Voice fraud identification method and apparatus, terminal equipment and storage medium

A recognition method and voice technology, applied in voice analysis, automatic switching office, telephone communication, etc., can solve the problems of low efficiency and high labor cost, and achieve the effect of high processing efficiency and saving labor cost

Inactive Publication Date: 2018-02-09
PING AN TECH (SHENZHEN) CO LTD
View PDF8 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Embodiments of the present invention provide a voice fraud recognition method, device, terminal equipment, and storage med

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice fraud identification method and apparatus, terminal equipment and storage medium
  • Voice fraud identification method and apparatus, terminal equipment and storage medium
  • Voice fraud identification method and apparatus, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0030] Example 1

[0031] figure 1 The flowchart of the voice fraud recognition method in this embodiment is shown. The voice fraud recognition method is applied to the terminal equipment of financial institutions such as banks, securities, insurance, P2P, or other institutions that need to perform voice fraud recognition, and is used to realize intelligent recognition of the voice information of the speaker to be tested to identify the speaker Whether fraud is being committed. Such as figure 1 As shown, the voice fraud recognition method includes the following steps:

[0032] S10: Obtain the voice information to be tested.

[0033] Among them, the voice information to be tested is the speaker's voice information collected by the terminal device. The voice information to be tested may be voice information in wav, mp3 or other formats. Understandably, each voice information to be tested is associated with a user ID, and the user ID is an identifier used to uniquely identify the sp...

Example Embodiment

[0118] Example 2

[0119] Picture 8 The principle block diagram of the voice fraud recognition device corresponding to the voice fraud recognition method in Embodiment 1 is shown. Such as Picture 8 As shown, the voice fraud recognition device includes a voice acquisition module 10 to be tested, a voice feature acquisition module 20, an identity verification acquisition module 30, a lie verification acquisition module 40, a fraud risk assessment module 50, and an assessment result sending module 60. Among them, the implementation functions of the voice acquisition module 10 to be tested, the voice feature acquisition module 20, the identity verification acquisition module 30, the lie verification acquisition module 40, the fraud risk assessment module 50, and the assessment result sending module 60 are the same as those of the voice fraud recognition method in Embodiment 1. Corresponding steps S10-S60 or steps S10'-S60' are in one-to-one correspondence, and in order to avoid red...

Example Embodiment

[0147] Example 3

[0148] This embodiment provides a computer-readable storage medium on which a computer program is stored. When the computer program is executed by a processor, it implements the voice fraud recognition method in Embodiment 1. In order to avoid repetition, it will not be repeated here. Alternatively, when the computer program is executed by the processor, the function of each module / unit in the speech fraud recognition in Embodiment 2 is realized. To avoid repetition, details are not repeated here.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a voice fraud identification method and an apparatus, terminal equipment and a storage medium. The voice fraud identification method comprises the following steps of acquiringvoice information to be measured; carrying out characteristic extraction on the voice information to be measured and acquiring a voice characteristic; using an identity confirmation model to carry outidentity verification on the voice characteristic and acquiring identity verification information; using a lie monitoring model to carry out lie verification on the voice characteristic and acquiringlie verification information; and based on the identity verification information and the lie verification information, acquiring a fraud risk assessment result. When the voice fraud identification method is used to carry out voice fraud identification, advantages of high efficiency, high accuracy and low labor cost are possessed.

Description

technical field [0001] The invention relates to the field of voice processing, in particular to a voice fraud recognition method, device, terminal equipment and storage medium. Background technique [0002] In banks, securities, insurance, P2P and other financial institutions, anti-fraud services are used to identify fraudulent behaviors of malicious users, so as to solve the threat of fraud encountered in business links such as payment, lending, wealth management, and risk control, and achieve the goal of reducing losses. Among them, the anti-fraud service is a service for identifying fraudulent activities including transaction fraud, network fraud, telephone fraud, card theft and number theft. At present, financial institutions are equipped with quality inspectors to monitor and identify the content of calls between service personnel and customers, and to determine whether customers are engaging in fraudulent behavior through whether customers are lying, so as to achieve t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G10L17/26G10L17/04G10L17/16G10L17/18
CPCG10L17/04G10L17/16G10L17/18G10L17/26H04M2203/6027H04M2203/6045
Inventor 梁浩王健宗肖京
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products