CN109801633A - Method for processing business, device, electronic equipment and storage medium - Google Patents

Method for processing business, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN109801633A
CN109801633A CN201910090663.XA CN201910090663A CN109801633A CN 109801633 A CN109801633 A CN 109801633A CN 201910090663 A CN201910090663 A CN 201910090663A CN 109801633 A CN109801633 A CN 109801633A
Authority
CN
China
Prior art keywords
certification
user
business
threshold value
security level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910090663.XA
Other languages
Chinese (zh)
Inventor
郑方
邬晓钧
滑国阔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING D-EAR TECHNOLOGIES Co Ltd
Original Assignee
BEIJING D-EAR TECHNOLOGIES Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING D-EAR TECHNOLOGIES Co Ltd filed Critical BEIJING D-EAR TECHNOLOGIES Co Ltd
Priority to CN201910090663.XA priority Critical patent/CN109801633A/en
Publication of CN109801633A publication Critical patent/CN109801633A/en
Pending legal-status Critical Current

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the present disclosure provides a kind of method for processing business, device, electronic equipment and storage medium.Method for processing business includes: the certification voice data for receiving user;According to the certification voice data, the vocal print authentication for authenticating security level corresponding with the business operation being currently related to is carried out to the user, determines identity authentication result;According to the identity authentication result that instruction certification passes through, the business operation of the user is executed.It is directed to different user's operation safety requirements as a result, the vocal print authentication of corresponding certification security level is provided, to preferably meet the operational requirements of user while ensuring that user's operation is safe.

Description

Method for processing business, device, electronic equipment and storage medium
Technical field
The embodiment of the present disclosure is related to technical field of information processing more particularly to a kind of method for processing business, device, electronics are set Standby and storage medium.
Background technique
It is related to multiple business operation in such as Web bank, Mobile banking, financial service, social security service, shopping online etc. Internet application in, a variety of operations such as be usually directed to login, inquire, place an order, paying, and every kind operates and generates to user It influences different.For example, register, inquiry operation will not fund to user or the practical generation transfer of property, and pay, turn The operations such as account then actually generate the fund of user or the transfer of property.Pay, transfer accounts etc. user authentication in operating process or Authorization is led to the problem of, and the influence generated to the interests of user is bigger.
Summary of the invention
The embodiment of the present disclosure provides a kind of business treatment technique scheme, automatically provides different security levels for user Identification authentication mode, to ensure the safety of user's operation, and it is convenient to improve user's operation.
According to the disclosure in a first aspect, providing a kind of method for processing business, comprising: receive the certification voice number of user According to;It is corresponding with the business operation being currently related to user progress to authenticate security level according to the certification voice data Vocal print authentication, determine identity authentication result;According to the identity authentication result that instruction certification passes through, execute the user's The business operation.
Optionally, described according to the certification voice data, to business operation phase user progress and be currently related to The vocal print authentication answered, determines identity authentication result, comprising: vocal print feature data are extracted from the certification voice data, it will The vocal print feature data are compared with the archive vocal print feature data of the user, wherein according to the certification safety level Not corresponding first certification compares threshold value, determines the first comparison result, and determine the body according to first comparison result Part authentication result;Alternatively, sound-groove model data are extracted from the certification voice data, by the sound-groove model data and the use The archive sound-groove model data at family are compared, wherein threshold value is compared according to corresponding second certification of the certification security level, It determines the second comparison result, and the identity authentication result is determined according to second comparison result;Alternatively, from the certification Voice data extracts vocal print feature data, and the vocal print feature data are enterprising in the archive sound-groove model data of the user Row marking, wherein threshold value is compared according to the certification security level corresponding third certification, determine give a mark as a result, and according to The marking result determines the identity authentication result.
Optionally, first certification compares threshold value or second certification compares the threshold that threshold value is authentication error receptance Value, alternatively, first certification compares threshold value or second certification compares the threshold value that threshold value is authentication error reject rate, and And the third certification compares the threshold value of threshold value or authentication error reject rate that threshold value is authentication error receptance.
Optionally, according to the certification voice data, the user is carried out corresponding to the business operation being currently related to Certification security level vocal print authentication, before determining identity authentication result, the method also includes: receive the industry of user Business request message;According to the corresponding business task of the business request information, the corresponding certification security level is determined.
Optionally, the business task includes at least one following task: log in task, query task, reference task and Payment task, wherein payment task corresponds to highest certification security level.
Optionally, according to the certification voice data, the user is carried out corresponding to the business operation being currently related to Certification security level vocal print authentication, before determining identity authentication result, the method also includes: answered according to current With scene, the corresponding certification security level is determined.
Optionally, the application scenarios include at least one following scene: gate inhibition, finance, attendance, social security, letter is protected and political affairs Business, wherein financial application scene corresponds to highest certification security level.
According to the second aspect of the disclosure, a kind of business processing device is provided, comprising: speech reception module, for receiving The certification voice data of user;Voiceprint module is used for according to the received certification voice data of the speech reception module, right The user carries out the vocal print authentication for authenticating security level corresponding with the business operation being currently related to, and determines authentication As a result;Business execution module, the identity authentication result for being passed through according to instruction certification execute the business behaviour of the user Make.
Optionally, the voiceprint module includes: the first authentication unit, is used for from the certification voice data extraction sound Line characteristic the vocal print feature data is compared with the archive vocal print feature data of the user, wherein according to institute It states corresponding first certification of certification security level and compares threshold value, determine the first comparison result, and compare and tie according to described first Fruit determines the identity authentication result;Alternatively, the second authentication unit, for extracting sound-groove model number from the certification voice data According to the sound-groove model data are compared with the archive sound-groove model data of the user, wherein pacified according to the certification Full rank corresponding second, which authenticates, compares threshold value, determines the second comparison result, and determine institute according to second comparison result State identity authentication result;Alternatively, third authentication unit, for extracting vocal print feature data from the certification voice data, and will The vocal print feature data are given a mark in the archive sound-groove model data of the user, wherein according to the certification safety The corresponding third certification of rank compares threshold value, determines marking as a result, and determining the authentication according to the marking result As a result.
Optionally, first certification compares threshold value or second certification compares the threshold that threshold value is authentication error receptance Value, alternatively, first certification compares threshold value or second certification compares the threshold value that threshold value is authentication error reject rate, and And the third certification compares the threshold value of threshold value or authentication error reject rate that threshold value is authentication error receptance.
Optionally, the user is carried out and is currently related to according to the certification voice data in the voiceprint module And business operation authenticate the vocal print authentication of security level accordingly, before determining identity authentication result, described device is also It include: service request receiving module, for receiving the business request information of user;First security level determining module is used for root According to the corresponding business task of the business request information, the corresponding certification security level is determined.
Optionally, the business task includes at least one following task: log in task, query task, reference task and Payment task, wherein payment task corresponds to highest certification security level.
Optionally, the user is carried out and is currently related to according to the certification voice data in the voiceprint module And business operation authenticate the vocal print authentication of security level accordingly, before determining identity authentication result, described device is also It include: the second security level determining module, for determining the corresponding certification security level according to current application scenarios.
Optionally, the application scenarios include at least one following scene: gate inhibition, finance, attendance, social security, letter is protected and political affairs Business, wherein financial application scene corresponds to highest certification security level.
According to the third aspect of the disclosure, a kind of electronic equipment is provided, comprising: processor and memory;The memory For storing at least one executable instruction, the executable instruction makes the processor execute any aforementioned method for processing business The step of.
According to the fourth aspect of the disclosure, a kind of computer readable storage medium is provided, which is characterized in that the computer Readable storage medium storing program for executing is stored with executable instruction, and the executable instruction makes the processor execute any aforementioned business processing side The step of method.
The business processing scheme proposed by the embodiment of the present disclosure can be in reality when executing the business task of user Before executing corresponding business operation, the security level that authenticates corresponding with the business operation is carried out according to the certification voice of user Vocal print authentication executes the business operation of the user further according to the identity authentication result that instruction certification passes through.By This provides the vocal print authentication of corresponding certification security level, thus ensuring to use for different user's operation safety requirements While the safe operation of family, preferably meet the operational requirements of user.
Detailed description of the invention
Fig. 1 is the flow chart for showing the method for processing business according to some embodiments of the disclosure;
Fig. 2 is the flow chart for showing the method for processing business according to the disclosure other embodiments;
Fig. 3 is the flow chart for showing the method for processing business according to the disclosure other embodiments;
Fig. 4 is the logic diagram for showing the business processing device according to some embodiments of the disclosure;
Fig. 5 is the logic diagram for showing the exemplary structure of the voiceprint module 420 in Fig. 4;
Fig. 6 is the structural schematic diagram for showing the electronic equipment according to some embodiments of the disclosure.
Specific embodiment
(identical label indicates identical element in several attached drawings) and embodiment with reference to the accompanying drawing, implement the disclosure The specific embodiment of example is described in further detail.Following embodiment is not limited to the disclosure for illustrating the disclosure Range.
It will be understood by those skilled in the art that the terms such as " first ", " second " in the embodiment of the present disclosure are only used for distinguishing Different step, equipment or module etc., neither represent any particular technology meaning, also do not indicate that the inevitable logic between them is suitable Sequence.
Fig. 1 is the flow chart for showing the method for processing business according to some embodiments of the disclosure.Fig. 1 is executed in server end Method for processing business.
When user will log in the application of such as Mobile banking, account balance inquiry or transferred account service, in social security net Enterprising row information of standing updates operation, or when to execute kinds of goods reimbursement of expense in electric business website, user can be prompted to pass through speech Mode input its and authenticate voice data, user can be prompted to tell any spoken sounds with certain time length, for user Carry out vocal print authentication.
A kind of optional embodiment according to the present invention, can send to the client of user includes stochastic and dynamic code or prompt The authorization prompt information of sentence, and it is supplied to user in a manner of text or voice, which, which can be, needs user's weight The sentence told again is also possible to the problem of needing user to answer sentence.User after checking or hearing the authorization prompt information, The stochastic and dynamic code or information corresponding with prompt statement are told, to prevent the user of client from using the voice number recorded in advance According to fake user identity.
Certification voice data of the spoken sounds of user as user is acquired by the voice capture device of client, and It is sent to server, thus triggers vocal print authentication and the business operation of following steps S110 and subsequent step.
Referring to Fig.1, in step S110, the certification voice data of user is received.
Here, the certification voice data can be received from client, also the available user by other equipment acquisition recognizes Demonstrate,prove voice data.
As previously mentioned, the certification voice data may include any spoken sounds of user, it also may include believing with authorization prompt Corresponding spoken sounds are ceased, to carry out vocal print authentication to user.
In step S120, according to the certification voice data, to business operation phase user progress and be currently related to The vocal print authentication for the certification security level answered, determines identity authentication result.
In existing vocal print identity identifying method, for any required business operation for carrying out authentication, according to Identical certification security level to carry out vocal print authentication to user.Relatively logic is simple for this mode, but is different Requirement of the business operation for user's operation safety is different: if setting certification by standard it is too low, for The demanding business operation of family operational safety can not actually ensure user's operation safety;If the certification being arranged passes through mark It is quasi- excessively high, then the low business operation of requirement for user's operation safety, it may appear that the case where authentication can not be passed through.Cause This, identical certification security level, which is arranged, can not better meet the different requirements of user's operation safety.
Basic inventive concept according to the present invention is operated for the multiple business being related to, and sets corresponding certification peace Full rank, and according to it is corresponding with the business operation being related to authenticate security level execute vocal print authentication, so as to compared with Meet different user's operation security requirements well.
For example, corresponding to different application scenarios, different certification security levels can be acquiescently set.Executing step Before S110 (for example, in application/program starting), according to current application scenarios, the corresponding certification safety level is determined Not.Here, the application scenarios may include, but be not limited to, finance, attendance, social security, letter guarantor, government affairs etc..Wherein, financial application Scene can correspond to highest certification security level.
When carrying out Application on Voiceprint Recognition or vocal print authentication, it will usually it is related to aspect ratio pair or vocal print is given a mark, and aspect ratio To and vocal print marking can be related to comparing threshold value, the height that setting compares threshold value directly influences Application on Voiceprint Recognition or vocal print identity is recognized The result of card.
On the other hand, it in order to be authenticated using the biological attribute data of user, can be acquired when setting up account for user The voice data of user simultaneously carries out vocal print feature analysis, modeling, and the vocal print feature data for the user that analysis is obtained are as archive Vocal print feature data are saved, or are protected using the sound-groove model data that analysis obtains as sound-groove model data are achieved It deposits.The archive vocal print feature data or archive sound-groove model data of preservation are used for when executing vocal print authentication to from user's The voiceprint that voice extracts is compared, gives a mark.
It is special to extract vocal print from the certification voice data in step S120 for a kind of optional embodiment according to the present invention Data are levied, the vocal print feature data are compared with the archive vocal print feature data of the user, wherein recognized according to described It demonstrate,proves corresponding first certification of security level and compares threshold value, determine the first comparison result, and true according to first comparison result The fixed identity authentication result.
For example, the first certification compares the threshold value that threshold value can be the authentication error receptance of aspect ratio centering, the certification is wrong The threshold value of false acceptance rate is arranged higher, and corresponding certification security level is lower;The threshold value of the authentication error receptance is arranged Lower, corresponding certification security level is higher.
For another example the first certification compares the threshold value that threshold value can be the authentication error reject rate of aspect ratio centering, the certification The threshold value of false rejection rate is arranged higher, and corresponding certification security level is higher;The threshold value of the authentication error reject rate is arranged Must be lower, corresponding certification security level is lower.
First certification compares threshold value and is not limited to be set as both of the aforesaid threshold value, also can be set to other suitable for vocal print The threshold value of aspect ratio pair.
Another alternative embodiment in accordance with the invention extracts vocal print from the certification voice data in step S120 Model data the sound-groove model data is compared with the archive sound-groove model data of the user, wherein according to described It authenticates corresponding second certification of security level and compares threshold value, determine the second comparison result, and according to second comparison result Determine the identity authentication result.
Similarly, the second certification compares the threshold value that threshold value can be the authentication error receptance of aspect ratio centering, the certification The threshold value of false acceptance rate is arranged higher, and corresponding certification security level is lower;The threshold value of the authentication error receptance is arranged Must be lower, corresponding certification security level is higher.
Alternatively, the second certification compares the threshold value that threshold value can be the authentication error reject rate of aspect ratio centering, the certification is wrong The threshold value of false rejection rate is arranged higher, and corresponding certification security level is higher;The threshold value of the authentication error reject rate is arranged Lower, corresponding certification security level is lower.
Similarly, the second certification compares threshold value and is not limited to be set as both of the aforesaid threshold value, also can be set to other and is applicable in In the threshold value that vocal print feature compares.
Another optional embodiment according to the present invention extracts vocal print from the certification voice data in step S120 Characteristic, and the vocal print feature data are given a mark in the archive sound-groove model data of the user, wherein according to The corresponding third certification of the certification security level compares threshold value, determines marking as a result, and determining according to the marking result The identity authentication result.
For example, third certification compares the threshold value for the authentication error receptance that threshold value can be in vocal print feature marking, this is recognized The threshold value of card false acceptance rate is arranged higher, and corresponding certification security level is lower;The threshold value of the authentication error receptance is set Set lower, corresponding certification security level is higher.
For another example third certification compares the threshold value for the authentication error reject rate that threshold value can be in feature marking, the certification The threshold value of false rejection rate is arranged higher, and corresponding certification security level is higher;The threshold value of the authentication error reject rate is arranged Must be lower, corresponding certification security level is lower.
Similarly, third certification compares threshold value and is not limited to be set as both of the aforesaid threshold value, also can be set to other and is applicable in In the threshold value of vocal print feature marking.
The business operation of the user is executed according to the identity authentication result that instruction certification passes through in step S130.
That is, the business operation being currently related to is executed, for example, but not after determination has passed through vocal print authentication It is limited to, delivery operation, transfer operation, inquiry operation etc..
Hereafter, the implementing result of business operation can be sent to client, to notify to user.
By aforementioned processing, when executing the business task of user, can before actually executing corresponding business operation, The vocal print authentication for authenticating security level corresponding with the business operation is carried out according to the certification voice of user, further according to instruction The identity authentication result passed through is authenticated, the business operation of the user is executed.As a result, for different user's operation safety It is required that the vocal print authentication of corresponding certification security level is provided, thus while ensuring that user's operation is safe, it is preferably full The operational requirements of sufficient user.
Fig. 2 is the flow chart for showing the method for processing business according to the disclosure other embodiments.
In general, execute for example log in task, query task, pay task dispatching business task when, first from client to Server end, which sends instruction, will execute the business request information of the business task;Server end is asked in response to the business received Message is sought, the authorization prompt information of such as stochastic and dynamic code or prompt statement, then user's input of client are sent to client Authenticate voice.Here, server end can determine according to corresponding business task and recognize accordingly after receiving business request information Demonstrate,prove security level.Later, after receiving certification voice, vocal print authentication is carried out according to determining certification security level.As a result, Certification security level is dynamically determined according to business task and executes the vocal print authentication of determining certification security level.
The business request information of user is received in step S210 referring to Fig. 2.
For example, client sends instruction and to hold when the user of client initiates the task of order payment The business request information of row order payment.Server end can execute following steps after receiving the business request information of user Processing.
Corresponding certification security level is determined according to the corresponding business task of the business request information in step S220.
Server end can be determined according to the influence degree for example to user's assets corresponding with business task authenticates safety Rank.It can be the task of transferring accounts and the setting of payment task since the task of transferring accounts and payment task actually cause the transfer of assets Highest certification security level.
In step S230, the certification voice data of user is received.
The user is carried out and determining certification security level according to the certification voice data in step S240 Vocal print authentication, determines identity authentication result.
The business operation of the user is executed according to the identity authentication result that instruction certification passes through in step S250.
By aforementioned processing, certification can be dynamically determined and adjusted according to business task when user initiates business task Security level and the vocal print authentication for executing determining certification security level, while ensuring that user's operation is safe, more preferably Ground is provided for user and is operated conveniently.
Fig. 3 is the flow chart for showing the method for processing business according to the disclosure other embodiments.
Referring to Fig. 3, default authentication security level is determined according to current application scenarios in step S310.
In step S320, the business request information of user is received.
It is determined in step S330 according to the corresponding business task of the business request information and default authentication security level Corresponding certification security level.
In step S340, the certification voice data of user is received.
The user is carried out and determining certification security level according to the certification voice data in step S350 Vocal print authentication, determines identity authentication result.
The business operation of the user is executed according to the identity authentication result that instruction certification passes through in step S360.
By aforementioned processing, default authentication security level for example can be set according to application scenarios using when starting, then with When business task is initiated at family, certification security level is dynamically determined and adjusted simultaneously according to business task and default authentication security level The vocal print authentication for executing determining certification security level preferably mentions while ensuring that user's operation is safe for user For operating conveniently.
Fig. 4 is the logic diagram for showing the business processing device 400 according to some embodiments of the disclosure.
Referring to Fig. 4, the business processing device according to some embodiments of the disclosure includes that speech reception module 410, vocal print are recognized Demonstrate,prove module 420 and business execution module 430.
Wherein, speech reception module 410 is used to receive the certification voice data of user;Voiceprint module 420 is used for root According to the received certification voice data of speech reception module 410, the user is carried out corresponding with the business operation being currently related to The vocal print authentication for authenticating security level, determines identity authentication result;Business execution module 430 is used for logical according to instruction certification The identity authentication result crossed executes the business operation of the user.
Optionally, the user is carried out and is currently related to according to the certification voice data in voiceprint module 420 Business operation authenticate the vocal print authentication of security level accordingly, before determining identity authentication result, business processing device 400 further include:
Service request receiving module 440, for receiving the business request information of user;
First security level determining module 450, for determining phase according to the corresponding business task of the business request information The certification security level answered.
Optionally, the business task includes at least one following task: log in task, query task, reference task and Payment task, wherein payment task corresponds to highest certification security level.
Optionally, the user is carried out and is currently related to according to the certification voice data in voiceprint module 420 Business operation authenticate the vocal print authentication of security level accordingly, before determining identity authentication result, business processing device 400 further include:
Second security level determining module 460, for determining the corresponding certification safety according to current application scenarios Rank.
Optionally, the application scenarios include at least one following scene: gate inhibition, finance, attendance, social security, letter is protected and political affairs Business, wherein financial application scene corresponds to highest certification security level.
Business processing device 400 has the beneficial effect realized with any aforementioned method for processing business, and it will not be described here.
Fig. 5 is the logic diagram for showing the exemplary structure of the voiceprint module 420 in Fig. 4;
Referring to Fig. 5, voiceprint module 420 can include:
First authentication unit 421, for extracting vocal print feature data from the certification voice data, by the vocal print feature Data are compared with the archive vocal print feature data of the user, wherein according to the certification security level corresponding first Certification compares threshold value, determines the first comparison result, and determine the identity authentication result according to first comparison result;Or Person,
Second authentication unit 422, for extracting sound-groove model data from the certification voice data, by the sound-groove model Data are compared with the archive sound-groove model data of the user, wherein according to the certification security level corresponding second Certification compares threshold value, determines the second comparison result, and determine the identity authentication result according to second comparison result;Or Person,
Third authentication unit 423, for extracting vocal print feature data from the certification voice data, and the vocal print is special Sign data are given a mark in the archive sound-groove model data of the user, wherein corresponding according to the certification security level Third certification compares threshold value, determines marking as a result, and determining the identity authentication result according to the marking result.
Optionally, first certification compares threshold value or second certification compares the threshold that threshold value is authentication error receptance Value, alternatively, first certification compares threshold value or second certification compares the threshold value that threshold value is authentication error reject rate.This Outside, the third certification compares the threshold value of threshold value or authentication error reject rate that threshold value is authentication error receptance.
The embodiment of the present disclosure additionally provides a kind of electronic equipment.Fig. 6 is to show to be set according to the electronics with regard to the embodiment of the present disclosure Standby 600 structural schematic diagram.The electronic equipment 600 can be such as mobile terminal, personal computer (PC), tablet computer, clothes Business device etc..
As shown in fig. 6, electronic equipment 600 may include memory and processor.Specifically, electronic equipment 600 includes one A or multiple processors, communication device etc., one or more of processors for example: one or more central processing unit (CPU) 601, and/or one or more operational processor (GPU) 613 etc., processor can be according to being stored in read-only memory (ROM) it the executable instruction in 602 or is loaded into from storage section 608 executable in random access storage device (RAM) 603 It instructs and executes various movements appropriate and processing.Communication device includes communication component 612 and/or communication interface 609.Wherein, Communication component 612 may include but be not limited to network interface card, and the network interface card may include but be not limited to IB (Infiniband) network interface card, and communication connects Mouth 609 includes the communication interface of the network interface cards of LAN card, modem etc., and communication interface 609 is via such as because of spy The network of net executes communication process.
Processor can with communicate in read-only memory 602 and/or random access storage device 603 to execute executable instruction, It is connected by communication bus 604 with communication component 612 and is communicated through communication component 612 with other target devices, to completes this The corresponding operation of any one method for processing business that open embodiment provides, for example, receiving the certification voice data of user;According to The certification voice data carries out the vocal print body for authenticating security level corresponding with the business operation being currently related to the user Part certification, determines identity authentication result;According to the identity authentication result that instruction certification passes through, the business of the user is executed Operation.
In addition, in RAM 603, various programs and data needed for being also stored with device operation.CPU 601 or GPU 613, ROM 602 and RAM 603 is connected with each other by communication bus 604.In the case where there is 603 RAM, ROM 602 is can Modeling block.RAM 603 stores executable instruction, or executable instruction is written into ROM 602 at runtime, and executable instruction makes Processor executes the corresponding operation of above-mentioned communication means.Input/output (I/O) interface 605 is also connected to communication bus 604.It is logical Letter component 612 can integrate setting, may be set to be with multiple submodule (such as multiple IB network interface cards), and in communication bus It chains.
I/O interface 605 is connected to lower component: the importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 608 including hard disk etc.; And the communication interface 609 of the network interface card including LAN card, modem etc..Driver 610 also connects as needed It is connected to I/O interface 605.Detachable media 611, such as disk, CD, magneto-optic disk, semiconductor memory etc. are pacified as needed On driver 610, in order to be mounted into storage section 608 as needed from the computer program read thereon.
It should be noted that framework as shown in FIG. 6 is only a kind of optional implementation, it, can root during concrete practice The component count amount and type of above-mentioned Fig. 6 are selected, are deleted, increased or replaced according to actual needs;It is set in different function component It sets, separately positioned or integrally disposed and other implementations, such as the separable setting of GPU and CPU or can be by GPU collection can also be used At on CPU, the separable setting of communication device, can also be integrally disposed on CPU or GPU, etc..These interchangeable embodiment party Formula each falls within the protection scope of the disclosure.
The electronic equipment of the embodiment of the present disclosure can be used to implement corresponding method for processing business in above-described embodiment, the electricity Each device in sub- equipment can be used for executing each step in above method embodiment, for example, the industry being outlined above Business processing method can call the dependent instruction of memory storage to realize by the processor of electronic equipment, for sake of simplicity, This is repeated no more.
According to the embodiment of the present disclosure, a kind of computer program production may be implemented as above with reference to the process of flow chart description Product.For example, the embodiment of the present disclosure includes a kind of computer program product comprising be tangibly embodied on machine readable media Computer program, computer program include the program code for method shown in execution flow chart, and program code may include pair The corresponding instruction of method and step of embodiment of the present disclosure offer should be provided, for example, the certification voice data for receiving user Instruction;For according to the certification voice data, the user is carried out corresponding with the business operation being currently related to authenticate peace The vocal print authentication of full rank, determines the instruction of identity authentication result;Authentication knot for being passed through according to instruction certification Fruit executes the instruction of the business operation of the user.In such embodiments, which can pass through communication Element is downloaded and installed from network, and/or is mounted from detachable media 611.It is held in the computer program by processor When row, function disclosed in the method for the embodiment of the present disclosure is executed.
Disclosed method and device, electronic equipment and storage medium may be achieved in many ways.For example, can pass through Software, hardware, firmware or software, hardware, firmware any combination realize method and apparatus, the electronics of the embodiment of the present disclosure Equipment and storage medium.The said sequence of the step of for method merely to be illustrated, the method for the embodiment of the present disclosure Step is not limited to sequence described in detail above, unless specifically stated otherwise.In addition, in some embodiments, may be used also The disclosure is embodied as to record program in the recording medium, these programs include for realizing according to the side of the embodiment of the present disclosure The machine readable instructions of method.Thus, the disclosure also covers program of the storage for executing the method according to the embodiment of the present disclosure Recording medium.
The description of the embodiment of the present disclosure is given for the purpose of illustration and description, and is not exhaustively or to incite somebody to action The disclosure is limited to disclosed form, and many modifications and variations are obvious for the ordinary skill in the art.Choosing Selecting and describe embodiment is the principle and practical application in order to more preferably illustrate the disclosure, and makes those skilled in the art It will be appreciated that the disclosure is to design various embodiments suitable for specific applications with various modifications.

Claims (10)

1. a kind of method for processing business, comprising:
Receive the certification voice data of user;
It is corresponding with the business operation being currently related to user progress to authenticate security level according to the certification voice data Vocal print authentication, determine identity authentication result;
According to the identity authentication result that instruction certification passes through, the business operation of the user is executed.
2. the method according to claim 1, wherein described according to the certification voice data, to the user Vocal print authentication corresponding with the business operation being currently related to is carried out, determines identity authentication result, comprising:
Vocal print feature data are extracted from the certification voice data, by the archive vocal print of the vocal print feature data and the user Characteristic is compared, wherein compares threshold value according to corresponding first certification of the certification security level, determines the first comparison As a result, and determining the identity authentication result according to first comparison result;Alternatively,
Sound-groove model data are extracted from the certification voice data, by the archive vocal print of the sound-groove model data and the user Model data is compared, wherein compares threshold value according to corresponding second certification of the certification security level, determines the second comparison As a result, and determining the identity authentication result according to second comparison result;Alternatively,
From the certification voice data extract vocal print feature data, and by the vocal print feature data the user archive sound It gives a mark in line model data, wherein threshold value is compared according to the corresponding third certification of the certification security level, determines marking As a result, and determining the identity authentication result according to the marking result.
3. according to the method described in claim 2, it is characterized in that, first certification compares threshold value or the second certification ratio It is the threshold value of authentication error receptance to threshold value, alternatively, first certification compares threshold value or second certification compares threshold value For the threshold value of authentication error reject rate, also,
The third certification compares the threshold value of threshold value or authentication error reject rate that threshold value is authentication error receptance.
4. method described in any one of claim 1 to 3, which is characterized in that right according to the certification voice data The user carries out the vocal print authentication for authenticating security level corresponding with the business operation being currently related to, and determines authentication As a result before, the method also includes:
Receive the business request information of user;
According to the corresponding business task of the business request information, the corresponding certification security level is determined.
5. according to the method described in claim 4, it is characterized in that, the business task includes at least one following task: stepping on Record task, query task, reference task and payment task, wherein payment task corresponds to highest certification security level.
6. method described in any one of claim 1 to 3, which is characterized in that right according to the certification voice data The user carries out the vocal print authentication for authenticating security level corresponding with the business operation being currently related to, and determines authentication As a result before, the method also includes:
According to current application scenarios, the corresponding certification security level is determined.
7. according to the method described in claim 6, it is characterized in that, the application scenarios include at least one following scene: door Taboo, finance, attendance, social security, letter is protected and government affairs, wherein financial application scene corresponds to highest certification security level.
8. a kind of business processing device, comprising:
Speech reception module, for receiving the certification voice data of user;
Voiceprint module, for according to the received certification voice data of the speech reception module, to the user carry out with The business operation being currently related to authenticates the vocal print authentication of security level accordingly, determines identity authentication result;
Business execution module, the identity authentication result for being passed through according to instruction certification execute the business behaviour of the user Make.
9. a kind of electronic equipment, comprising: processor and memory;
The memory makes the processor execute such as right for storing at least one executable instruction, the executable instruction It is required that the step of method for processing business described in any one of 1~7.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has executable instruction, described to hold Row instruction executes the processor such as the step of method for processing business according to any one of claims 1 to 7.
CN201910090663.XA 2019-01-30 2019-01-30 Method for processing business, device, electronic equipment and storage medium Pending CN109801633A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910090663.XA CN109801633A (en) 2019-01-30 2019-01-30 Method for processing business, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910090663.XA CN109801633A (en) 2019-01-30 2019-01-30 Method for processing business, device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109801633A true CN109801633A (en) 2019-05-24

Family

ID=66559277

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910090663.XA Pending CN109801633A (en) 2019-01-30 2019-01-30 Method for processing business, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109801633A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111274560A (en) * 2020-01-14 2020-06-12 支付宝(杭州)信息技术有限公司 Identity authentication mode recommendation method, device and equipment
CN114005435A (en) * 2021-11-02 2022-02-01 北京元心君盛科技有限公司 Method, device, equipment, medium and program product for responding voice information

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079172A (en) * 2007-07-20 2007-11-28 中国建设银行股份有限公司 Self-aid service system and on-line transaction method
JP4351659B2 (en) * 2005-07-28 2009-10-28 積體數位股▲分▼有限公司 Voiceprint password key system
CN102347929A (en) * 2010-07-28 2012-02-08 阿里巴巴集团控股有限公司 Verification method of user identity and apparatus thereof
CN103745397A (en) * 2014-01-27 2014-04-23 上海坤士合生信息科技有限公司 System and method for realizing electronic transaction risk control based on position scene identification
CN104077516A (en) * 2014-06-26 2014-10-01 华为技术有限公司 Biometric authentication method and terminal
CN108512986A (en) * 2018-04-03 2018-09-07 Oppo广东移动通信有限公司 Auth method, electronic device and computer readable storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4351659B2 (en) * 2005-07-28 2009-10-28 積體數位股▲分▼有限公司 Voiceprint password key system
CN101079172A (en) * 2007-07-20 2007-11-28 中国建设银行股份有限公司 Self-aid service system and on-line transaction method
CN102347929A (en) * 2010-07-28 2012-02-08 阿里巴巴集团控股有限公司 Verification method of user identity and apparatus thereof
CN103745397A (en) * 2014-01-27 2014-04-23 上海坤士合生信息科技有限公司 System and method for realizing electronic transaction risk control based on position scene identification
CN104077516A (en) * 2014-06-26 2014-10-01 华为技术有限公司 Biometric authentication method and terminal
CN108512986A (en) * 2018-04-03 2018-09-07 Oppo广东移动通信有限公司 Auth method, electronic device and computer readable storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111274560A (en) * 2020-01-14 2020-06-12 支付宝(杭州)信息技术有限公司 Identity authentication mode recommendation method, device and equipment
CN111274560B (en) * 2020-01-14 2022-11-18 支付宝(杭州)信息技术有限公司 Identity authentication mode recommendation method, device and equipment
CN114005435A (en) * 2021-11-02 2022-02-01 北京元心君盛科技有限公司 Method, device, equipment, medium and program product for responding voice information

Similar Documents

Publication Publication Date Title
US10599832B2 (en) Password check by decomposing password
CN110166438B (en) Account information login method and device, computer equipment and computer storage medium
CN109214821B (en) Identity remote authentication method and terminal equipment
CN108352022B (en) System and method for monitoring computer authentication programs
CN109447789A (en) Method for processing business, device, electronic equipment and storage medium
CN107977776A (en) Information processing method, device, server and computer-readable recording medium
US20080249947A1 (en) Multi-factor authentication using a one time password
CN101571920A (en) Biometric authentication system, authentication client terminal, and biometric authentication method
CN109087194A (en) Invoice checking method, device, computer equipment and storage medium
CN106973043B (en) Password verification system and password verification method
CN106911630A (en) Terminal and the authentication method and system of identity identifying method, terminal and authentication center
CN109002733A (en) A kind of pair of equipment carries out the method and device of reliability evaluation
KR20140065818A (en) System and method for verifying safety of account
CN109801633A (en) Method for processing business, device, electronic equipment and storage medium
CN109345186B (en) Service handling method based on Internet of things and terminal equipment
CN106782567A (en) Method and device for establishing voiceprint model
CN105847270A (en) Loan authentication system
CN108064383A (en) A kind of management-control method, terminal and the POS terminal of application program permission
CN107977841A (en) The method and its terminal of two-dimension code safe payment are realized based on driving layer
CN110457876A (en) Identity identifying method, apparatus and system
US20180053184A1 (en) Method of identity verification during payment card processing
CN111681010A (en) Transaction verification method and device
KR20150105937A (en) Method for loan covenant and apparatus for using the same
US9646437B2 (en) Method of generating a temporarily limited and/or usage limited means and/or status, method of obtaining a temporarily limited and/or usage limited means and/or status, corresponding system and computer readable medium
KR20140142465A (en) Method for loan covenant and apparatus for using the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190524

WD01 Invention patent application deemed withdrawn after publication