CN108923930B - Communication method based on face recognition - Google Patents

Communication method based on face recognition Download PDF

Info

Publication number
CN108923930B
CN108923930B CN201810637059.XA CN201810637059A CN108923930B CN 108923930 B CN108923930 B CN 108923930B CN 201810637059 A CN201810637059 A CN 201810637059A CN 108923930 B CN108923930 B CN 108923930B
Authority
CN
China
Prior art keywords
image
calling party
call
identity
evaluation value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810637059.XA
Other languages
Chinese (zh)
Other versions
CN108923930A (en
Inventor
刘涛
李保印
张宝玉
刘博�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Wanwei Information Technology Co Ltd
Original Assignee
China Telecom Wanwei Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Wanwei Information Technology Co Ltd filed Critical China Telecom Wanwei Information Technology Co Ltd
Priority to CN201810637059.XA priority Critical patent/CN108923930B/en
Publication of CN108923930A publication Critical patent/CN108923930A/en
Application granted granted Critical
Publication of CN108923930B publication Critical patent/CN108923930B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42059Making use of the calling party identifier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6027Fraud preventions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6045Identity confirmation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6054Biometric subscriber identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Collating Specific Patterns (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a communication method based on face recognition, which generates a second image by face brushing and carries out identity authentication through the second image, wherein the identity authentication refers to carrying out face recognition through a genetic algorithm for authentication, whether the identity of a calling party has risk is judged through a technical means, after the identity authentication is passed, an evaluation value corresponding to the calling party and the second image generated by face brushing are sent to a called party, the called party carries out secondary confirmation on the calling party through the second image and the evaluation value and judges whether to connect the call, and double identity authentication ensures the identity authenticity of the calling party, reduces the fraud risk, can reduce the connection probability of harassing calls and ensures the purity of a call network.

Description

Communication method based on face recognition
Technical Field
The invention relates to the field of data transmission, in particular to a communication method based on face recognition.
Background
While the telecommunication industry is rapidly developing, various criminal activities which are conveniently carried out by utilizing the modern communication technology and the settlement mode are rampant day by day, harassing calls are still "forbidden" frequently, and mobile phone users are constantly told grooves.
In view of the above circumstances, government associated operators have also provided a series of measures, such as a telephone real-name system, that is, when a user manages services such as access to a fixed telephone, a mobile phone, a broadband service, a wireless network card, and passing a house, real identity information should be provided, and the user should register the mobile phone number with a text identifier such as a name, a product, and a brand of the user.
Even if the mobile phone is named in real, harassing calls and telecommunication fraud are difficult to suppress, and harassing molecules or fraudulent molecules forcibly initiate harassing calls, fraud, advertising promotion and other behaviors to the mobile phone of the user by falsely using identity information or mobile phone numbers of other people, so that the life and work of normal users are seriously influenced.
Disclosure of Invention
The embodiment of the invention aims to provide a communication method based on face recognition, and aims to solve the problem of harassment and fraud by means of communication tools in the prior art.
The embodiment of the invention is realized in such a way that a communication method based on face recognition comprises the following steps:
when a calling party initiates a call request, a face is brushed to generate a second image;
performing identity authentication of a calling party through the second image;
acquiring an evaluation value corresponding to the calling party, and sending the evaluation value and the second image to a called party;
the called party judges whether to connect the call.
Preferably, before the step "when the calling party initiates a call request, generating the second image by swiping the face" further includes the steps of:
acquiring information for distinguishing identities and a head portrait to generate a first image;
and presetting an optimal neural network, a first output value and an evaluation value corresponding to the optimal genetic factor in the first image.
Preferably, the step of "performing the identity authentication of the calling party by using the second image" specifically includes:
extracting a characteristic value of the second image;
judging whether the characteristic values have a matched optimal neural network;
if so, generating a second output value through the optimal neural network, and acquiring a first output value corresponding to the optimal neural network;
judging whether the second output value is the same as the first output value;
and if so, passing the identity authentication, and entering the step of acquiring the evaluation value corresponding to the calling party and sending the evaluation value and the second image to the called party.
Preferably, the step of "determining whether there is a matching optimal neural network for the feature value" further includes the steps of:
if not, the method proceeds to the step of acquiring the information for distinguishing the identity and the head portrait to generate the first image.
Preferably, the step of "determining whether the second output value is the same as the first output value" further includes:
if not, the call is refused.
Preferably, the information for distinguishing identities comprises an identity card number, a driving license number and a passport number;
the identity distinguishing head portrait comprises a head portrait on an identity card, a head portrait on a driving license and a head portrait on a passport.
Preferably, after the step of the called party judging whether to connect the call, the method further comprises the following steps:
if so, carrying out communication, and modifying the evaluation value of the calling party after the communication is finished;
if not, the call is refused.
Preferably, the evaluation value comprises a score and a comment;
the default value of the score is 0, and the called party adds 1 or subtracts 1 after the call is finished;
and the comment is default to be empty, and the comment is edited by the called party after the call is finished.
Preferably, when the score is N, the system automatically rejects the call request of the calling party;
n is a negative value.
The invention has the beneficial effects that:
the method comprises the steps of generating a second image by face brushing, performing identity authentication through the second image, wherein the identity authentication refers to face recognition through a genetic algorithm for authentication, judging whether the identity of a calling party has risks through a technical means, sending an evaluation value corresponding to the calling party and the second image generated by face brushing to a called party after the identity authentication is passed, performing secondary confirmation on the calling party through the second image and the evaluation value by the called party, and judging whether to connect the call, so that the double identity authentication ensures the identity authenticity of the calling party, reduces the fraud risk, reduces the connection probability of harassing calls, and ensures the purity of a call network; the invention also presets the optimal neural network corresponding to the optimal genetic factor in the first image, the first output value and the evaluation value, when calling, the second image of the calling party can quickly generate a second output value through the optimal neural network, and when the second output value is the same as the first output value, the identities of the second image and the first image are determined to be consistent, thereby avoiding the risk of counterfeiting; meanwhile, after the call is finished, the called party can score or comment the calling party, bad call behaviors of the calling party are restrained to the maximum extent, meanwhile, other called parties can judge the call behaviors of the calling party more accurately through continuously updated scoring and commenting, and call completing rates of harassing calls and fraudulent calls are further reduced.
Drawings
FIG. 1 is a flow chart of a first embodiment of a communication method based on face recognition according to the present invention;
fig. 2 is a flowchart of a communication method based on face recognition according to a second embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to the accompanying drawings and examples, and for convenience of description, only parts related to the examples of the present invention are shown. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Example one
Fig. 1 is a flowchart illustrating a first embodiment of a communication method based on face recognition according to the present invention, wherein the method includes the steps of:
s101, when a calling party initiates a calling request, a second image is generated by face brushing;
the calling party refers to a user who initiates a call through a fixed telephone, a mobile phone and a network instant messaging tool;
the face brushing finger photographs the face of the calling party;
the second image is generated by photographing the face of the calling party through terminal equipment (including a fixed telephone, a mobile phone, a network instant communication tool and the like) with a photographing function; before the second image is generated by photographing, the terminal equipment can firstly verify that the face of the calling party is a living face and then photograph;
the verification mode of the living body face is that the calling party is prompted to confirm whether the living body face is the living body face through actions of blinking, nodding, turning and the like in the shooting process of the terminal equipment; avoiding stealing photos of other people to call;
s102, performing identity authentication of a calling party through the second image;
the identity authentication means that the authenticity of the identity is determined by a genetic algorithm in a face recognition mode;
s103, obtaining an evaluation value corresponding to the calling party, and sending the evaluation value and the second image to a called party;
the evaluation value comprises a score and a comment;
the default value of the score is 0, and the called party adds 1 or subtracts 1 after the call is finished;
the comment is default to be empty, and the comment is edited by the called party after the call is finished;
when a calling party causes bad experience or good experience to a called party in the call process, the called party can modify the evaluation value of the calling party after the call is finished;
for example, when the calling party feels that the call is good, 1 may be added to the score of the calling party;
when the calling party feels that the call is bad, subtracting 1 from the score of the calling party;
each called party can only score the calling party once within a certain time, and the scoring can not be repeated, so that the condition of malicious scoring is avoided;
when the score is N, the system automatically rejects the call request of the calling party;
n is a negative value;
the comment is default to be null, when the calling party has bad conversation behavior, the called party can comment on the calling party, and can comment on the calling party in a form of an option list or in an autonomous editing form, and the contents include: fraud, promotion, commerce, etc.; after the call is finished, the called party autonomously selects whether to comment on the call of the calling party;
the first image of the called party and the evaluation value are sent to the called party for the called party to judge whether to connect the call each time;
s104, the called party judges whether to put through the call.
In the embodiment, the second image is generated by face brushing, identity authentication is performed through the second image, the identity authentication refers to face recognition through a genetic algorithm for authentication, whether the identity of a calling party has risks is judged through technical means, after the identity authentication is passed, an evaluation value corresponding to the calling party and the second image generated by face brushing are sent to a called party, the called party performs secondary confirmation on the calling party through the second image and the evaluation value, and whether the call is connected is judged, and double identity authentication ensures the identity authenticity of the calling party, reduces fraud risks, and can reduce the connection probability of harassing calls and ensure the purity of a call network.
Example two
Fig. 2 is a flowchart illustrating a second embodiment of a communication method based on face recognition according to the present invention, wherein the method includes the steps of:
s201, acquiring information for distinguishing identities and a head portrait to generate a first image;
the information for distinguishing identities comprises an identity card number, a driving license number, a passport number and the like;
the identity distinguishing head portrait comprises a head portrait on an identity card, a head portrait on a driving license, a head portrait on a passport and the like;
generally, the identity of a citizen in China is distinguished by an identity card, other countries can distinguish the identity by a passport and a driving license, and corresponding head images can be obtained in any identity distinguishing mode;
the head portrait on the identity card can be butted with a photo studio to obtain an identity card photo taken by a user when the user transacts the identity card; the identity card photo taken by the user during the identity card handling can be acquired through the butt joint with the public security system;
the head portrait on the driving license and the passport of the international friend can be acquired by butting the embassy system and can also be acquired by butting the driving license and the passport transacted by the corresponding country;
the first image is a face image which is obtained in advance for face recognition and covers all Chinese users holding identity cards, and also comprises a face image of an international user holding a driving license or a passport for communication;
s202, presetting an optimal neural network, a first output value and an evaluation value corresponding to the optimal genetic factor in the first image;
the neural network is an operation model, which is formed by connecting a large number of nodes (or called neurons) with each other, each node represents a specific output function, the connection between every two nodes represents a weighted value for a signal passing through the connection, and the output value of the neural network is different according to the connection mode, the weighted value and the excitation function of the neural network; the neural network itself is usually an approximation to a certain algorithm or function in the nature, so as to obtain an optimal neural network and a first output value corresponding to the optimal genetic factor;
the first output value is a value of the first image which is different from other images, and the first output value can be a binary value, a decimal value and other any binary values, wherein the binary values are preferred, and the optimization and identification efficiency of the neural network is improved;
in the later-stage communication process of the evaluation value, the called party continuously scores and evaluates the calling party, the evaluation value is updated in real time, and the system sends the updated evaluation value to the next called party when calling is performed next time;
only the calling party with the preset optimal neural network, the first output value and the evaluation value can initiate a call, and the calling party without the preset optimal neural network, the first output value and the evaluation value needs to be preset and authenticated when initiating a first call;
the steps S201 and S202 may be completed by a data center of an operator or a government monitoring center, and the preset work of the steps S201 and S202 is generally completed by the data center of the operator or the government monitoring center in real time according to the time for transacting the identity card or the time for transacting the mobile phone card; in case of missing, the calling party or the called party can actively send the information and the head portrait for distinguishing the identity to a data center or a government supervision center of an operator for authentication and presetting;
s203, when the calling party initiates a call request, the calling party swipes a face to generate a second image;
s204, the identity authentication of the calling party is carried out through the second image, and the method specifically comprises the following steps:
s2041, extracting a characteristic value of the second image;
the characteristic value refers to a distinguishing characteristic that the second image is distinguished from other images, and the characteristic value comprises a characteristic value in a face image which is subjected to face recognition by using a neural network;
s2042, judging whether the characteristic values have the matched optimal neural network, if so, entering step S2043, and if not, entering step S201;
if the matched optimal neural network exists, the calling party is the user who has performed the identity card authentication, namely the user who presets the optimal neural network, the first output value and the evaluation value; otherwise, the calling party is a user who does not perform identity authentication, and the user can actively send the information and the avatar for distinguishing the identity to a data center or a government supervision center of an operator for authentication and presetting through the step S201;
s2043, generating a second output value through the optimal neural network, and acquiring a first output value corresponding to the optimal neural network;
the first output value and the second output value are values of the first image and the second image which are different from other images, the first output value and the second output value can be binary values, decimal values and other arbitrary binary values, the binary values are optimized, and the optimization and identification processes of the neural network are improved;
s2044, determining whether the second output value is the same as the first output value, if yes, proceeding to step S2045, otherwise, proceeding to step S2046;
s2045, the identity authentication is passed, and the step S205 is executed;
s2046, the identity authentication is not passed, and the step S208 is carried out;
s205, obtaining an evaluation value corresponding to the calling party, and sending the evaluation value and the second image to a called party;
s206, the called party judges whether to put through the call, if yes, the step S207 is entered, and if not, the step S208 is entered;
the called party receives the call instruction, checks the second image and the evaluation value and judges whether to answer the call;
s207, carrying out communication, and modifying the evaluation value of the calling party after the communication is finished;
after the call is finished, the called party can choose to add 1 or subtract 1 to the score in the evaluation value of the calling party, or edit and comment the comment in the evaluation value of the calling party;
and S208, rejecting the call.
When the experience of the calling party to the called party is good in the conversation process, the called party can add 1 to the evaluation value or edit the comment;
when the experience of the calling party to the called party is not friendly in the conversation process, the called party can subtract 1 from the rating of the evaluation value or edit a comment;
when the calling party calls again, the system sends the updated evaluation value corresponding to the calling party to other called parties;
when the score reaches a certain negative value, the system can directly reject any other calling request of the calling party;
the occurrence of fraud and criminal behaviors can be restrained to the maximum extent through the evaluation value;
even if frauds or crimes happen in an unfortunate way, the public security organization can also track criminals through the second image and the first image, and the promptness and the rate of solving a case are improved.
In the embodiment, by presetting the optimal neural network, the first output value and the evaluation value corresponding to the optimal genetic factor in the first image, when a call is made, the second image of the calling party can quickly generate the second output value through the optimal neural network, and when the second output value is the same as the first output value, the identities of the second image and the first image are determined to be consistent, so that the risk of counterfeiting is avoided; the second image and the evaluation value of the calling party are sent to the called party, so that the called party can visually judge the calling party, the judgment of the identity card of the calling party only by sound in the prior art is avoided, the judgment accuracy is improved, and the risk of fraud is reduced; meanwhile, after the call is finished, the called party can score or comment the calling party, bad call behaviors of the calling party are restrained to the maximum extent, and meanwhile, other called parties can judge the call behaviors of the calling party more accurately through continuously updated scoring and commenting, so that the call completing rate of harassing calls and fraudulent calls is reduced.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (6)

1. A communication method based on face recognition is characterized by comprising the following steps:
when a calling party initiates a call request, a face is brushed to generate a second image;
performing identity authentication of a calling party through the second image;
acquiring an evaluation value corresponding to the calling party, and sending the evaluation value and the second image to a called party;
the called party judges whether to put through the call;
before the step of generating the second image by face brushing when the calling party initiates the call request, the method also comprises the following steps:
acquiring information for distinguishing identities and a head portrait to generate a first image;
presetting an optimal neural network, a first output value and an evaluation value corresponding to the optimal genetic factor in the first image;
the step of performing the identity authentication of the calling party through the second image specifically comprises the following steps:
extracting a characteristic value of the second image;
judging whether the characteristic values have a matched optimal neural network;
if so, generating a second output value through the optimal neural network, and acquiring a first output value corresponding to the optimal neural network;
judging whether the second output value is the same as the first output value;
if so, passing the identity authentication, and entering the step of acquiring an evaluation value corresponding to the calling party and sending the evaluation value and the second image to the called party;
the step of judging whether the characteristic value has the matched optimal neural network further comprises the following steps:
if not, the method proceeds to the step of acquiring the information for distinguishing the identity and the head portrait to generate the first image.
2. The communication method based on face recognition according to claim 1, wherein the step of "determining whether the second output value is the same as the first output value" further comprises the steps of:
if not, the call is refused.
3. The communication method based on face recognition according to claim 2, wherein the identity-distinguishing information includes an identification number, a driver's license number, a passport number;
the identity distinguishing head portrait comprises a head portrait on an identity card, a head portrait on a driving license and a head portrait on a passport.
4. The communication method based on face recognition as claimed in claim 3, wherein the step of "the called party judges whether to connect the call" further comprises the steps of:
if so, carrying out communication, and modifying the evaluation value of the calling party after the communication is finished;
if not, the call is refused.
5. The communication method based on face recognition according to claim 4, wherein the evaluation value comprises a score and a comment;
the default value of the score is 0, and the called party adds 1 or subtracts 1 after the call is finished;
and the comment is default to be empty, and the comment is edited by the called party after the call is finished.
6. The communication method based on face recognition according to claim 5, wherein when the score is N, the system automatically rejects the call request of the calling party;
n is a negative value.
CN201810637059.XA 2018-06-20 2018-06-20 Communication method based on face recognition Active CN108923930B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810637059.XA CN108923930B (en) 2018-06-20 2018-06-20 Communication method based on face recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810637059.XA CN108923930B (en) 2018-06-20 2018-06-20 Communication method based on face recognition

Publications (2)

Publication Number Publication Date
CN108923930A CN108923930A (en) 2018-11-30
CN108923930B true CN108923930B (en) 2021-06-15

Family

ID=64420688

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810637059.XA Active CN108923930B (en) 2018-06-20 2018-06-20 Communication method based on face recognition

Country Status (1)

Country Link
CN (1) CN108923930B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114040397A (en) * 2020-07-21 2022-02-11 中兴通讯股份有限公司 Call identity authentication method, terminal and computer readable storage medium
CN117812180A (en) * 2023-12-29 2024-04-02 深圳市君语科技有限公司 Mobile phone incoming call information processing method based on intelligent voice processing

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105072296A (en) * 2015-08-28 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Method, device and system for marking conversation caller
CN106464752A (en) * 2014-04-17 2017-02-22 古如罗技微***公司 Additional information on a caller
CN106791232A (en) * 2017-02-27 2017-05-31 成都三六时代科技有限公司 The means of communication of identity-based certification
CN108156603A (en) * 2017-12-29 2018-06-12 海能达通信股份有限公司 The method and system of authenticating user identification in a kind of private network calling

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8818344B2 (en) * 2006-11-14 2014-08-26 Microsoft Corporation Secured communication via location awareness

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106464752A (en) * 2014-04-17 2017-02-22 古如罗技微***公司 Additional information on a caller
CN105072296A (en) * 2015-08-28 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Method, device and system for marking conversation caller
CN106791232A (en) * 2017-02-27 2017-05-31 成都三六时代科技有限公司 The means of communication of identity-based certification
CN108156603A (en) * 2017-12-29 2018-06-12 海能达通信股份有限公司 The method and system of authenticating user identification in a kind of private network calling

Also Published As

Publication number Publication date
CN108923930A (en) 2018-11-30

Similar Documents

Publication Publication Date Title
CN106600269B (en) Payment method and platform based on two-dimensional code
CN109036435B (en) Identity authentication and identification method based on voiceprint information
WO2020147586A1 (en) Risk transaction processing method and apparatus, and device
CN109326058A (en) Identification check method, apparatus, terminal and readable medium based on wisdom automatic teller machine
CN107396368B (en) Mobile terminal, fraud prevention prompt processing method thereof and storage medium
CN108923930B (en) Communication method based on face recognition
WO2004109657B1 (en) Speaker recognition in a multi-speaker environment and comparison of several voice prints to many
JP2007507011A (en) Method for facilitating confirmation of financial transactions conducted through a wireless communication network
CN109688276B (en) Incoming call filtering system and method based on artificial intelligence technology
CN112818316B (en) Voiceprint-based identity recognition and application method, device and equipment
RU2763047C2 (en) System and method for call classification
CN106571998A (en) Parking contact method and system capable of protecting privacy and convenient to contact
CN104159229A (en) Incoming call processing method and apparatus
CN111654582A (en) Intelligent outbound method and device
CN110769425B (en) Method and device for judging abnormal call object, computer equipment and storage medium
WO2017035945A1 (en) Method, device and system for marking conversation caller
CN110830667A (en) Intelligent interactive voice response method and device
CN109858917A (en) A kind of anti-fake system and its method based on artificial intelligence
CN108023912A (en) A kind of recognition methods of signature, device, mobile terminal and cloud server
CN114553838A (en) Method, system and server for implementing remote service handling
CN106572053B (en) Method and apparatus for security monitoring of social communication applications
CN103634448A (en) Method for intelligently responding to incoming calls by voice
JP2008244796A (en) Voice authentication system
CN105991809A (en) Method and device for storing temporary contact
CN107396348B (en) Call method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 730000 Zhang Suzhou beach, Chengguan District, Lanzhou City, Gansu Province, No. 553

Applicant after: China Power World Wide Information Technology Co.,Ltd.

Address before: 730000 Zhang Suzhou beach, Chengguan District, Lanzhou City, Gansu Province, No. 553

Applicant before: GANSU WANWEI Co.

GR01 Patent grant
GR01 Patent grant