据各个目标执行操作指令执行作用于所述第一应用的目标操作,目标操作包括登录操作、支付操作、信息修改操作中的至少一种。
关于声纹数据处理装置的具体限定可以参见上文中对于声纹数据处理方法的限定,在此不再赘述。上述声纹数据处理装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。
在一些实施例中,提供了一种计算机设备,该计算机设备可以是终端,其内部结构图可以如图4所示,该计算机设备包括通过系统总线连接的处理器、存储器、网络接口、输入装置和显示屏。其中,存储器包括非易失性存储介质和内存储器。该计算机设备的非易失性存储介质存储有操作系统,还可存储有计算机可读指令,该计算机可读指令被处理 器执行时,可使得处理器执行一种声纹数据处理方法。该内存储器中也可储存有计算机可读指令,该计算机可读指令被处理器执行时,可使得处理器执行数据处理方法。计算机设备的显示屏可以是液晶显示屏或者电子墨水显示屏,计算机设备的输入装置可以是显示屏上覆盖的触摸层,也可以是计算机设备外壳上设置的按键、轨迹球或触控板,还可以是外接的键盘、触控板或鼠标等。
本领域技术人员可以理解,图4中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
一种计算机设备,包括存储器和一个或多个处理器,存储器中储存有计算机可读指令,计算机可读指令被处理器执行时,使得一个或多个处理器执行以下步骤:
获取第一应用采集的第一声纹,获取第一应用对应的目标存储空间,从目标存储空间获取第一应用对应的有效设备标识信息,有效设备标识信息是根据第一应用所在设备的设备通用唯一标识码和第一应用的历史操作信息生成的;
发送声纹验证请求至服务器,声纹验证请求包括有效设备标识信息和第一声纹,以使服务器根据有效设备标识信息获取所述第一应用对应的标准声纹,验证标准声纹与所述第一声纹的一致性得到验证结果;及
接收服务器返回的验证结果,根据验证结果执行对应的操作。
在一些实施例中,处理器执行计算机可读指令时还实现以下步骤:获取作用于所述第一应用的操作指令,获取操作指令对应的当前操作信息;通过第一应用采集与所述第一应用对应的标准声纹;获取第一应用所在设备的设备通用唯一标识码,根据设备通用唯一标识码和当前操作信息生成第一应用对应的当前设备标识信息;获取第一应用对应的目标存储空间,当目标存储空间不存在第一应用对应的有效设备标识信息时,将当前设备标识信息作为有效设备标识信息存储至所述目标存储空间,发送有效设备标识信息、标准声纹至服务器,以使服务器存储有效设备标识信息和标准声纹的关联关系。
在一些实施例中,所述获取作用于所述第一应用的操作指令,获取操作指令对应的当前操作信息,通过第一应用采集与第一应用对应的标准声纹,获取第一应用所在设备的设备通用唯一标识码,根据设备通用唯一标识码和所述当前操作信息生成所述第一应用对应的当前设备标识信息包括:获取首次启动第一应用的应用启动指令;获取应用启动指令对应的当前设备系统时间,获取应用启动指令对应的当前设备地理位置信息;获取第一应用所在设备根据当前设备系统时间生成的设备通用唯一标识码;将当前设备系统时间、当前设备地理位置信息和设备通用唯一标识码组合生成第一应用对应的当前设备标识信息。
在一些实施例中,将当前设备标识信息作为有效设备标识信息存储至目标存储空间包括:生成随机前缀和随机后缀,将所述随机前缀、当前设备标识信息、随机后缀按顺序组合生成处理设备标识信息;将处理设备标识信息加密得到加密设备标识信息,将加密设 备标识信息存储至目标存储空间。
在一些实施例中,处理器执行获取第一应用采集的第一声纹之前,还包括:获取当前操作指令类型,目标存储空间以键值对的形式存储数据,其中键为当前操作指令类型,值为有效设备标识信息;当当前操作指令类型在目标存储空间中不存在对应的有效设备标识信息时,将当前操作指令类型和当前设备标识信息以键值对的形式存储至所述目标存储空间;获取当前操作指令类型对应的目标标准声纹,发送有效设备标识信息、目标标准声纹至服务器,以使服务器存储所述有效设备标识信息、目标标准声纹的关联关系;
处理器执行计算机可读指令时还实现以下步骤:获取作用于第一应用的第一操作指令,确定第一操作指令对应的第一操作指令类型;从目标存储空间获取第一应用对应的与第一操作指令类型匹配的有效设备标识信息;声纹验证请求包括有效设备标识信息和第一声纹,以使服务器根据有效设备标识信息获取与第一操作指令类型匹配的目标标准声纹,验证目标标准声纹与第一声纹的一致性得到第一操作指令对应的验证结果。
在一些实施例中,验证结果包括多个不同操作指令对应的验证结果,所述接收所述服务器返回的所述验证结果,根据所述验证结果执行对应的操作,包括:获取验证结果为通过的操作指令作为目标执行操作指令;根据各个目标执行操作指令执行作用于所述第一应用的目标操作,所述目标操作包括登录操作、支付操作、信息修改操作中的至少一种。
一个或多个存储有计算机可读指令的计算机存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤:
获取第一应用采集的第一声纹,获取第一应用对应的目标存储空间,从目标存储空间获取第一应用对应的有效设备标识信息,有效设备标识信息是根据第一应用所在设备的设备通用唯一标识码和第一应用的历史操作信息生成的;
发送声纹验证请求至服务器,声纹验证请求包括有效设备标识信息和第一声纹,以使服务器根据有效设备标识信息获取所述第一应用对应的标准声纹,验证标准声纹与所述第一声纹的一致性得到验证结果;及
接收服务器返回的验证结果,根据验证结果执行对应的操作。
其中,该计算机存储介质为可读存储介质,可读存储介质可以是非易失性,也可以是易失性的。
在一些实施例中,计算机可读指令被处理器执行时还实现以下步骤:获取作用于所述第一应用的操作指令,获取操作指令对应的当前操作信息;通过第一应用采集与所述第一应用对应的标准声纹;获取第一应用所在设备的设备通用唯一标识码,根据设备通用唯一标识码和当前操作信息生成第一应用对应的当前设备标识信息;获取第一应用对应的目标存储空间,当目标存储空间不存在第一应用对应的有效设备标识信息时,将当前设备标识信息作为有效设备标识信息存储至所述目标存储空间,发送有效设备标识信息、标准声纹至服务器,以使服务器存储有效设备标识信息和标准声纹的关联关系。
在一些实施例中,所述获取作用于所述第一应用的操作指令,获取操作指令对应的 当前操作信息,通过第一应用采集与第一应用对应的标准声纹,获取第一应用所在设备的设备通用唯一标识码,根据设备通用唯一标识码和所述当前操作信息生成所述第一应用对应的当前设备标识信息包括:获取首次启动第一应用的应用启动指令;获取应用启动指令对应的当前设备系统时间,获取应用启动指令对应的当前设备地理位置信息;获取第一应用所在设备根据当前设备系统时间生成的设备通用唯一标识码;将当前设备系统时间、当前设备地理位置信息和设备通用唯一标识码组合生成第一应用对应的当前设备标识信息。
在一些实施例中,将当前设备标识信息作为有效设备标识信息存储至目标存储空间包括:生成随机前缀和随机后缀,将所述随机前缀、当前设备标识信息、随机后缀按顺序组合生成处理设备标识信息;将处理设备标识信息加密得到加密设备标识信息,将加密设备标识信息存储至目标存储空间。
在一些实施例中,计算机可读指令被处理器执行实现获取第一应用采集的第一声纹的步骤之前,还包括:获取当前操作指令类型,目标存储空间以键值对的形式存储数据,其中键为当前操作指令类型,值为有效设备标识信息;当当前操作指令类型在目标存储空间中不存在对应的有效设备标识信息时,将当前操作指令类型和当前设备标识信息以键值对的形式存储至所述目标存储空间;获取当前操作指令类型对应的目标标准声纹,发送有效设备标识信息、目标标准声纹至服务器,以使服务器存储所述有效设备标识信息、目标标准声纹的关联关系;
计算机可读指令被处理器执行时还实现以下步骤:获取作用于第一应用的第一操作指令,确定第一操作指令对应的第一操作指令类型;从目标存储空间获取第一应用对应的与第一操作指令类型匹配的有效设备标识信息;声纹验证请求包括有效设备标识信息和第一声纹,以使服务器根据有效设备标识信息获取与第一操作指令类型匹配的目标标准声纹,验证目标标准声纹与第一声纹的一致性得到第一操作指令对应的验证结果。
在一些实施例中,验证结果包括多个不同操作指令对应的验证结果,所述接收所述服务器返回的所述验证结果,根据所述验证结果执行对应的操作,包括:获取验证结果为通过的操作指令作为目标执行操作指令;根据各个目标执行操作指令执行作用于所述第一应用的目标操作,所述目标操作包括登录操作、支付操作、信息修改操作中的至少一种。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一非易失性计算机可读取存储介质中,该计算机可读指令在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM (DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。
以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。
Claims (20)
- 一种声纹数据处理方法,包括:获取第一应用采集的第一声纹,获取所述第一应用对应的目标存储空间,从所述目标存储空间获取所述第一应用对应的有效设备标识信息,所述有效设备标识信息是根据所述第一应用所在设备的设备通用唯一标识码和所述第一应用的历史操作信息生成的;发送声纹验证请求至服务器,所述声纹验证请求包括所述有效设备标识信息和所述第一声纹,以使所述服务器根据所述有效设备标识信息获取所述第一应用对应的标准声纹,验证所述标准声纹与所述第一声纹的一致性得到验证结果;及接收所述服务器返回的所述验证结果,根据所述验证结果执行对应的操作。
- 根据权利要求1所述的方法,其中,方法还包括:获取作用于所述第一应用的操作指令,获取所述操作指令对应的当前操作信息;通过所述第一应用采集与所述第一应用对应的标准声纹;获取所述第一应用所在设备的设备通用唯一标识码,根据所述设备通用唯一标识码和所述当前操作信息生成所述第一应用对应的当前设备标识信息;及获取所述第一应用对应的目标存储空间,当所述目标存储空间不存在所述第一应用对应的有效设备标识信息时,将所述当前设备标识信息作为有效设备标识信息存储至所述目标存储空间,发送所述有效设备标识信息、标准声纹至服务器,以使所述服务器存储所述有效设备标识信息和所述标准声纹的关联关系。
- 根据权利要求2所述的方法,其中,所述获取作用于所述第一应用的操作指令,获取所述操作指令对应的当前操作信息,通过所述第一应用采集与所述第一应用对应的标准声纹,获取所述第一应用所在设备的设备通用唯一标识码,根据所述设备通用唯一标识码和所述当前操作信息生成所述第一应用对应的当前设备标识信息包括:获取首次启动所述第一应用的应用启动指令;获取所述应用启动指令对应的当前设备系统时间,获取所述应用启动指令对应的当前设备地理位置信息;获取所述第一应用所在设备根据所述当前设备系统时间生成的设备通用唯一标识码;及将所述当前设备系统时间、当前设备地理位置信息和所述设备通用唯一标识码组合生成所述第一应用对应的所述当前设备标识信息。
- 根据权利要求2所述的方法,其中,所述将所述当前设备标识信息作为有效设备标识信息存储至所述目标存储空间包括:生成随机前缀和随机后缀,将所述随机前缀、当前设备标识信息、随机后缀按顺序组合生成处理设备标识信息;将所述处理设备标识信息加密得到加密设备标识信息,将所述加密设备标识信息存储至所述目标存储空间。
- 根据权利要求1所述的方法,其中,所述获取第一应用采集的第一声纹之前,还包括:获取当前操作指令类型,所述目标存储空间以键值对的形式存储数据,其中键为当前操作指令类型,值为有效设备标识信息;当所述当前操作指令类型在所述目标存储空间中不存在对应的有效设备标识信息时,将所述当前操作指令类型和所述当前设备标识信息以键值对的形式存储至所述目标存储空间;及获取所述当前操作指令类型对应的目标标准声纹,发送所述有效设备标识信息、目标标准声纹至服务器,以使所述服务器存储所述有效设备标识信息、目标标准声纹的关联关系;所述方法还包括:获取作用于第一应用的第一操作指令,确定所述第一操作指令对应的第一操作指令类型;从所述目标存储空间获取所述第一应用对应的与所述第一操作指令类型匹配的有效设备标识信息;及所述声纹验证请求包括所述有效设备标识信息和所述第一声纹,以使所述服务器根据所述有效设备标识信息获取与所述第一操作指令类型匹配的目标标准声纹,验证所述目标标准声纹与所述第一声纹的一致性得到所述第一操作指令对应的验证结果。
- 根据权利要求1所述的方法,其中,所述验证结果包括多个不同操作指令对应的验证结果,所述接收所述服务器返回的所述验证结果,根据所述验证结果执行对应的操作,包括:获取验证结果为通过的操作指令作为目标执行操作指令;根据各个目标执行操作指令执行作用于所述第一应用的目标操作,所述目标操作包括登录操作、支付操作、信息修改操作中的至少一种。
- 一种声纹数据处理装置,其中,所述装置包括:获取模块,用于获取第一应用采集的第一声纹,获取所述第一应用对应的目标存储空间,从所述目标存储空间获取所述第一应用对应的有效设备标识信息,所述有效设备标识信息是根据所述第一应用所在设备的设备通用唯一标识码和所述第一应用的历史操作信息生成的;发送模块,用于发送声纹验证请求至服务器,所述声纹验证请求包括所述有效设备标识信息和所述第一声纹,以使所述服务器根据所述有效设备标识信息获取所述第一应用对应的标准声纹,验证所述标准声纹与所述第一声纹的一致性得到验证结果;及执行模块,用于接收所述服务器返回的所述验证结果,根据所述验证结果执行对应的操作。
- 根据权利要求7所述的装置,其中,所述装置还包括:预处理模块,用于获取作用于所述第一应用的操作指令,获取所述操作指令对应的当前操作信息;通过所述第一应用采集与所述第一应用对应的标准声纹;获取所述第一应用所在设备的设备通用唯一标识码,根据所述设备通用唯一标识码和所述当前操作信息生成所述第一应用对应的当前设备标识信息;获取所述第一应用对应的目标存储空间,当所述目标存储空间不存在所述第一应用对应的有效设备标识信息时,将所述当前设备标识信息作为有效设备标识信息存储至所述目标存储空间,发送所述有效设备标识信息、标准声纹至服务器,以使所述服务器存储所述有效设备标识信息和所述标准声纹的关联关系。
- 一种计算机设备,包括存储器及一个或多个处理器,所述存储器中储存有计算机可读指令,所述计算机可读指令被所述一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:获取第一应用采集的第一声纹,获取所述第一应用对应的目标存储空间,从所述目标存储空间获取所述第一应用对应的有效设备标识信息,所述有效设备标识信息是根据所述第一应用所在设备的设备通用唯一标识码和所述第一应用的历史操作信息生成的;发送声纹验证请求至服务器,所述声纹验证请求包括所述有效设备标识信息和所述第一声纹,以使所述服务器根据所述有效设备标识信息获取所述第一应用对应的标准声纹,验证所述标准声纹与所述第一声纹的一致性得到验证结果;及接收所述服务器返回的所述验证结果,根据所述验证结果执行对应的操作。
- 根据权利要求9所述的计算机设备,其中,所述处理器执行所述计算机可读指令时还执行以下步骤:获取作用于所述第一应用的操作指令,获取所述操作指令对应的当前操作信息;通过所述第一应用采集与所述第一应用对应的标准声纹;获取所述第一应用所在设备的设备通用唯一标识码,根据所述设备通用唯一标识码和所述当前操作信息生成所述第一应用对应的当前设备标识信息;及获取所述第一应用对应的目标存储空间,当所述目标存储空间不存在所述第一应用对应的有效设备标识信息时,将所述当前设备标识信息作为有效设备标识信息存储至所述目标存储空间,发送所述有效设备标识信息、标准声纹至服务器,以使所述服务器存储所述有效设备标识信息和所述标准声纹的关联关系。
- 根据权利要求10所述的计算机设备,其中,所述获取作用于所述第一应用的操作指令,获取所述操作指令对应的当前操作信息,通过所述第一应用采集与所述第一应用对应的标准声纹,获取所述第一应用所在设备的设备通用唯一标识码,根据所述设备通用唯一标识码和所述当前操作信息生成所述第一应用对应的当前设备标识信息包括:获取首次启动所述第一应用的应用启动指令;获取所述应用启动指令对应的当前设备系统时间,获取所述应用启动指令对应的当前设备地理位置信息;获取所述第一应用所在设备根据所述当前设备系统时间生成的设备通用唯一标识码; 及将所述当前设备系统时间、当前设备地理位置信息和所述设备通用唯一标识码组合生成所述第一应用对应的所述当前设备标识信息。
- 根据权利要求10所述的计算机设备,其中,所述将所述当前设备标识信息作为有效设备标识信息存储至所述目标存储空间包括:生成随机前缀和随机后缀,将所述随机前缀、当前设备标识信息、随机后缀按顺序组合生成处理设备标识信息;将所述处理设备标识信息加密得到加密设备标识信息,将所述加密设备标识信息存储至所述目标存储空间。
- 根据权利要求9所述的计算机设备,其中,所述获取第一应用采集的第一声纹之前,还包括:获取当前操作指令类型,所述目标存储空间以键值对的形式存储数据,其中键为当前操作指令类型,值为有效设备标识信息;当所述当前操作指令类型在所述目标存储空间中不存在对应的有效设备标识信息时,将所述当前操作指令类型和所述当前设备标识信息以键值对的形式存储至所述目标存储空间;及获取所述当前操作指令类型对应的目标标准声纹,发送所述有效设备标识信息、目标标准声纹至服务器,以使所述服务器存储所述有效设备标识信息、目标标准声纹的关联关系;所述处理器执行所述计算机可读指令时还执行以下步骤:获取作用于第一应用的第一操作指令,确定所述第一操作指令对应的第一操作指令类型;从所述目标存储空间获取所述第一应用对应的与所述第一操作指令类型匹配的有效设备标识信息;及所述声纹验证请求包括所述有效设备标识信息和所述第一声纹,以使所述服务器根据所述有效设备标识信息获取与所述第一操作指令类型匹配的目标标准声纹,验证所述目标标准声纹与所述第一声纹的一致性得到所述第一操作指令对应的验证结果。
- 根据权利要求9所述的计算机设备,其中,所述验证结果包括多个不同操作指令对应的验证结果,所述接收所述服务器返回的所述验证结果,根据所述验证结果执行对应的操作,包括:获取验证结果为通过的操作指令作为目标执行操作指令;根据各个目标执行操作指令执行作用于所述第一应用的目标操作,所述目标操作包括登录操作、支付操作、信息修改操作中的至少一种。
- 一个或多个存储有计算机可读指令的计算机存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:获取第一应用采集的第一声纹,获取所述第一应用对应的目标存储空间,从所述目标存储空间获取所述第一应用对应的有效设备标识信息,所述有效设备标识信息是根据所述第一应用所在设备的设备通用唯一标识码和所述第一应用的历史操作信息生成的;发送声纹验证请求至服务器,所述声纹验证请求包括所述有效设备标识信息和所述第一声纹,以使所述服务器根据所述有效设备标识信息获取所述第一应用对应的标准声纹,验证所述标准声纹与所述第一声纹的一致性得到验证结果;及接收所述服务器返回的所述验证结果,根据所述验证结果执行对应的操作。
- 根据权利要求15所述的存储介质,其中,所述计算机可读指令被所述处理器执行时还执行以下步骤:获取作用于所述第一应用的操作指令,获取所述操作指令对应的当前操作信息;通过所述第一应用采集与所述第一应用对应的标准声纹;获取所述第一应用所在设备的设备通用唯一标识码,根据所述设备通用唯一标识码和所述当前操作信息生成所述第一应用对应的当前设备标识信息;及获取所述第一应用对应的目标存储空间,当所述目标存储空间不存在所述第一应用对应的有效设备标识信息时,将所述当前设备标识信息作为有效设备标识信息存储至所述目标存储空间,发送所述有效设备标识信息、标准声纹至服务器,以使所述服务器存储所述有效设备标识信息和所述标准声纹的关联关系。
- 根据权利要求16所述的存储介质,其中,所述获取作用于所述第一应用的操作指令,获取所述操作指令对应的当前操作信息,通过所述第一应用采集与所述第一应用对应的标准声纹,获取所述第一应用所在设备的设备通用唯一标识码,根据所述设备通用唯一标识码和所述当前操作信息生成所述第一应用对应的当前设备标识信息包括:获取首次启动所述第一应用的应用启动指令;获取所述应用启动指令对应的当前设备系统时间,获取所述应用启动指令对应的当前设备地理位置信息;获取所述第一应用所在设备根据所述当前设备系统时间生成的设备通用唯一标识码;及将所述当前设备系统时间、当前设备地理位置信息和所述设备通用唯一标识码组合生成所述第一应用对应的所述当前设备标识信息。
- 根据权利要求16所述的存储介质,其中,所述将所述当前设备标识信息作为有效设备标识信息存储至所述目标存储空间包括:生成随机前缀和随机后缀,将所述随机前缀、当前设备标识信息、随机后缀按顺序组合生成处理设备标识信息;将所述处理设备标识信息加密得到加密设备标识信息,将所述加密设备标识信息存储至所述目标存储空间。
- 根据权利要求15所述的存储介质,其中,所述获取第一应用采集的第一声纹之 前,还包括:获取当前操作指令类型,所述目标存储空间以键值对的形式存储数据,其中键为当前操作指令类型,值为有效设备标识信息;当所述当前操作指令类型在所述目标存储空间中不存在对应的有效设备标识信息时,将所述当前操作指令类型和所述当前设备标识信息以键值对的形式存储至所述目标存储空间;及获取所述当前操作指令类型对应的目标标准声纹,发送所述有效设备标识信息、目标标准声纹至服务器,以使所述服务器存储所述有效设备标识信息、目标标准声纹的关联关系;所述计算机可读指令被所述处理器执行时还执行以下步骤:获取作用于第一应用的第一操作指令,确定所述第一操作指令对应的第一操作指令类型;从所述目标存储空间获取所述第一应用对应的与所述第一操作指令类型匹配的有效设备标识信息;及所述声纹验证请求包括所述有效设备标识信息和所述第一声纹,以使所述服务器根据所述有效设备标识信息获取与所述第一操作指令类型匹配的目标标准声纹,验证所述目标标准声纹与所述第一声纹的一致性得到所述第一操作指令对应的验证结果。
- 根据权利要求15所述的存储介质,其中,所述验证结果包括多个不同操作指令对应的验证结果,所述接收所述服务器返回的所述验证结果,根据所述验证结果执行对应的操作,包括:获取验证结果为通过的操作指令作为目标执行操作指令;根据各个目标执行操作指令执行作用于所述第一应用的目标操作,所述目标操作包括登录操作、支付操作、信息修改操作中的至少一种。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010112889.8A CN111371755B (zh) | 2020-02-24 | 2020-02-24 | 声纹数据处理方法、装置、计算机设备和存储介质 |
CN202010112889.8 | 2020-02-24 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021169469A1 true WO2021169469A1 (zh) | 2021-09-02 |
Family
ID=71210138
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/134470 WO2021169469A1 (zh) | 2020-02-24 | 2020-12-08 | 声纹数据处理方法、装置、计算机设备和存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111371755B (zh) |
WO (1) | WO2021169469A1 (zh) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111371755B (zh) * | 2020-02-24 | 2023-01-10 | 平安科技(深圳)有限公司 | 声纹数据处理方法、装置、计算机设备和存储介质 |
CN112054997B (zh) * | 2020-08-06 | 2022-11-18 | 博泰车联网科技(上海)股份有限公司 | 一种声纹登录认证方法及其相关产品 |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106506433A (zh) * | 2015-09-06 | 2017-03-15 | 中兴通讯股份有限公司 | 登录认证方法、认证服务器、认证客户端及登录客户端 |
CN107294900A (zh) * | 2016-03-30 | 2017-10-24 | 阿里巴巴集团控股有限公司 | 基于生物特征的身份注册方法和装置 |
CN107360265A (zh) * | 2017-05-26 | 2017-11-17 | 武汉斗鱼网络科技有限公司 | 一种设备唯一标识码获取方法、装置及移动终端 |
CN107784217A (zh) * | 2017-10-31 | 2018-03-09 | 珠海市魅族科技有限公司 | 一种生物特征信息处理方法、终端及计算机可读存储介质 |
CN108959904A (zh) * | 2018-06-14 | 2018-12-07 | 平安科技(深圳)有限公司 | 终端设备的应用登录方法及终端设备 |
CN109543462A (zh) * | 2018-11-15 | 2019-03-29 | 深圳乐信软件技术有限公司 | 设备标识确定方法、装置、服务器及存储介质 |
US20190180278A1 (en) * | 2016-06-16 | 2019-06-13 | Harex Infotech Inc. | Mobile authentication method and system therefor |
CN111291345A (zh) * | 2020-02-24 | 2020-06-16 | 平安科技(深圳)有限公司 | 声纹数据处理方法、装置、计算机设备和存储介质 |
CN111371755A (zh) * | 2020-02-24 | 2020-07-03 | 平安科技(深圳)有限公司 | 声纹数据处理方法、装置、计算机设备和存储介质 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108319829B (zh) * | 2017-01-11 | 2022-05-06 | 中兴通讯股份有限公司 | 一种声纹验证方法和装置 |
CN109450850B (zh) * | 2018-09-26 | 2022-10-11 | 深圳壹账通智能科技有限公司 | 身份验证方法、装置、计算机设备和存储介质 |
-
2020
- 2020-02-24 CN CN202010112889.8A patent/CN111371755B/zh active Active
- 2020-12-08 WO PCT/CN2020/134470 patent/WO2021169469A1/zh active Application Filing
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106506433A (zh) * | 2015-09-06 | 2017-03-15 | 中兴通讯股份有限公司 | 登录认证方法、认证服务器、认证客户端及登录客户端 |
CN107294900A (zh) * | 2016-03-30 | 2017-10-24 | 阿里巴巴集团控股有限公司 | 基于生物特征的身份注册方法和装置 |
US20190180278A1 (en) * | 2016-06-16 | 2019-06-13 | Harex Infotech Inc. | Mobile authentication method and system therefor |
CN107360265A (zh) * | 2017-05-26 | 2017-11-17 | 武汉斗鱼网络科技有限公司 | 一种设备唯一标识码获取方法、装置及移动终端 |
CN107784217A (zh) * | 2017-10-31 | 2018-03-09 | 珠海市魅族科技有限公司 | 一种生物特征信息处理方法、终端及计算机可读存储介质 |
CN108959904A (zh) * | 2018-06-14 | 2018-12-07 | 平安科技(深圳)有限公司 | 终端设备的应用登录方法及终端设备 |
CN109543462A (zh) * | 2018-11-15 | 2019-03-29 | 深圳乐信软件技术有限公司 | 设备标识确定方法、装置、服务器及存储介质 |
CN111291345A (zh) * | 2020-02-24 | 2020-06-16 | 平安科技(深圳)有限公司 | 声纹数据处理方法、装置、计算机设备和存储介质 |
CN111371755A (zh) * | 2020-02-24 | 2020-07-03 | 平安科技(深圳)有限公司 | 声纹数据处理方法、装置、计算机设备和存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN111371755B (zh) | 2023-01-10 |
CN111371755A (zh) | 2020-07-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109274685B (zh) | 多系统登录方法、装置、计算机设备和存储介质 | |
US20210243039A1 (en) | Blockchain-based content verification | |
CN109325342B (zh) | 身份信息管理方法、装置、计算机设备和存储介质 | |
CN111245548B (zh) | 基于时间戳的数据同步方法、装置和计算机设备 | |
WO2021169305A1 (zh) | 声纹数据处理方法、装置、计算机设备和存储介质 | |
CN112559993B (zh) | 身份认证方法、装置、系统及电子设备 | |
WO2021143457A1 (zh) | 基于sm9算法的身份认证方法、装置和计算机设备 | |
CN112860778B (zh) | 桌面应用程序的数据库管理方法、装置、设备和介质 | |
CN110704863A (zh) | 配置信息处理方法、装置、计算机设备和存储介质 | |
WO2021169469A1 (zh) | 声纹数据处理方法、装置、计算机设备和存储介质 | |
CN108418797B (zh) | 网页访问方法、装置、计算机设备和存储介质 | |
CN112800393B (zh) | 授权认证、软件开发工具包生成方法、装置及电子设备 | |
CN112527835B (zh) | 基于缓存的认证请求处理方法、装置及相关设备 | |
CN109286933B (zh) | 认证方法、装置、系统、计算机设备和存储介质 | |
US12081650B2 (en) | Server side authentication | |
CN114119300A (zh) | 电子协议匹配方法、装置、计算机设备和存储介质 | |
CN111382425B (zh) | 多签名机制下的应用安装管理方法、智能终端及存储介质 | |
CN108418809B (zh) | 聊天数据处理方法、装置、计算机设备及存储介质 | |
CN114238883A (zh) | 一种身份验证方法、装置、设备及存储介质 | |
CN111147235B (zh) | 对象访问方法、装置、电子设备及机器可读存储介质 | |
US20240080199A1 (en) | Secure multi-factor encrypted authentication system | |
CN114567557B (zh) | 报文处理方法、装置、计算机设备和存储介质 | |
CN113742681B (zh) | 一种账户管理方法、装置、计算机设备和存储介质 | |
CN116010926A (zh) | 登陆认证方法、装置、计算机设备和存储介质 | |
CN115935414A (zh) | 基于区块链的数据校验方法、装置、电子设备和存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20922140 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20922140 Country of ref document: EP Kind code of ref document: A1 |