Voice verification method, voice verification device, computer equipment and storage medium

A voice verification and voice information technology, applied in the field of security verification, can solve the problems of inability to guarantee verification security and inability to identify, and achieve the effect of ensuring validity and authenticity, improving security, and ensuring authenticity

Pending Publication Date: 2019-05-24
PING AN TECH (SHENZHEN) CO LTD
View PDF14 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the effectiveness of this voice recognition verification technology is based on the premise of the authenticity of the user. It is impossible to identify whether the current voice content is sent by a real human or by an intelligent AI. After the voice content is deciphered, the intelligent AI imitates the human voice. Verification message voice, so the security of this verification cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Voice verification method, voice verification device, computer equipment and storage medium
  • Voice verification method, voice verification device, computer equipment and storage medium
  • Voice verification method, voice verification device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention.

[0073] In some processes described in the specification and claims of the present invention and the above-mentioned drawings, a plurality of operations appearing in a specific order are contained, but it should be clearly understood that these operations may not be performed in the order in which they appear herein Execution or parallel execution, the serial numbers of the operations, such as 101, 102, etc., are only used to distinguish different operations, and the serial numbers themselves do not represent any execution order. Additionally, these processes can include more or fewer operations, and these operations can be performed sequentially or in parallel. It should be n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention discloses a voice verification method, a voice verification device, computer equipment and a storage medium. The method includes the steps: acquiring verification voiceinformation; judging whether a voice content is a preset sound category or not according to the verification voice information; determining that voice verification fails when judging that the voice content does not belong to the preset sound category. The verification voice information is the voice content acquired by a target terminal when a verification user reads the verification information, and the preset sound category is sound classification representing the voice content of human voice. The method verifies whether the verification voice is real human voice or not, malicious users suchas a machine, AI (artificial intelligence) and crawlers can be effectively removed, attack of the malicious users to networks and platforms is prevented, validity and reality of verification users areensured, and voice verification safety is improved.

Description

technical field [0001] The invention relates to the technical field of safety verification, in particular to a voice verification method, device, computer equipment and storage medium. Background technique [0002] The traditional voice verification system directly calls the user client after receiving the verification request, broadcasts the verification information to the user client through voice broadcast, and the user returns to the client to fill in and verify the verification information after obtaining the verification information. During the operation process of voice verification, the user needs to listen to the verification information and record the verification information, and then return to the user client to fill in the verification information. This operation process is too cumbersome; at the same time, the verification information broadcast by voice generally only supports numbers The content of the information has certain limitations, so there is a certain...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G10L17/18G10L17/22G10L17/04G10L25/51G10L25/30G06F21/32
CPCG10L17/18G10L25/51G10L25/30G06F21/32G10L17/22G10L17/04
Inventor 黎立桂
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products