Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Voice fraud identification method and apparatus, terminal equipment and storage medium

A recognition method and voice technology, applied in voice analysis, automatic switching office, telephone communication, etc., can solve the problems of low efficiency and high labor cost, and achieve the effect of high processing efficiency and saving labor cost

Inactive Publication Date: 2018-02-09
PING AN TECH (SHENZHEN) CO LTD
View PDF8 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Embodiments of the present invention provide a voice fraud recognition method, device, terminal equipment, and storage medium to solve the problems of low efficiency and high labor costs in identifying fraudulent behavior by manual quality inspection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice fraud identification method and apparatus, terminal equipment and storage medium
  • Voice fraud identification method and apparatus, terminal equipment and storage medium
  • Voice fraud identification method and apparatus, terminal equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] figure 1 A flow chart of the voice fraud recognition method in this embodiment is shown. The voice fraud recognition method is applied in the terminal equipment of financial institutions such as banks, securities, insurance, P2P, or other institutions that need voice fraud recognition, and is used to realize the intelligent recognition of the speaker's voice information to be tested, so as to identify the speaker Whether fraudulent activities are being committed. Such as figure 1 Shown, this speech fraud recognition method comprises the steps:

[0032] S10: Obtain the voice information to be tested.

[0033] Wherein, the voice information to be tested is the voice information of the speaker collected by the terminal device. The voice information to be tested may be voice information in wav, mp3 or other formats. Understandably, each voice information to be tested is associated with a user ID, and the user ID is an identifier for uniquely identifying the speaker of ...

Embodiment 2

[0119] Figure 8 A functional block diagram of a voice fraud recognition device corresponding to the voice fraud recognition method in Embodiment 1 is shown. Such as Figure 8 As shown, the voice fraud recognition device includes a test voice acquisition module 10 , a voice feature acquisition module 20 , an identity verification acquisition module 30 , a lie verification acquisition module 40 , a fraud risk assessment module 50 and an assessment result sending module 60 . Wherein, the implementation functions of the voice acquisition module 10 to be tested, the voice feature acquisition module 20, the identity verification acquisition module 30, the lie verification acquisition module 40, the fraud risk assessment module 50 and the assessment result transmission module 60 are the same as the voice fraud recognition method in Embodiment 1 The corresponding steps S10-S60 or steps S10'-S60' are in one-to-one correspondence, and to avoid redundant description, this embodiment do...

Embodiment 3

[0148] This embodiment provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium. When the computer program is executed by a processor, the voice fraud recognition method in Embodiment 1 is implemented. To avoid repetition, details are not repeated here. Alternatively, when the computer program is executed by the processor, the functions of the modules / units in the voice fraud recognition in Embodiment 2 are realized, and to avoid repetition, details are not repeated here.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a voice fraud identification method and an apparatus, terminal equipment and a storage medium. The voice fraud identification method comprises the following steps of acquiringvoice information to be measured; carrying out characteristic extraction on the voice information to be measured and acquiring a voice characteristic; using an identity confirmation model to carry outidentity verification on the voice characteristic and acquiring identity verification information; using a lie monitoring model to carry out lie verification on the voice characteristic and acquiringlie verification information; and based on the identity verification information and the lie verification information, acquiring a fraud risk assessment result. When the voice fraud identification method is used to carry out voice fraud identification, advantages of high efficiency, high accuracy and low labor cost are possessed.

Description

technical field [0001] The invention relates to the field of voice processing, in particular to a voice fraud recognition method, device, terminal equipment and storage medium. Background technique [0002] In banks, securities, insurance, P2P and other financial institutions, anti-fraud services are used to identify fraudulent behaviors of malicious users, so as to solve the threat of fraud encountered in business links such as payment, lending, wealth management, and risk control, and achieve the goal of reducing losses. Among them, the anti-fraud service is a service for identifying fraudulent activities including transaction fraud, network fraud, telephone fraud, card theft and number theft. At present, financial institutions are equipped with quality inspectors to monitor and identify the content of calls between service personnel and customers, and to determine whether customers are engaging in fraudulent behavior through whether customers are lying, so as to achieve t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G10L17/26G10L17/04G10L17/16G10L17/18
CPCG10L17/04G10L17/16G10L17/18G10L17/26H04M2203/6027H04M2203/6045
Inventor 梁浩王健宗肖京
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products