CN116861393A - Business service verification method, device, computer equipment and storage medium - Google Patents

Business service verification method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN116861393A
CN116861393A CN202310825852.3A CN202310825852A CN116861393A CN 116861393 A CN116861393 A CN 116861393A CN 202310825852 A CN202310825852 A CN 202310825852A CN 116861393 A CN116861393 A CN 116861393A
Authority
CN
China
Prior art keywords
verification
information
user
service
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310825852.3A
Other languages
Chinese (zh)
Inventor
郑剑南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202310825852.3A priority Critical patent/CN116861393A/en
Publication of CN116861393A publication Critical patent/CN116861393A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Acoustics & Sound (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application relates to a business service verification method, a business service verification device, computer equipment, a storage medium and a computer program product. To the field of financial technology or other related fields. The method comprises the following steps: responding to a business service request sent for financial business service, and generating business service prompt information comprising a service prompt verification text; sending a user identity verification request to a user terminal; the user identity verification request is used for indicating the user terminal to display business service prompt information, and the user terminal is used for collecting user face information and user voice information in the process of reading the service prompt verification text by the user; identifying and verifying user face information and user voice information sent by a user terminal to obtain an identification and verification result; and executing the request processing operation of the business service request according to the identification verification result. The method can perfect the verification process of financial business transaction, improves the identity recognition effectiveness, and is beneficial to accurately acquiring information before the user transacts business.

Description

Business service verification method, device, computer equipment and storage medium
Technical Field
The present application relates to the field of financial science and technology, and in particular, to a business service verification method, apparatus, computer device, storage medium and computer program product.
Background
At present, in the identification process of a financial scene, the identity of a customer who handles business is usually identified, such as using a self-service terminal to handle business at a website, using a banking mobile phone APP to handle business online, and using APP to pay.
However, the method only identifies the identity of the client, and whether the client transacts the service is the true will of the client cannot be identified, so that the situation that the minors deliberately do not inform parents of the abnormal transaction conditions of the transaction, such as payment processing at present, or a lawbreaker spoofs the client to transact the service, and the like, which are at risk, can occur, the safety is poor, and the financial safety of the client during transacting the service can not be effectively ensured.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a business service verification method, apparatus, computer device, storage medium, and computer program product that can improve business transaction security.
In a first aspect, the present application provides a method for verifying a business service, applied to a server, where the method includes:
responding to a business service request sent for financial business service, and generating business service prompt information comprising a service prompt verification text;
Sending a user identity verification request to a user terminal; the user identity verification request is used for indicating the user terminal to display the business service prompt information, and the user terminal is used for collecting user face information and user voice information in the process of reading the service prompt verification text by a user;
identifying and verifying the user face information and the user voice information sent by the user terminal to obtain an identification and verification result;
and executing the request processing operation of the business service request according to the identification verification result.
In one embodiment, the service prompting message further includes service description information, and the generating the service prompting message including the service prompting verification text includes:
acquiring a preset description information template and a verification text template; different business service types correspond to different verification text templates;
generating the service description information according to the service request and the description information template, and generating the service prompt verification text according to the service request and the verification text template;
and taking the business service description information and the service prompt verification text as the business service prompt information.
In one embodiment, the service prompt verification text includes enhanced display indication information, where the enhanced display indication information is used to indicate that the user terminal performs enhanced display on key text in the service prompt verification text when the service prompt verification text is displayed.
In one embodiment, the generating the service hint verification text according to the service request and the verification text template includes:
acquiring key digital information from the business service request, and converting the key digital information into a key digital text of a specified language type;
and filling the key digital text into a preset position in the verification text template to obtain the service prompt verification text.
In one embodiment, the identifying and verifying the face information of the user and the voice information of the user sent by the user terminal, to obtain an identifying and verifying result, includes:
identifying and verifying the user face information to obtain a face identification verification value, and identifying and verifying the user voice information to obtain a voice identification verification value;
under the condition that the face recognition verification value and the voice recognition verification value are detected to meet the preset condition, determining that the recognition verification result is verification passing;
Under the condition that the face recognition verification value and the voice recognition verification value are detected to not meet the preset condition, determining that the recognition verification result is not verified;
the preset condition is that the face recognition verification value exceeds a preset first verification passing threshold value, and the voice recognition verification value exceeds a preset second verification passing threshold value.
In one embodiment, the identifying verifies the user voice information to obtain a voice identification verification value, including:
acquiring voice verification rule information; the voice verification rule information comprises a preset calculation function and voice content configuration parameters, wherein the voice content configuration parameters are used for setting corresponding calculation parameters for key content and non-key content in voice content;
and determining the voice recognition verification value according to the preset calculation function, the voice information of the user and the voice content configuration parameters.
In one embodiment, the executing the request processing operation for the business service request according to the identification verification result includes:
when the identification verification result is verification passing, sending passing feedback information to the user terminal, and executing corresponding business service processing operation on the business service request;
And when the identification verification result is that the verification is not passed, sending feedback information which is not passed to the user terminal.
In a second aspect, the present application further provides a business service verification method, applied to a user terminal, where the method includes:
responding to a request for financial business service to initiate operation, and sending a business service request to a service end;
receiving a user identity verification request sent by the server; the user identity verification request carries service prompt information comprising service prompt verification text, and the service prompt information is generated according to the service request;
displaying the business service prompt information, collecting user face information and user voice information in the process of reading the service prompt verification text by a user, and sending the user face information and the user voice information to the server;
displaying feedback information corresponding to the identification verification result returned by the server; and the recognition verification result is obtained by recognizing and verifying the face information of the user and the voice information of the user.
In one embodiment, the service prompting information further includes service description information, and the displaying the service prompting information includes:
Displaying the business service description information;
and displaying the service prompt verification text, carrying out enhanced display on key texts in the service prompt verification text, and broadcasting the service prompt verification text by voice.
In one embodiment, the method further comprises:
when the feedback information represents that the verification is not passed, responding to the re-identification verification operation, and sending a re-identification verification request to the server; the re-identification verification request is used for indicating the server to re-send the user identity verification request;
or, in response to the service exit operation, sending service exit information to the service end; the business service exit information is used for indicating the service end to terminate processing the business service request.
In a third aspect, the present application further provides a service verification device, applied to a server, where the device includes:
the business service request response module is used for responding to the business service request sent for the financial business service and generating business service prompt information comprising a service prompt verification text;
the authentication request sending module is used for sending a user authentication request to the user terminal; the user identity verification request is used for indicating the user terminal to display the business service prompt information, and the user terminal is used for collecting user face information and user voice information in the process of reading the service prompt verification text by a user;
The recognition verification module is used for recognizing and verifying the user face information and the user voice information sent by the user terminal to obtain a recognition verification result;
and the execution processing module is used for executing the request processing operation of the business service request according to the identification verification result.
In a fourth aspect, the present application further provides a business service verification device, applied to a user terminal, where the device includes:
the business service request sending module is used for responding to the request of the financial business service to initiate operation and sending a business service request to the service end;
the verification request receiving module is used for receiving a user identity verification request sent by the server; the user identity verification request carries service prompt information comprising service prompt verification text, and the service prompt information is generated according to the service request;
the information acquisition module is used for displaying the business service prompt information, acquiring user face information and user voice information in the process of reading the service prompt verification text by a user, and sending the user face information and the user voice information to the server;
The verification feedback information display module is used for displaying feedback information corresponding to the identification verification result returned by the server; and the recognition verification result is obtained by recognizing and verifying the face information of the user and the voice information of the user.
In a fifth aspect, the present application also provides a computer device. The computer device comprises a memory storing a computer program, and a processor implementing the steps of the business service verification method according to the first aspect and/or the steps of the business service verification method according to the second aspect when the computer program is executed.
In a sixth aspect, the present application also provides a computer readable storage medium. The computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the business service verification method as described in the first aspect and/or the steps of the business service verification method as described in the second aspect.
In a seventh aspect, the present application also provides a computer program product. The computer program product comprises a computer program which, when executed by a processor, implements the steps of the business service verification method as described in the first aspect and/or the steps of the business service verification method as described in the second aspect.
According to the business service verification method, the business service verification device, the computer equipment, the storage medium and the computer program product, the business service prompt information comprising the service prompt verification text is generated by responding to the business service request sent for the financial business service, then the user identity verification request is sent to the user terminal, the user identity verification request is used for indicating the user terminal to display the business service prompt information, the user terminal is used for collecting the user face information and the user voice information in the process of reading the service prompt verification text by the user, further identifying and verifying the user face information and the user voice information sent by the user terminal to obtain an identification verification result, and according to the identification verification result, request processing operation on the business service request is executed, so that the verification process of perfecting financial business transaction is realized, the identity identification effectiveness is improved, the user is helped to accurately know information before transaction of business transaction, and the business transaction safety is improved.
Drawings
FIG. 1 is a flow diagram of a business service verification method in one embodiment;
FIG. 2 is a schematic diagram of an identification verification system based on a business service verification method in one embodiment;
FIG. 3 is a flow chart of a method of verifying business services according to another embodiment;
FIG. 4a is a schematic diagram showing a business service hint in one embodiment;
FIG. 4b is a schematic diagram showing a business service prompt message in another embodiment;
FIG. 5 is a schematic diagram of a business service verification process flow in one embodiment;
FIG. 6 is a flow chart of a method of verifying business services in yet another embodiment;
FIG. 7 is a block diagram of a business service verification device in one embodiment;
FIG. 8 is a block diagram of a business service verification apparatus in another embodiment;
FIG. 9 is an internal block diagram of a computer device in one embodiment;
fig. 10 is an internal structural view of a computer device in another embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
In one embodiment, as shown in fig. 1, a business service verification method is provided, and the method is applied to a server, which may be implemented by an independent server or a server cluster formed by a plurality of servers, and includes the following steps:
Step 101, responding to a business service request sent for financial business service, generating business service prompt information comprising a service prompt verification text;
as an example, the business service request may be a request to purchase a certain service for payment, a request to transact a certain business, or a request to process other financial business services, which is not particularly limited in this embodiment.
The service prompt information may include service description information and service prompt verification text, for example, corresponding service description information and service prompt verification text may be generated according to the received service request.
In practical application, a service request sent by a user terminal can be received, then a preset description information template and a verification text template can be obtained, service description information is generated according to the service request and the description information template, a service prompt verification text is generated according to the service request and the verification text template, and then service prompt information is obtained according to the service description information and the service prompt verification text.
Specifically, as shown in fig. 2, the identification verification system based on the business service verification method may be composed of a background server (i.e., a server side), a client terminal (i.e., a user terminal), and a management terminal. For example, a user may transact a service through a client terminal, initiate an order request (i.e., a service request), and then the background server may receive a request generation hint text (i.e., a service hint).
In an example, the background server may include a communication and control unit, a face recognition unit, a voice recognition unit, an order processing unit, and a parameter setting unit. The communication and control unit can be used for communicating with the client terminal and the management terminal and controlling each unit inside; the face recognition unit can be used for analyzing and recognizing the face information of the user acquired by the client terminal, comparing the face information with background face database information and judging whether the face information is the face information of the client; the voice recognition unit can be used for analyzing and recognizing the user voice information acquired by the client terminal and judging whether the client reads according to the text information prompted by the system; the order processing unit can be used for recording information and processing transaction of the customer order; the parameter setting unit can be used for setting parameters such as prompt message characters, face recognition verification passing rate, voice character recognition verification passing rate and the like generated by the system.
By way of example, the client terminal may be, but is not limited to, a smart phone, a website self-service terminal, or the like, for a client to transact business, which may be connected to a background server through a communication and control unit and control the internal respective units.
The client terminal may include a display unit, an image pickup device, a sound reproducing device, and a sound pickup device. The display unit can be used for displaying information for a user, such as a mobile phone touch display screen, a self-service terminal touch display screen and the like; the image acquisition device can be used for acquiring image information such as faces of users, such as mobile phone cameras; the sound playing device can be used for playing prompt information for a user, such as a mobile phone loudspeaker and the like; the sound collection device can be used for collecting voice information of a user, such as a mobile phone microphone, a headset and the like.
In yet another example, the management terminal may be a terminal device such as a personal computer, a notebook computer, or the like, which may be connected to the background server, and the background manager may log in to the background server using the management terminal to perform operations such as querying, modifying, or the like. For example, a background manager can customize a plurality of prompt message templates (namely a preset description message template and a verification text template), and can set different recognition verification passing rate parameters and the like through an algorithm.
Step 102, sending a user identity verification request to a user terminal;
the user identity verification request can be used for indicating a user terminal to display business service prompt information, and the user terminal can be used for collecting user face information and user voice information in the process of reading service prompt verification text by a user.
In a specific implementation, the background server may initiate identity authentication based on the generated service prompt information, i.e. send a user authentication request to the user terminal.
Step 103, identifying and verifying the user face information and the user voice information sent by the user terminal to obtain an identification and verification result;
in practical application, the background server can identify and verify the face information of the user to obtain a face identification verification value and identify and verify the voice information of the user to obtain a voice identification verification value, and then can determine that the identification verification result is verification passing if the face identification verification value exceeds a preset first verification passing threshold and the voice identification verification value exceeds a preset second verification passing threshold or the identification verification result is not verification passing if the face identification verification value and the voice identification verification value are detected to not meet the preset conditions.
And 104, executing the request processing operation of the business service request according to the identification verification result.
After the identification verification result is obtained, if the identification verification result is verification passing, the passing feedback information can be sent to the user terminal, and corresponding business service processing operation is executed on the business service request, and if the identification verification result is non-verification passing, the non-passing feedback information can be sent to the user terminal, and further processing operation can be determined based on the subsequent interaction information of the user terminal, for example, the user identity verification request can be resent to the user terminal, or the business service request is terminated.
Compared with the traditional method, the technical scheme of the embodiment can verify the identity of the user based on face recognition and confirm the real intention of the user through voice recognition when the user performs identity verification through information interaction between the user terminal and the server, so that the verification process of business handling is perfected, the identity recognition effectiveness is improved, and the user can accurately acquire information before handling the business.
In the business service verification method, the business service prompt information comprising the service prompt verification text is generated by responding to the business service request sent for the financial business service, then the user identity verification request is sent to the user terminal, further the user face information and the user voice information sent by the user terminal are identified and verified to obtain the identification verification result, and the request processing operation on the business service request is executed according to the identification verification result, so that the verification process of perfecting the financial business transaction is realized, the identity identification effectiveness is improved, the accurate information is obtained before the user transaction of the business is facilitated, and the business transaction safety is improved.
In one embodiment, the service prompting information may further include service description information, and the generating the service prompting information including the service prompting verification text may include the following steps:
Acquiring a preset description information template and a verification text template; different business service types correspond to different verification text templates; generating the service description information according to the service request and the description information template, and generating the service prompt verification text according to the service request and the verification text template; and taking the business service description information and the service prompt verification text as the business service prompt information.
In one example, the post server generated reminder text (i.e., business service reminder) may be determined by both the order information and the setting parameters. For the prompt message text, a plurality of different generating templates, namely a preset description message template and a preset verification text template, can be set, and can be automatically generated through a system AI.
For example, order information (i.e., business service description information) generated by the order processing unit may include the following information:
in yet another example, the template parameter setting unit of the background server may be configured to set template parameters of the prompt message text through the management terminal, and a plurality of different templates may be set according to service types of different orders, that is, different verification text templates corresponding to different service types may be expressed in the following manner, for example:
In an alternative embodiment, after the service prompt information generated by the background server is sent to the user terminal, the service prompt verification text may be displayed through the prompt information display module, where the service prompt verification text may include enhanced display indication information, which may be used to instruct the user terminal to perform enhanced display on the key text in the service prompt verification text when the service prompt verification text is displayed, for example, a variable part (such as order information) in a template of the prompt information text may be used as the key text, and further, when the service prompt verification text is displayed on the screen of the user terminal, the key display may be performed by using different character formats such as thickening, highlighting color, and the like.
In this embodiment, by acquiring a preset description information template and a verification text template, generating service description information according to a service request and the description information template, and generating a service prompt verification text according to the service request and the verification text template, the service description information and the service prompt verification text are further used as service prompt information, so that service prompt information can be flexibly and rapidly generated, and information return efficiency is improved.
In one embodiment, the generating the service hint verification text according to the service request and the verification text template may include the following steps:
acquiring key digital information from the business service request, and converting the key digital information into a key digital text of a specified language type; and filling the key digital text into a preset position in the verification text template to obtain the service prompt verification text.
In practical application, the business service request can carry order detailed information, and can take the figures such as the amount of money in the order detailed information as key digital information, so that Arabic numerals can be converted into Chinese characters when a service prompt verification text is generated, namely, the key digital information is converted into key digital texts with appointed language types, thereby avoiding system identification errors caused by different reading modes of users.
In this embodiment, key digital information is obtained from a service request, and the key digital information is converted into a key digital text of a specified language type, so that the key digital text is filled into a preset position in a verification text template to obtain a service prompt verification text, which is helpful for collecting voice information in an effective reading mode and improves the system recognition efficiency.
In one embodiment, the identifying and verifying the user face information and the user voice information sent by the user terminal to obtain an identifying and verifying result may include the following steps:
identifying and verifying the user face information to obtain a face identification verification value, and identifying and verifying the user voice information to obtain a voice identification verification value; under the condition that the face recognition verification value and the voice recognition verification value are detected to meet the preset condition, determining that the recognition verification result is verification passing; and under the condition that the face recognition verification value and the voice recognition verification value are detected to not meet the preset condition, determining that the recognition verification result is not verified.
The preset condition may be that the face recognition verification value exceeds a preset first verification passing threshold, and the voice recognition verification value exceeds a preset second verification passing threshold.
In a specific implementation, parameters such as face recognition verification passing rate, voice character recognition verification passing rate and the like can be set in advance by the parameter setting unit of the background server through the management terminal, after the background server receives the collected information, the collected user face information and user voice information can be identified, and the information recognition verification passing rate can be judged only when the face recognition verification passing rate (namely, a first verification passing threshold value) and the voice character recognition verification passing rate (namely, a second verification passing threshold value) are higher than the set face recognition verification passing rate (namely, a second verification passing threshold value) aiming at the user face information and the user voice information, namely, the recognition verification result is confirmed to be verification passing.
In this embodiment, the face information of the user is identified and verified to obtain the face identification verification value, and the voice information of the user is identified and verified to obtain the voice identification verification value, the identification verification result is determined to be verification passing under the condition that the face identification verification value and the voice identification verification value are detected to meet the preset condition, and the identification verification result is determined to be unverified under the condition that the face identification verification value and the voice identification verification value are detected to be unverified under the condition that the face identification verification value and the voice identification verification value are not met, so that the identity identification effectiveness can be improved.
In one embodiment, the identifying verifies the user voice information to obtain a voice identification verification value, and may include the following steps:
acquiring voice verification rule information; the voice verification rule information comprises a preset calculation function and voice content configuration parameters, wherein the voice content configuration parameters are used for setting corresponding calculation parameters for key content and non-key content in voice content; and determining the voice recognition verification value according to the preset calculation function, the voice information of the user and the voice content configuration parameters.
As an example, the key content may include, but is not limited to, information such as the name of the purchased good, the payment amount, and the like.
In an example, when identifying and verifying user voice information, different scoring criteria (i.e. voice content configuration parameters) can be set according to the importance of different words in the voice content, i.e. corresponding calculation parameters can be set for key content and non-key content in the voice content, so that the requirement of the identification level of the key content can be improved.
In yet another example, the phonetic text recognition verification pass rate calculation function (i.e., the preset calculation function) may be expressed as follows:
W=(Σv 1 /Σb)*p 1 +(Σv 2 /Σn)*p 2
wherein W is a speech recognition verification value, Σv 1 The total number of words of the key content which can be correctly recited by the identified user can be represented, and Sigma b can represent the total number of words of the key content which needs to be recited in the template, sigma v 2 Can represent the total word number of the common content (i.e. non-key content) correctly recited by the identified user, and Σn can represent the total word number of the common content needing to be recited in the template, p 1 Can represent the key content passing rate to calculate the proportion, p 2 The general content passing rate calculation specific gravity may be represented.
In this embodiment, by acquiring the voice verification rule information and further determining the voice recognition verification value according to the user voice information and the voice content configuration parameter according to the preset calculation function, the user voice information can be accurately recognized and verified, and data support is provided for recognizing whether the user transacts the business as the actual will of the user.
In one embodiment, the performing the request processing operation on the business service request according to the identification verification result may include the following steps:
when the identification verification result is verification passing, sending passing feedback information to the user terminal, and executing corresponding business service processing operation on the business service request; and when the identification verification result is that the verification is not passed, sending feedback information which is not passed to the user terminal.
In practical application, when the identification verification result is verification passing, the background server can send verification success information (namely, feedback information) to the user terminal, and can perform order processing, namely, execute corresponding business service processing operation on the business service request; when the identification verification fails (i.e., the identification verification result is that the identification verification fails), the background server may send verification failure information (i.e., feedback information fails) to the user terminal.
In this embodiment, when the verification result is that verification is passed, the pass feedback information is sent to the user terminal, and a corresponding service processing operation is performed on the service request; when the identification verification result is that the verification is not passed, sending feedback information which is not passed to the user terminal, and clearly feeding back the identification verification result to the user.
In one embodiment, as shown in fig. 3, another business service verification method is provided, and the method is applied to a user terminal for illustration, and includes the following steps:
step 301, responding to a request for financial business service to initiate operation, and sending a business service request to a server;
step 302, receiving a user authentication request sent by the server; the user identity verification request carries service prompt information comprising service prompt verification text, and the service prompt information is generated according to the service request;
step 303, displaying the business service prompt information, collecting user face information and user voice information in the process of reading the service prompt verification text by a user, and sending the user face information and the user voice information to the server;
step 304, feedback information corresponding to the identification verification result returned by the server is displayed; and the recognition verification result is obtained by recognizing and verifying the face information of the user and the voice information of the user.
As shown in fig. 4a, the display unit of the user terminal may be composed of a face acquisition display module, a prompt information display module, and a push-to-talk button module. The face acquisition display module can be used for displaying face images acquired by the image acquisition device (namely face information of a user) for the user to check; the prompt message display module can be used for displaying prompt message characters (such as service prompt verification text in service prompt messages) generated by the background server for users to check; pressing the talk button module may be used to turn on the voice call function after pressing.
In practical application, a user can transact a service to initiate an order request through a user terminal, namely, initiate operation in response to a request for financial service, send a service request to a service end, then receive a user identity verification request, display prompt message characters sent by a background server, such as service prompt verification text in service prompt messages, at a prompt message display module of the user terminal, and play the service prompt verification text in voice by using a voice playing device.
In an example, when it is detected that the user clicks a talk button, the user terminal may stop playing voice and start the sound collection device to collect voice of the user, for example, the user reads the voice according to a service prompt verification text, and then the user terminal may use the image collection device and the sound collection device to collect face information and voice information of the user, where the face information may be displayed at a face collection display module in the screen in real time; if the user release button is not detected, the user voice can be collected, and if the user release button is detected, the user terminal can send the collected face information and voice information (namely, the user face information and the user voice information) to a background server.
In yet another example, the user terminal may display verification failure information and a cause when receiving feedback information indicating that verification is not passed, such as identifying that the verification result is that verification is not passed, or may display transaction success information when receiving feedback information indicating that verification is passed, to indicate that the flow ends.
In the business service verification method, the business service request is sent to the service end by responding to the request of the financial business service, then the user identity verification request sent by the service end is received, the user identity verification request carries business service prompt information containing service prompt verification text, the business service prompt information is generated according to the business service request, the business service prompt information is displayed, user face information and user voice information in the process of collecting user reading the business service prompt verification text are collected, the user face information and the user voice information are sent to the service end, feedback information corresponding to a recognition verification result returned by the service end is displayed, the recognition verification result is obtained by recognizing and verifying the user face information and the user voice information, the verification process of completing financial business transaction is realized, the identity recognition effectiveness can be improved, accurate information acquisition before business transaction is facilitated, and the business transaction safety is improved.
In one embodiment, the service prompting information may further include service description information, and the displaying the service prompting information may include the following steps:
displaying the business service description information; and displaying the service prompt verification text, carrying out enhanced display on key texts in the service prompt verification text, and broadcasting the service prompt verification text by voice.
In a specific implementation, as shown in fig. 4a, for a service request for purchasing a service to make payment, when the order processing unit is processing a purchase order, the service type in the order information is service type 1 (such as payment service), the purchase trade name is XXXX, and the payment amount is xxx. The background server can generate a service prompt verification text which is "please aim at the face recognition frame to collect the face, and press the record button to state the following characters: i voluntarily pay xxx for purchasing XXXX services. "
As shown in fig. 4b, for a service request for a request to transact a certain service, when the order processing unit is processing a certain transacted service, the service type in the order information is service type 2 (such as an account opening service), and the trade name is purchased as XXXX. The background server can generate a service prompt verification text which is "please aim at the face recognition frame to collect the face, and press the record button to state the following characters: i voluntarily transact XXXX business.
In one example, when displaying the service tip verification text, the variable portion (such as the purchase name XXXX, the payment amount xxx) in the service tip verification text may be highlighted in a different character format such as bolded, highlighted color, etc.
In the embodiment, the service prompt verification text is displayed by displaying the service description information, the key text in the service prompt verification text is enhanced and displayed, and the service prompt verification text is voice broadcast, so that a user can accurately acquire information before transacting the service, and the service transacting safety is improved.
In one embodiment, the method may further comprise the steps of:
when the feedback information represents that the verification is not passed, responding to the re-identification verification operation, and sending a re-identification verification request to the server; the re-identification verification request is used for indicating the server to re-send the user identity verification request; or, in response to the service exit operation, sending service exit information to the service end; the business service exit information is used for indicating the service end to terminate processing the business service request.
In practical application, after knowing the verification failure information and the reason, the user can choose to exit or re-identify, and under the condition that the user chooses to re-identify, the identification process can be restarted, namely, the re-identification verification request is sent to the server in response to the re-identification verification operation; under the condition that the user selects to exit, the user terminal can send a command for ending the transaction to the background server, namely, respond to the business service exit operation and send business service exit information to the server, so that the background server ends the order, and the process is ended.
In order that those skilled in the art may better understand the above steps, an embodiment of the present application will be exemplarily described below by way of an example with reference to fig. 5, but it should be understood that the embodiment of the present application is not limited thereto.
Step 1: the user can transact business at the user terminal and initiate an order request (i.e. a business service request);
step 2: the background server (i.e. the server side) receives the order, can generate prompt message words (i.e. business service prompt message) and initiate identity authentication (i.e. user identity authentication request);
step 3: the user terminal can display the prompt message characters sent by the background server at the prompt message display module, and uses the voice playing device to play the prompt message characters in a voice mode;
step 4: the user clicks to press the talk button;
step 5: the user terminal can stop voice playing and start the voice acquisition device to acquire the voice of the user;
step 6: the user starts to state according to the prompt message text;
step 7: the user terminal can acquire face information and voice information (namely user face information and user voice information) of a client by using the image acquisition device and the sound acquisition device, wherein the face information can be displayed at a face acquisition display module on a screen in real time;
Step 8: if the client does not release the talk button, the step 7 can be kept; if the client releases the speaking button, the next step 9 is entered;
step 9: the user terminal can send the collected face information and voice information to a background server;
step 10: the background server can recognize the acquired face information and voice information, and enter the next step 11 when the recognition and verification are passed, and enter the step 101 when the recognition and verification are not passed;
step 10a: when the identification verification fails, the background server can send verification failure information (namely, failed feedback information) to the user terminal;
step 10b: the user terminal displays the verification failure information and the reason to the user;
step 10c: after the user sees the verification failure information and the reason, the user can choose to exit or re-identify; if the user selects to re-identify, enter step 2, restart the identification flow (i.e. re-identify verification request), if the user selects to exit, enter step 10d;
step 10d: the user terminal may send a command to terminate the transaction (i.e., the service exit information) to the background server;
step 10e: the background server can terminate the order, and the flow is ended;
Step 11: the background server can send verification success information (namely through feedback information) to the user terminal, and simultaneously perform order processing;
step 12: the user terminal may display that the transaction was successful and the process ends.
In this embodiment, when the feedback information indicates that the user passes the verification, the re-identification verification request is sent to the server in response to the re-identification verification operation, or the service exit information is sent to the server in response to the service exit operation, so that the user's subsequent interaction information can be acquired to determine further processing operation according to the condition of the user passing the verification.
In one embodiment, as shown in fig. 6, a flow diagram of yet another method of verifying business services is provided. In this embodiment, the method includes the steps of:
in step 601, a business service request is sent to a server in response to a request for a financial business service initiating an operation. In step 602, in response to the service request, a preset description information template and a verification text template are obtained, service description information is generated according to the service request and the description information template, service prompt verification text is generated according to the service request and the verification text template, and the service description information and the service prompt verification text are used as service prompt information. In step 603, a user authentication request is sent to the user terminal. In step 604, a user authentication request sent by a server is received, service prompt information is displayed, user face information and user voice information in the process of reading the service prompt authentication text by a user are collected, and the user face information and the user voice information are sent to the server. In step 605, the face information and the voice information of the user sent by the user terminal are identified and verified, and an identification and verification result is obtained. In step 606, when the verification result is identified as verification passing, the passing feedback information is sent to the user terminal, and corresponding business service processing operation is executed on the business service request. In step 607, when the authentication result is identified as failed, failed feedback information is sent to the user terminal. In step 608, the re-identification verification request is sent to the server in response to the re-identification verification operation, or the service exit information is sent to the server in response to the service exit operation. It should be noted that, the specific limitation of the above steps may be referred to the specific limitation of a business service verification method, which is not described herein.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a service verification device for realizing the service verification method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation in the embodiments of one or more service verification devices provided below may refer to the limitation of the service verification method hereinabove, and will not be repeated herein.
In one embodiment, as shown in fig. 7, there is provided a business service verification apparatus, applied to a server, including:
a business service request response module 701, configured to generate business service prompt information including a service prompt verification text in response to a business service request sent for a financial business service;
a verification request sending module 702, configured to send a user authentication request to a user terminal; the user identity verification request is used for indicating the user terminal to display the business service prompt information, and the user terminal is used for collecting user face information and user voice information in the process of reading the service prompt verification text by a user;
the recognition verification module 703 is configured to recognize and verify the face information of the user and the voice information of the user sent by the user terminal, so as to obtain a recognition verification result;
and the execution processing module 704 is configured to execute a request processing operation for the business service request according to the identification verification result.
In one embodiment, the service prompting information further includes service description information, and the service request response module 701 includes:
the template acquisition sub-module is used for acquiring a preset description information template and a verification text template; different business service types correspond to different verification text templates;
The information and text generation sub-module is used for generating the business service description information according to the business service request and the description information template and generating the service prompt verification text according to the business service request and the verification text template;
and the service prompt information obtaining sub-module is used for taking the service description information and the service prompt verification text as the service prompt information.
In one embodiment, the service prompt verification text includes enhanced display indication information, where the enhanced display indication information is used to instruct the user terminal to perform enhanced display on key text in the service prompt verification text when the service prompt verification text is displayed.
In one embodiment, the information and text generation submodule includes:
the text conversion unit is used for acquiring key digital information from the business service request and converting the key digital information into a key digital text with a specified language type;
and the service prompt verification text obtaining unit is used for filling the key digital text into a preset position in the verification text template to obtain the service prompt verification text.
In one embodiment, the identification verification module 703 includes:
the recognition verification value obtaining sub-module is used for recognizing and verifying the user face information to obtain a face recognition verification value, recognizing and verifying the user voice information to obtain a voice recognition verification value;
the verification passing sub-module is used for determining that the recognition verification result is verification passing under the condition that the face recognition verification value and the voice recognition verification value are detected to meet the preset condition;
the unverified passing sub-module is used for determining that the recognition verification result is unverified passing under the condition that the face recognition verification value and the voice recognition verification value are detected to not meet the preset condition;
the preset condition is that the face recognition verification value exceeds a preset first verification passing threshold value, and the voice recognition verification value exceeds a preset second verification passing threshold value.
In one embodiment, the identification verification value comprises:
the verification information acquisition unit is used for acquiring voice verification rule information; the voice verification rule information comprises a preset calculation function and voice content configuration parameters, wherein the voice content configuration parameters are used for setting corresponding calculation parameters for key content and non-key content in voice content;
And the voice recognition verification value determining unit is used for determining the voice recognition verification value according to the preset calculation function and the voice information of the user and the voice content configuration parameters.
In one embodiment, the execution processing module 704 includes:
the feedback information sending sub-module is used for sending the feedback information to the user terminal when the identification verification result is verification passing, and executing corresponding business service processing operation on the business service request;
and the failed feedback information sending sub-module is used for sending failed feedback information to the user terminal when the identification verification result is that the failed verification result is passed.
The above-described respective modules in the service authentication apparatus may be implemented in whole or in part by software, hardware, and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, as shown in fig. 8, there is provided a business service verification apparatus applied to a user terminal, including:
A business service request sending module 801, configured to initiate an operation in response to a request for a financial business service, and send a business service request to a server;
a verification request receiving module 802, configured to receive a user authentication request sent by the server; the user identity verification request carries service prompt information comprising service prompt verification text, and the service prompt information is generated according to the service request;
the information collection module 803 is configured to display the service prompt information, collect user face information and user voice information in a process that a user reads the service prompt verification text, and send the user face information and the user voice information to the server;
the verification feedback information display module 804 is configured to display feedback information corresponding to the identification verification result returned by the server; and the recognition verification result is obtained by recognizing and verifying the face information of the user and the voice information of the user.
In one embodiment, the service prompting information further includes service description information, and the information collecting module 803 includes:
the description information display sub-module is used for displaying the business service description information;
And the prompt text display sub-module is used for displaying the service prompt verification text, strengthening the display of key texts in the service prompt verification text and voice broadcasting the service prompt verification text.
In one embodiment, the apparatus further comprises:
the unverified passing operation module is used for responding to the re-identification verification operation when the feedback information represents unverified passing, and sending a re-identification verification request to the server; the re-identification verification request is used for indicating the server to re-send the user identity verification request; or, in response to the service exit operation, sending service exit information to the service end; the business service exit information is used for indicating the service end to terminate processing the business service request.
The above-described respective modules in the service authentication apparatus may be implemented in whole or in part by software, hardware, and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, and the internal structure of which may be as shown in fig. 9. The computer device includes a processor, a memory, an Input/Output interface (I/O) and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is for storing business service verification data. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for communicating with an external terminal through a network connection. The computer program when executed by a processor implements a business service verification method.
In one embodiment, a computer device is provided, which may be a terminal, and an internal structure diagram thereof may be as shown in fig. 10. The computer device includes a processor, a memory, an input/output interface, a communication interface, a display unit, and an input means. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface, the display unit and the input device are connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program when executed by a processor implements a business service verification method. The display unit of the computer device is used for forming a visual picture, and can be a display screen, a projection device or a virtual reality imaging device. The display screen can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be a key, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by persons skilled in the art that the structures shown in fig. 9 and 10 are merely block diagrams of portions of structures associated with aspects of the present application and are not intended to limit the computer apparatus to which aspects of the present application may be applied, and that a particular computer apparatus may include more or less components than those shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program performing the steps of:
responding to a business service request sent for financial business service, and generating business service prompt information comprising a service prompt verification text;
sending a user identity verification request to a user terminal; the user identity verification request is used for indicating the user terminal to display the business service prompt information, and the user terminal is used for collecting user face information and user voice information in the process of reading the service prompt verification text by a user;
identifying and verifying the user face information and the user voice information sent by the user terminal to obtain an identification and verification result;
And executing the request processing operation of the business service request according to the identification verification result.
In one embodiment, the processor, when executing the computer program, further implements the steps of the business service verification method in the other embodiments described above.
In one embodiment, a computer device is provided comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program performing the steps of:
responding to a request for financial business service to initiate operation, and sending a business service request to a service end;
receiving a user identity verification request sent by the server; the user identity verification request carries service prompt information comprising service prompt verification text, and the service prompt information is generated according to the service request;
displaying the business service prompt information, collecting user face information and user voice information in the process of reading the service prompt verification text by a user, and sending the user face information and the user voice information to the server;
displaying feedback information corresponding to the identification verification result returned by the server; and the recognition verification result is obtained by recognizing and verifying the face information of the user and the voice information of the user.
In one embodiment, the processor, when executing the computer program, further implements the steps of the business service verification method in the other embodiments described above.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
responding to a business service request sent for financial business service, and generating business service prompt information comprising a service prompt verification text;
sending a user identity verification request to a user terminal; the user identity verification request is used for indicating the user terminal to display the business service prompt information, and the user terminal is used for collecting user face information and user voice information in the process of reading the service prompt verification text by a user;
identifying and verifying the user face information and the user voice information sent by the user terminal to obtain an identification and verification result;
and executing the request processing operation of the business service request according to the identification verification result.
In one embodiment, the computer program when executed by the processor also implements the steps of the business service verification method in the other embodiments described above.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
responding to a request for financial business service to initiate operation, and sending a business service request to a service end;
receiving a user identity verification request sent by the server; the user identity verification request carries service prompt information comprising service prompt verification text, and the service prompt information is generated according to the service request;
displaying the business service prompt information, collecting user face information and user voice information in the process of reading the service prompt verification text by a user, and sending the user face information and the user voice information to the server;
displaying feedback information corresponding to the identification verification result returned by the server; and the recognition verification result is obtained by recognizing and verifying the face information of the user and the voice information of the user.
In one embodiment, the computer program when executed by the processor also implements the steps of the business service verification method in the other embodiments described above.
In one embodiment, a computer program product is provided comprising a computer program which, when executed by a processor, performs the steps of:
Responding to a business service request sent for financial business service, and generating business service prompt information comprising a service prompt verification text;
sending a user identity verification request to a user terminal; the user identity verification request is used for indicating the user terminal to display the business service prompt information, and the user terminal is used for collecting user face information and user voice information in the process of reading the service prompt verification text by a user;
identifying and verifying the user face information and the user voice information sent by the user terminal to obtain an identification and verification result;
and executing the request processing operation of the business service request according to the identification verification result.
In one embodiment, the computer program when executed by the processor also implements the steps of the business service verification method in the other embodiments described above.
In one embodiment, a computer program product is provided comprising a computer program which, when executed by a processor, performs the steps of:
responding to a request for financial business service to initiate operation, and sending a business service request to a service end;
receiving a user identity verification request sent by the server; the user identity verification request carries service prompt information comprising service prompt verification text, and the service prompt information is generated according to the service request;
Displaying the business service prompt information, collecting user face information and user voice information in the process of reading the service prompt verification text by a user, and sending the user face information and the user voice information to the server;
displaying feedback information corresponding to the identification verification result returned by the server; and the recognition verification result is obtained by recognizing and verifying the face information of the user and the voice information of the user.
In one embodiment, the computer program when executed by the processor also implements the steps of the business service verification method in the other embodiments described above.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and the data (including but not limited to data for analysis, stored data, presented data, etc.) related to the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use and processing of the related data need to comply with the related laws and regulations and standards of the related country and region.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the embodiments provided herein may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processor referred to in the embodiments provided in the present application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic unit, a data processing logic unit based on quantum computing, or the like, but is not limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.

Claims (15)

1. A business service verification method, characterized in that it is applied to a server, the method comprising:
responding to a business service request sent for financial business service, and generating business service prompt information comprising a service prompt verification text;
sending a user identity verification request to a user terminal; the user identity verification request is used for indicating the user terminal to display the business service prompt information, and the user terminal is used for collecting user face information and user voice information in the process of reading the service prompt verification text by a user;
Identifying and verifying the user face information and the user voice information sent by the user terminal to obtain an identification and verification result;
and executing the request processing operation of the business service request according to the identification verification result.
2. The method of claim 1, wherein the business service prompting message further comprises business service description information, and wherein the generating the business service prompting message comprising the service prompting verification text comprises:
acquiring a preset description information template and a verification text template; different business service types correspond to different verification text templates;
generating the service description information according to the service request and the description information template, and generating the service prompt verification text according to the service request and the verification text template;
and taking the business service description information and the service prompt verification text as the business service prompt information.
3. The method according to claim 2, wherein the service reminder verification text includes enhanced display indication information, the enhanced display indication information being used to instruct the user terminal to enhance display of key text in the service reminder verification text when the service reminder verification text is presented.
4. The method of claim 2, wherein generating the service hint verification text from the business service request and the verification text template comprises:
acquiring key digital information from the business service request, and converting the key digital information into a key digital text of a specified language type;
and filling the key digital text into a preset position in the verification text template to obtain the service prompt verification text.
5. The method according to claim 1, wherein the identifying and verifying the user face information and the user voice information sent by the user terminal, to obtain an identifying and verifying result, includes:
identifying and verifying the user face information to obtain a face identification verification value, and identifying and verifying the user voice information to obtain a voice identification verification value;
under the condition that the face recognition verification value and the voice recognition verification value are detected to meet the preset condition, determining that the recognition verification result is verification passing;
under the condition that the face recognition verification value and the voice recognition verification value are detected to not meet the preset condition, determining that the recognition verification result is not verified;
The preset condition is that the face recognition verification value exceeds a preset first verification passing threshold value, and the voice recognition verification value exceeds a preset second verification passing threshold value.
6. The method of claim 5, wherein said identifying verifies said user voice information to obtain a voice recognition verification value, comprising:
acquiring voice verification rule information; the voice verification rule information comprises a preset calculation function and voice content configuration parameters, wherein the voice content configuration parameters are used for setting corresponding calculation parameters for key content and non-key content in voice content;
and determining the voice recognition verification value according to the preset calculation function, the voice information of the user and the voice content configuration parameters.
7. The method according to any one of claims 1 to 6, wherein said performing a request processing operation for the business service request according to the identification verification result comprises:
when the identification verification result is verification passing, sending passing feedback information to the user terminal, and executing corresponding business service processing operation on the business service request;
And when the identification verification result is that the verification is not passed, sending feedback information which is not passed to the user terminal.
8. A business service verification method, characterized in that it is applied to a user terminal, said method comprising:
responding to a request for financial business service to initiate operation, and sending a business service request to a service end;
receiving a user identity verification request sent by the server; the user identity verification request carries service prompt information comprising service prompt verification text, and the service prompt information is generated according to the service request;
displaying the business service prompt information, collecting user face information and user voice information in the process of reading the service prompt verification text by a user, and sending the user face information and the user voice information to the server;
displaying feedback information corresponding to the identification verification result returned by the server; and the recognition verification result is obtained by recognizing and verifying the face information of the user and the voice information of the user.
9. The method of claim 8, wherein the business service hint information further comprises business service description information, and wherein the presenting the business service hint information comprises:
Displaying the business service description information;
and displaying the service prompt verification text, carrying out enhanced display on key texts in the service prompt verification text, and broadcasting the service prompt verification text by voice.
10. The method according to claim 8 or 9, characterized in that the method further comprises:
when the feedback information represents that the verification is not passed, responding to the re-identification verification operation, and sending a re-identification verification request to the server; the re-identification verification request is used for indicating the server to re-send the user identity verification request;
or, in response to the service exit operation, sending service exit information to the service end; the business service exit information is used for indicating the service end to terminate processing the business service request.
11. A business service verification apparatus, applied to a service end, the apparatus comprising:
the business service request response module is used for responding to the business service request sent for the financial business service and generating business service prompt information comprising a service prompt verification text;
the authentication request sending module is used for sending a user authentication request to the user terminal; the user identity verification request is used for indicating the user terminal to display the business service prompt information, and the user terminal is used for collecting user face information and user voice information in the process of reading the service prompt verification text by a user;
The recognition verification module is used for recognizing and verifying the user face information and the user voice information sent by the user terminal to obtain a recognition verification result;
and the execution processing module is used for executing the request processing operation of the business service request according to the identification verification result.
12. A business service verification apparatus, applied to a user terminal, comprising:
the business service request sending module is used for responding to the request of the financial business service to initiate operation and sending a business service request to the service end;
the verification request receiving module is used for receiving a user identity verification request sent by the server; the user identity verification request carries service prompt information comprising service prompt verification text, and the service prompt information is generated according to the service request;
the information acquisition module is used for displaying the business service prompt information, acquiring user face information and user voice information in the process of reading the service prompt verification text by a user, and sending the user face information and the user voice information to the server;
the verification feedback information display module is used for displaying feedback information corresponding to the identification verification result returned by the server; and the recognition verification result is obtained by recognizing and verifying the face information of the user and the voice information of the user.
13. Computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any one of claims 1 to 7 and/or the steps of the method of any one of claims 8 to 10 when the computer program is executed.
14. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any one of claims 1 to 7 and/or the steps of the method of any one of claims 8 to 10.
15. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any one of claims 1 to 7 and/or the steps of the method of any one of claims 8 to 10.
CN202310825852.3A 2023-07-06 2023-07-06 Business service verification method, device, computer equipment and storage medium Pending CN116861393A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310825852.3A CN116861393A (en) 2023-07-06 2023-07-06 Business service verification method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310825852.3A CN116861393A (en) 2023-07-06 2023-07-06 Business service verification method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116861393A true CN116861393A (en) 2023-10-10

Family

ID=88222930

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310825852.3A Pending CN116861393A (en) 2023-07-06 2023-07-06 Business service verification method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116861393A (en)

Similar Documents

Publication Publication Date Title
CN108667622B (en) Electronic signature authentication method, system, computer device and storage medium
CN111343162B (en) System secure login method, device, medium and electronic equipment
CN109271757B (en) Off-line activation method and system for software
CN111464555B (en) File signing confirmation method based on client screen video, service server, authentication server and client
WO2020228367A1 (en) Mobile payment self-service signing method, device and system
CN111737675A (en) Block chain-based electronic signature method and device
CN107240023A (en) client identity confirmation method, device and system
CN113034110B (en) Service processing method, system, medium and electronic equipment based on video auditing
CN110138743A (en) Acquisition methods, device, computer equipment and the storage medium of resource bid file
CN113191902A (en) Transaction processing method and device based on block chain, electronic equipment and medium
CN109120509B (en) Information collection method and device
CN116861393A (en) Business service verification method, device, computer equipment and storage medium
CN111598577B (en) Resource transfer method, device, computer equipment and storage medium
CN113129020A (en) 5G message identity authentication system and method based on Internet of things
CN113420133A (en) Session processing method, device, equipment and storage medium
CN110705990A (en) Verification method, verification device, terminal and storage medium
CN112861099A (en) Data processing method and device
CN117035779A (en) Account upgrading method, account upgrading device, computer equipment and storage medium
CN110874579A (en) Business execution method and device based on handwriting verification
JP2008217722A (en) Contract receiving system
CN117372001A (en) Resource transfer method, apparatus, device, storage medium, and program product
CN118171252A (en) Identity recognition method, identity recognition device, computer equipment and storage medium
CN116629797A (en) Method and device for processing resource data, computer equipment and storage medium
CN115348410A (en) Data processing method, device, equipment and medium
CN111667274A (en) Authentication method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination