Identity verification system and method based on voiceprint recognition

A voiceprint recognition and voiceprint technology, which is applied in the field of identity verification system based on voiceprint recognition, can solve the problem of time-consuming identity verification

Pending Publication Date: 2020-10-27
重庆富民银行股份有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The present invention aims to provide an identity verification system and method based on

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification system and method based on voiceprint recognition

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0031] Example one

[0032] The identity verification system based on voiceprint recognition includes the client, server and back-end terminal. The client is the Huawei P40 mobile phone used by the customer. The server is a Dell EMC PowerEdge T30 micro-tower server, and the back-end terminal is a Lenovo all-in-one computer; figure 1 As shown, the server includes an input module, a database, a processing module, and an output module. The input module is used to obtain the current voiceprint model sent by the client during a call; the database is used to pre-store the sample voiceprint model of the client; The module is used to receive the current voiceprint model and process the current voiceprint model according to the sample voiceprint model. If the current voiceprint model does not match the sample voiceprint model, the first warning message will be generated; otherwise, the verification message will be generated ; Output module, used to send the first alarm information and the...

Example Embodiment

[0042] Example two

[0043] Compared with the first embodiment, the only difference is that the database is also used to store the voiceprint models of blacklisted users; the processing module is used to determine the current voiceprint model according to the blacklisted voiceprint model. If the voiceprint model is the same, the second alarm information is generated. Specifically, since customer B is judged to maliciously use the identity of another person to apply for credit business, the voiceprint model of customer B is stored in the database as a blacklist; it is convenient for subsequent identification and matching of the voiceprint model to obtain the result The second warning message is "This user is a blacklisted user, and is suspected of defrauding customers, please be alert!", the auditor will conduct further identity verification and verification.

Example Embodiment

[0044] Example three

[0045] Compared with the first embodiment, the only difference is that the input module is also used to obtain the short message data of the user side; the preprocessing module is also used to filter the short message data in the user side and extract the keyword information in the short message data , Extract the short message data whose keywords include finance or credit to generate the target to be verified; the processing module is also used for semantic analysis of the target to be verified. When the result of the semantic analysis is a positive result, it is recorded as a positive one; otherwise , It is recorded as minus one point; the output module is also used to receive the standard scores pre-stored in the database, and calculate the scores according to the semantic analysis results to obtain score information; if the score information is less than the first preset threshold, mark the user as high Risk users, and send user information to the user ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of voiceprint recognition and particularly relates to an identity verification system and method based on voiceprint recognition. The identity verificationsystem based on voiceprint recognition comprises a client, a server and a background terminal, the server comprises an input module, a database, a processing module and an output module, and the input module is used for obtaining a current voiceprint model sent by the client in the conversation process; the database is used for pre-storing a sample voiceprint model of the client; the processing module is used for receiving the current voiceprint model, processing the current voiceprint model according to the sample voiceprint model, and generating first alarm information if the current voiceprint model is not matched with the sample voiceprint model; otherwise, generating verification passing prompt information; the output module is used for sending first alarm information and verification passing prompt information to the background terminal; by adopting the scheme, the problem of long time consumption of identity verification can be solved.

Description

technical field [0001] The invention relates to the technical field of voiceprint recognition, in particular to an identity verification system and method based on voiceprint recognition. Background technique [0002] At present, in the credit review of Internet credit business, for some specific customer groups, in addition to using models and strategies to make automatic system judgments, auditors are also required to conduct electronic verification operations on customers by phone. This operation is mainly performed manually by auditors. The speech script is used to conduct comprehensive investigations on customers such as identity verification, loan purpose verification, repayment willingness and repayment ability verification. However, due to the manual review process, the reviewer communicates with the relevant customers through the phone according to the script, which takes a long time and requires the same communication process for each customer, especially for custo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/40G06Q40/02G10L15/26G10L17/00G10L25/15
CPCG06Q20/40145G10L15/26G10L17/00G10L25/15G06Q40/03
Inventor 何寒曦
Owner 重庆富民银行股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products