Voice fraud identification method and apparatus, terminal equipment and storage medium
A recognition method and voice technology, applied in voice analysis, automatic switching office, telephone communication, etc., can solve the problems of low efficiency and high labor cost, and achieve the effect of high processing efficiency and saving labor cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0030] Example 1
[0031] figure 1 The flowchart of the voice fraud recognition method in this embodiment is shown. The voice fraud recognition method is applied to the terminal equipment of financial institutions such as banks, securities, insurance, P2P, or other institutions that need to perform voice fraud recognition, and is used to realize intelligent recognition of the voice information of the speaker to be tested to identify the speaker Whether fraud is being committed. Such as figure 1 As shown, the voice fraud recognition method includes the following steps:
[0032] S10: Obtain the voice information to be tested.
[0033] Among them, the voice information to be tested is the speaker's voice information collected by the terminal device. The voice information to be tested may be voice information in wav, mp3 or other formats. Understandably, each voice information to be tested is associated with a user ID, and the user ID is an identifier used to uniquely identify the sp...
Example Embodiment
[0118] Example 2
[0119] Picture 8 The principle block diagram of the voice fraud recognition device corresponding to the voice fraud recognition method in Embodiment 1 is shown. Such as Picture 8 As shown, the voice fraud recognition device includes a voice acquisition module 10 to be tested, a voice feature acquisition module 20, an identity verification acquisition module 30, a lie verification acquisition module 40, a fraud risk assessment module 50, and an assessment result sending module 60. Among them, the implementation functions of the voice acquisition module 10 to be tested, the voice feature acquisition module 20, the identity verification acquisition module 30, the lie verification acquisition module 40, the fraud risk assessment module 50, and the assessment result sending module 60 are the same as those of the voice fraud recognition method in Embodiment 1. Corresponding steps S10-S60 or steps S10'-S60' are in one-to-one correspondence, and in order to avoid red...
Example Embodiment
[0147] Example 3
[0148] This embodiment provides a computer-readable storage medium on which a computer program is stored. When the computer program is executed by a processor, it implements the voice fraud recognition method in Embodiment 1. In order to avoid repetition, it will not be repeated here. Alternatively, when the computer program is executed by the processor, the function of each module / unit in the speech fraud recognition in Embodiment 2 is realized. To avoid repetition, details are not repeated here.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap