Nothing Special   »   [go: up one dir, main page]

WO2021135549A1 - Service item processing permissions authorization method and apparatus, computer device, and storage medium - Google Patents

Service item processing permissions authorization method and apparatus, computer device, and storage medium Download PDF

Info

Publication number
WO2021135549A1
WO2021135549A1 PCT/CN2020/123209 CN2020123209W WO2021135549A1 WO 2021135549 A1 WO2021135549 A1 WO 2021135549A1 CN 2020123209 W CN2020123209 W CN 2020123209W WO 2021135549 A1 WO2021135549 A1 WO 2021135549A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
voice
data
keyword
voiceprint
Prior art date
Application number
PCT/CN2020/123209
Other languages
French (fr)
Chinese (zh)
Inventor
范灿华
马骏
王少军
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2021135549A1 publication Critical patent/WO2021135549A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/22Procedures used during a speech recognition process, e.g. man-machine dialogue
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/28Constructional details of speech recognition systems
    • G10L15/30Distributed recognition, e.g. in client-server systems, for mobile phones or network applications
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/22Interactive procedures; Man-machine interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Definitions

  • This application relates to the field of artificial intelligence biometric technology, and in particular to a method, device, computer equipment, and storage medium for authorization of matter handling authority.
  • intelligent dialogue systems using speech recognition technology have been more and more widely used.
  • a telecom service scenario when a user conducts a voice dialogue with an intelligent dialogue system, he can handle various telecom business-related matters, such as recharging phone bills, processing traffic packages, and so on.
  • a banking business scenario when a user conducts a voice dialogue with an intelligent dialogue system, he can handle various banking-related matters, such as deposit balance inquiry, appointment of large withdrawal time, and modification of withdrawal password.
  • the inventor realizes that the existing intelligent dialogue system has the following problems:
  • the embodiment of the application provides a method, device, computer equipment and storage medium for authorization of transaction handling authority, aiming to solve the problem that the intelligent dialogue system in the prior art recognizes the user's identity based on the user password, and the intelligent dialogue system pronounces the user
  • the standards and system use proficiency are high, resulting in low user data security and low data processing efficiency.
  • the embodiment of the application provides a method for authorization of transaction handling authority, which includes:
  • voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, use the corresponding voiceprint feature as the target voiceprint feature to obtain the target user identity information corresponding to the target voiceprint feature;
  • the corresponding keyword set is obtained by sequentially performing text segmentation and keyword extraction on the voice text data;
  • the keyword set includes the first keyword sub-set corresponding to authorized others to handle, obtain the authorized person's name, the authorized person's verification code, and the authorized item name included in the first keyword sub-set;
  • Receive current target item data corresponding to the current target item process data sent by the client or other client terminals.
  • an embodiment of the present application provides a matter handling authority authorization device, which includes:
  • the user voice extraction unit is configured to perform voice recognition and voiceprint recognition on the user voice data if the user voice data and the user communication identification code sent by the user terminal are received to obtain the voice text data and the voice text data corresponding to the user voice data.
  • Voice voiceprint characteristics
  • the voiceprint feature comparison unit is used to determine whether there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database;
  • the target user identity acquiring unit is configured to, if there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, use the corresponding voiceprint feature as the target voiceprint feature to obtain the corresponding voiceprint feature Target user identity information;
  • the voice keyword extraction unit is used to obtain the unique user identification code by sequentially performing text word segmentation and keyword extraction on the voice text data if the user unique identification information corresponding to the user communication identification code and the target user identification information have the same unique user identification code Corresponding keyword set;
  • the keyword judgment unit is used to judge whether the keyword set includes the first keyword sub-set corresponding to authorized others to handle;
  • the authorized person information obtaining unit is used to obtain the name of the authorized person and the authorized person included in the first keyword sub-set if the keyword set includes a first keyword sub-set corresponding to authorized others to handle Verification code and authorized item name;
  • the current target item process data sending unit is used to call the corresponding current target item process data according to the received current user voice data corresponding to the first keyword subset sent by the user terminal or other user terminals, and transfer the The current target item process data is sent to the client or other clients in sequence in the sequence of the process;
  • the current target item data receiving unit is configured to receive the current target item data corresponding to the current target item process data sent by the user terminal or other user terminals.
  • an embodiment of the present application provides a computer device, which includes a memory, a processor, and a computer program stored on the memory and running on the processor, and the processor executes the computer The following steps are implemented during the program:
  • voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, use the corresponding voiceprint feature as the target voiceprint feature to obtain the target user identity information corresponding to the target voiceprint feature;
  • the corresponding keyword set is obtained by sequentially performing text segmentation and keyword extraction on the voice text data;
  • the keyword set includes the first keyword sub-set corresponding to authorized others to handle, obtain the authorized person's name, the authorized person's verification code, and the authorized item name included in the first keyword sub-set;
  • Receive current target item data corresponding to the current target item process data sent by the client or other client terminals.
  • the embodiments of the present application also provide a computer-readable storage medium, wherein the computer-readable storage medium stores a computer program, which when executed by a processor causes the processor to perform the following operations :
  • voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, use the corresponding voiceprint feature as the target voiceprint feature to obtain the target user identity information corresponding to the target voiceprint feature;
  • the corresponding keyword set is obtained by sequentially performing text segmentation and keyword extraction on the voice text data;
  • the keyword set includes the first keyword sub-set corresponding to authorized others to handle, obtain the authorized person's name, the authorized person's verification code, and the authorized item name included in the first keyword sub-set;
  • Receive current target item data corresponding to the current target item process data sent by the client or other client terminals.
  • the embodiment of the application provides a method, device, computer equipment, and storage medium for authorization of transaction handling authority, including if the server confirms the user's identity through voiceprint recognition, the keyword set corresponding to the user's user voice data includes the set of keywords that are related to authorized others to handle the transaction.
  • the authorized person name, authorized person verification code and authorized item name included in the first keyword sub-set if the current user sent by the client or other client is received Voice data, obtain the current user’s name and current verification code corresponding to the current user’s voice data through voice recognition and keyword extraction, if the current user’s name is the same as the authorized person’s name and the current verification
  • the code is the same as the authorized person’s verification code, calling the current target item process data stored locally and corresponding to the authorized item name, and sending the current target item process data to the client or other clients in sequence in the process sequence .
  • the method realizes user identity verification based on voiceprint recognition, and can help others with high proficiency in handling entrusted matters by voice authorization, which not only improves the security of user data, but also improves the efficiency of data processing.
  • Fig. 1 is a schematic diagram of an application scenario of a method for authorization of matter handling authority provided by an embodiment of the application;
  • Figure 2 is a schematic flow chart of a method for authorization of matter handling authority provided by an embodiment of the application
  • Fig. 3 is a schematic block diagram of a matter handling authority authorization device provided by an embodiment of the application.
  • Fig. 4 is a schematic block diagram of a computer device provided by an embodiment of the application.
  • Figure 1 is a schematic diagram of the application scenario of the matter handling authority authorization method provided by an embodiment of the application
  • Figure 2 is a schematic flow diagram of the matter handling authorization authorization method provided by an embodiment of the application. The method is applied to a server, and the method is executed by application software installed in the server.
  • the method includes steps S110 to S180.
  • the user side is an intelligent terminal used by the user (such as a terminal such as a smart phone).
  • the user can use the intelligent dialogue system provided by the user side and the server to communicate with each other to achieve specific matters. That is, the user terminal can send the collected user voice to the server.
  • the second is the server.
  • the server handles various matters by combining the voice recognition function and voiceprint recognition function of the local intelligent dialogue system with the received user voice sent by the user terminal.
  • the server receives the user voice data and the user communication identification code sent by the user terminal, it means that the user can communicate with the intelligent dialogue system deployed on the server side after establishing a connection with the server through the user terminal at this time. Since the user side generally uses phone calls or application software with communication functions (such as WeChat, etc.) to establish a connection with the intelligent dialogue system, the server side can recognize the user communication identification code (the communication identification code can be a phone number or It is the WeChat ID code, etc.). Since the user communication identification code is generally bound to the user's unique identification information (such as the ID number), the server side can use the user communication identification code to make the initial judgment of the user's identity.
  • step S110 includes:
  • the server when the server receives the user voice data sent by the user terminal, it can call a pre-stored voice recognition model (such as the N-gram voice recognition model, etc., where the N-gram voice recognition model is the N element Model) to perform voice recognition on the user voice data to obtain corresponding voice text data.
  • a pre-stored voice recognition model such as the N-gram voice recognition model, etc., where the N-gram voice recognition model is the N element Model
  • the server also performs voiceprint recognition on the user's voice data by calling a pre-stored voiceprint recognition model (such as a mixed Gaussian-universal background model, etc.) to obtain voice voiceprint features.
  • a pre-stored voiceprint recognition model such as a mixed Gaussian-universal background model, etc.
  • the follow-up transaction processing process can be carried out based on these recognition results.
  • S120 Determine whether there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database.
  • the voiceprint features of a large number of users are stored in the voiceprint database, and the voiceprint database is locally on the server, when the voice and voiceprint features of the current user are acquired, the user’s identity needs to be checked. Verify.
  • the target user's identity information corresponding to the target voiceprint feature can be acquired.
  • step S120 the method further includes:
  • the user's voiceprint feature and the user's voice and text data are correspondingly data-bound to upload to the blockchain for storage.
  • the server will ask the user to register the user for the first time with the text read aloud in the example and his real user identity.
  • the example text is *** and the ID number is ***” to prompt the user to record the user according to the voice template
  • the first prompt message of the initial voice is sent to the user terminal.
  • the user’s initial voice data sent by the user terminal according to the first prompt information is received by the server.
  • the server performs voiceprint recognition and text recognition on the user’s initial voice data to obtain the user voiceprint corresponding to the user’s initial voice data.
  • step S110 Perform voiceprint recognition and text recognition on the user's initial voice data in the same manner as in step S110 to obtain user voiceprint features and user voice text data corresponding to the user's initial voice data.
  • step S110 Perform voiceprint recognition and text recognition on the user's initial voice data in the same manner as in step S110 to obtain user voiceprint features and user voice text data corresponding to the user's initial voice data.
  • the user voice text data extracted based on the user voice text data and the previously obtained user voiceprint features are uploaded to the blockchain for storage after corresponding to the same user identity information.
  • the corresponding summary information is obtained based on the user's voiceprint features and the user's voice and text data.
  • the summary information is obtained by hashing the user's voiceprint features and the user's voice and text data, such as using Sha256 algorithm is processed.
  • Uploading summary information to the blockchain can ensure its security and fairness and transparency to users.
  • the user equipment can download the summary information from the blockchain to verify whether the user's voiceprint characteristics and the user's voice and text data have been tampered with.
  • the blockchain referred to in this example is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm.
  • Blockchain essentially a decentralized database, is a series of data blocks associated with cryptographic methods. Each data block contains a batch of network transaction information for verification. The validity of the information (anti-counterfeiting) and the generation of the next block.
  • the blockchain can include the underlying platform of the blockchain, the platform product service layer, and the application service layer.
  • the user's unique identification information corresponding to the user communication identification code has the same unique user identification code as the target user's identification information, it means that the user himself is communicating with the intelligent dialogue system, and the user himself can continue to do so.
  • step S140 includes:
  • a text word segmentation result is obtained by performing text word segmentation on the voice text data based on a probability statistical word segmentation model, and a corresponding keyword set is obtained by keyword extraction on the text word segmentation result by a word frequency-inverse document frequency model.
  • the speech text data is segmented by text content based on the probability statistical word segmentation model to obtain the corresponding text word segmentation result, and then the text word segmentation result is extracted by keyword extraction through the word frequency-inverse document frequency model The corresponding keyword set.
  • the word segmentation model based on probability statistics and the word frequency-reverse document frequency model are relatively mature existing technologies, and will not be discussed here.
  • the word frequency-inverse document frequency model also called the word frequency-inverse text frequency index model, that is, the TF-IDF model
  • the word frequency-inverse text frequency index model that is, the TF-IDF model
  • the keyword segmentation results of the text are sorted in descending order of word frequency-inverse text frequency index, and keywords that are located before the preset ranking value are extracted to form a keyword set.
  • S150 Determine whether the keyword set includes a first keyword sub-set corresponding to authorized others to handle the processing.
  • the keyword set includes the [authorization***Handle*** Matters authorized person verification code ***] the first keyword sub-collection. If the keyword set includes the first keyword sub-set, it means that the user clearly stated that other people are needed to handle the matter during the communication process, and the subsequent steps of entrusting others to handle the matter can be continued at this time. If the keyword set does not include the first keyword sub-set, it means that the user has not clearly stated that other people are required to handle the matter in the communication process, and the user himself will continue to handle the matter by default.
  • the keyword set includes a first keyword sub-set corresponding to authorized others to handle the processing, obtain the authorized person's name, authorized person verification code, and authorized item name included in the first keyword sub-set .
  • the keyword set includes the first keyword sub-set corresponding to authorized others, it means that the intelligent dialogue system in the server at this time knows that the current matter is that the principal authorizes the authorized person to help it.
  • processing in order to verify the identity of the authorized person, there can be double verification, one is to obtain the authorized person's name, and the other is to obtain the authorized person's verification code.
  • the name of the authorized person is included in the user's voice data formed by the authorized person during the conversation, and the user's voice data also includes the authorized person's verification code and the name of the authorized item.
  • the authorized person Since the authorized person may be at the same place as the principal at this time, the authorized person can continue to use the client terminal of the principal to continue handling matters.
  • This scenario is similar to that the user is not proficient in using the terminal or has a low level of professional knowledge.
  • the staff of the business hall can directly tell the older users to say the text segment of the entrusted *** deal with the matters in the process of communicating with the intelligent dialogue system, and the business hall will work at this time The personnel can continue to use the user's client to continue to help them handle matters.
  • the staff of the business hall uses other user terminals (the other user terminals may be the user terminals used by the staff of the business hall themselves, and are not the same terminal as the client used by the client).
  • the authorized person when the principal authorizes the authorized person to handle matters, the authorized person communicates with the intelligent dialogue system in the server through the client terminal of the principal or another client terminal used by the authorized person. , So as to send the current user's voice data to the server. At this time, the corresponding current target item process data is called in the server, and the current target item process data is sequentially sent to the user terminal or other user terminals in the sequence of the process, so as to realize the authorization of others to handle the item.
  • step S170 includes:
  • the current user voice data sent by the user terminal or other user terminals is received, through voice recognition and keyword extraction, the current user name and current verification code corresponding to the current user voice data are obtained;
  • the current target item process data stored locally and corresponding to the authorized item name
  • the process data of the current target item is sent to the client or other clients in sequence in the sequence of the process.
  • the current user voice data corresponding to the current user’s voice data is obtained through voice recognition. Refer to step S140 for the process of user name and current verification code, voice recognition and keyword acquisition.
  • the authorized person can follow the current target item process data sent by the server as a guide, so as to quickly handle the item.
  • S180 Receive current target item data corresponding to the current target item process data sent by the client or other client terminals.
  • the corresponding data is fed back to each sub-process in the current target item process data, and the corresponding current target item data is formed, At this time, the current target item data can be stored in the server.
  • voiceprint recognition can also be performed on the current user's voice data to obtain voiceprint features corresponding to the authorized person.
  • the authorized person communicates with the intelligent dialogue system to handle matters at other times, there is no need to repeat the voiceprint feature registration of the authorized person.
  • the principal can supplement the registration of his user identity information.
  • the principal can continue to cancel the authorized person's authority to handle matters through the communication with the intelligent dialogue system, and can say "I want to remove the authority to handle **", then the previous authorized person cannot handle the authorized person's authority again matter.
  • step S180 the method further includes:
  • the current target item process data that each user handles or entrusts others to handle can be uploaded to the blockchain network for storage, making full use of the non-tampering feature of the blockchain to realize the Matters deal with the storage of data.
  • step S150 the method further includes:
  • the keyword set does not include the first keyword sub-set corresponding to authorized others to handle, obtain the second keyword sub-set corresponding to the item type included in the keyword set;
  • the keyword set does not include the first keyword sub-set, it means that the user did not clearly indicate that other people are required to handle the matter during this communication process, and the user himself/herself will continue to handle the matter by default.
  • the second keyword sub-set corresponding to the item type included in the keyword set can be obtained, and the second keyword sub-set determines the user’s waiting list. Do things. Obtain target item flow data corresponding to the user's to-do items in the item flow data respectively corresponding to various to-do items stored in advance by the server.
  • target item process data corresponding to the user's to-do items.
  • These target process item data generally include many item handling steps. In each step, the user is prompted to make a yes or no choice, or provide some user information At this time, in order to guide the user to handle matters, the process data of the target matters are sent to the user terminal in sequence according to the process sequence.
  • the target item process data is sent to the user terminal in sequence according to the process sequence
  • the first sub-step data of the item therein is first sent to the user terminal, and the user terminal will give feedback on the first item step sub-data.
  • the second sub-step data of the item will continue to be pushed, and the subsequent processing process is analogous to that until the user completes the current item according to the target item process data .
  • the target item data can be stored in the server at this time ,
  • the server can also upload the target item data to the blockchain network for storage.
  • the method realizes user identity verification based on voiceprint recognition, and can help others with high proficiency in handling entrusted matters by voice authorization, which not only improves the security of user data, but also improves the efficiency of data processing.
  • the embodiment of the present application also provides a matter handling authority authorization device, which is used to execute any embodiment of the aforementioned matter handling authority authorization method.
  • FIG. 3 is a schematic block diagram of a matter handling authority authorization device provided in an embodiment of the present application.
  • the matter handling authority authorization device 100 may be configured in a server.
  • the matter handling authority authorization device 100 includes: a user voice extraction unit 110, a voiceprint feature comparison unit 120, a target user identity acquisition unit 130, a voice keyword extraction unit 140, a keyword judgment unit 150, and an authorized unit.
  • the user voice extraction unit 110 is used to determine whether a form start instruction is detected.
  • the server receives the user voice data and the user communication identification code sent by the user terminal, it means that the user can communicate with the intelligent dialogue system deployed on the server side after establishing a connection with the server through the user terminal at this time. Since the user side generally uses phone calls or application software with communication functions (such as WeChat, etc.) to establish a connection with the intelligent dialogue system, the server side can recognize the user communication identification code (the communication identification code can be a phone number or It is the WeChat ID code, etc.). Since the user communication identification code is generally bound to the user's unique identification information (such as the ID number), the server side can use the user communication identification code to make the initial judgment of the user's identity.
  • the user voice extraction unit 110 is further configured to:
  • the server when the server receives the user voice data sent by the user terminal, it can call a pre-stored voice recognition model (such as the N-gram voice recognition model, etc., where the N-gram voice recognition model is the N element Model) to perform voice recognition on the user voice data to obtain corresponding voice text data.
  • a pre-stored voice recognition model such as the N-gram voice recognition model, etc., where the N-gram voice recognition model is the N element Model
  • the server also performs voiceprint recognition on the user's voice data by calling a pre-stored voiceprint recognition model (such as a mixed Gaussian-universal background model, etc.) to obtain voice voiceprint features.
  • a pre-stored voiceprint recognition model such as a mixed Gaussian-universal background model, etc.
  • the follow-up transaction processing process can be carried out based on these recognition results.
  • the voiceprint feature comparison unit 120 is used to determine whether there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database.
  • the voiceprint features of a large number of users are stored in the voiceprint database, and the voiceprint database is locally on the server, when the voice and voiceprint features of the current user are acquired, the user’s identity needs to be checked. Verify.
  • the target user identity acquiring unit 130 is configured to, if there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, use the corresponding voiceprint feature as the target voiceprint feature to obtain the target voiceprint feature correspondence The identity information of the target user.
  • the target user's identity information corresponding to the target voiceprint feature can be acquired.
  • the device 100 for authorization of transaction handling authority further includes:
  • the first prompt information sending unit is configured to send the first prompt information for recording the user's initial voice according to the voice template to the user terminal if there is no voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database;
  • the user's initial voice data receiving unit is configured to receive the user's initial voice data sent by the user terminal according to the first prompt information; wherein, the user's initial voice data includes the user's name and ID number;
  • An initial voice extraction unit configured to perform voiceprint recognition and text recognition according to the user's initial voice data to obtain user voiceprint features and user voice text data corresponding to the user's initial voice data;
  • the initial voice keyword extraction unit is used to perform word segmentation and keyword extraction on the user voice text data to obtain user identity information corresponding to the user voice text data;
  • the initial data registration unit is used to bind the user's voiceprint characteristics and the user's voice and text data correspondingly to upload them to the blockchain for storage.
  • the server will ask the user to register the user for the first time with the text read aloud in the example and his real user identity.
  • the example text is *** and the ID number is ***" to prompt the user to record the user according to the voice template
  • the first prompt message of the initial voice is sent to the user terminal.
  • the user’s initial voice data sent by the user terminal according to the first prompt information is received by the server.
  • the server performs voiceprint recognition and text recognition on the user’s initial voice data to obtain the user voiceprint corresponding to the user’s initial voice data.
  • the voiceprint recognition and text recognition are performed on the user's initial voice data in the same manner with reference to the user voice extraction unit 110 to obtain user voiceprint features and user voice text data corresponding to the user's initial voice data.
  • the user voice text data extracted based on the user voice text data and the previously obtained user voiceprint features are uploaded to the blockchain for storage after corresponding to the same user identity information.
  • the corresponding summary information is obtained based on the user's voiceprint features and the user's voice and text data.
  • the summary information is obtained by hashing the user's voiceprint features and the user's voice and text data, such as using Sha256 algorithm is processed.
  • Uploading summary information to the blockchain can ensure its security and fairness and transparency to users.
  • the user equipment can download the summary information from the blockchain to verify whether the user's voiceprint characteristics and the user's voice and text data have been tampered with.
  • the blockchain referred to in this example is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm.
  • Blockchain essentially a decentralized database, is a series of data blocks associated with cryptographic methods. Each data block contains a batch of network transaction information for verification. The validity of the information (anti-counterfeiting) and the generation of the next block.
  • the blockchain can include the underlying platform of the blockchain, the platform product service layer, and the application service layer.
  • the voice keyword extraction unit 140 is configured to: if the user unique identification information corresponding to the user communication identification code has the same user unique identification code as the target user identification information, by sequentially performing text word segmentation and keyword extraction on the voice text data Get the corresponding keyword set.
  • the user's unique identification information corresponding to the user communication identification code has the same unique user identification code as the target user's identification information, it means that the user himself is communicating with the intelligent dialogue system, and the user himself can continue to do so.
  • the speech keyword extraction unit 140 is further used for:
  • a text word segmentation result is obtained by performing text word segmentation on the voice text data based on a probability statistical word segmentation model, and a corresponding keyword set is obtained by keyword extraction on the text word segmentation result by a word frequency-inverse document frequency model.
  • the speech text data is segmented by text content based on the probability statistical word segmentation model to obtain the corresponding text word segmentation result, and then the text word segmentation result is extracted by keyword extraction through the word frequency-inverse document frequency model The corresponding keyword set.
  • the word segmentation model based on probability statistics and the word frequency-reverse document frequency model are relatively mature existing technologies, and will not be discussed here.
  • the word frequency-inverse document frequency model also called the word frequency-inverse text frequency index model, that is, the TF-IDF model
  • the word frequency-inverse text frequency index model that is, the TF-IDF model
  • the keyword segmentation results of the text are sorted in descending order of word frequency-inverse text frequency index, and keywords that are located before the preset ranking value are extracted to form a keyword set.
  • the keyword judgment unit 150 is used for judging whether the keyword set includes a first keyword sub-set corresponding to authorized others to handle processing.
  • the keyword set includes the [authorization***Handle*** Matters authorized person verification code ***] the first keyword sub-collection. If the keyword set includes the first keyword sub-set, it means that the user clearly stated that other people are needed to handle the matter during the communication process, and the subsequent steps of entrusting others to handle the matter can be continued at this time. If the keyword set does not include the first keyword sub-set, it means that the user has not clearly stated that other people are required to handle the matter in the communication process, and the user himself will continue to handle the matter by default.
  • the authorized person information obtaining unit 160 is configured to obtain the authorized person’s name and authorized person’s name and authorized person included in the first keyword sub-set if the keyword set includes the first keyword sub-set corresponding to the authorization of others. Person verification code and authorized item name.
  • the keyword set includes the first keyword sub-set corresponding to authorized others, it means that the intelligent dialogue system in the server at this time knows that the current matter is that the principal authorizes the authorized person to help it.
  • processing in order to verify the identity of the authorized person, there can be double verification, one is to obtain the authorized person's name, and the other is to obtain the authorized person's verification code.
  • the name of the authorized person is included in the user's voice data formed by the authorized person during the conversation, and the user's voice data also includes the authorized person's verification code and the name of the authorized item.
  • the authorized person Since the authorized person may be at the same place as the principal at this time, the authorized person can continue to use the client terminal of the principal to continue handling matters.
  • This scenario is similar to that the user is not proficient in using the terminal or has a low level of professional knowledge.
  • the staff of the business hall can directly tell the older users to say the text segment of the entrusted *** deal with the matters in the process of communicating with the intelligent dialogue system, and the business hall will work at this time The personnel can continue to use the user's client to continue to help them handle matters.
  • the staff of the business hall uses other user terminals (the other user terminals may be the user terminals used by the staff of the business hall themselves, and are not the same terminal as the client used by the client).
  • the current target event process data sending unit 170 is configured to call the corresponding current target event process data according to the received current user voice data corresponding to the first keyword subset sent by the user terminal or other user terminals, and transfer all the current target event process data.
  • the flow data of the current target item is sent to the client or other client in sequence in the sequence of the flow.
  • the authorized person when the principal authorizes the authorized person to handle matters, the authorized person communicates with the intelligent dialogue system in the server through the client terminal of the principal or another client terminal used by the authorized person. , So as to send the current user's voice data to the server. At this time, the corresponding current target item process data is called in the server, and the current target item process data is sequentially sent to the user terminal or other user terminals in the sequence of the process, so as to realize the authorization of others to handle the item.
  • the current target item process data sending unit 170 includes:
  • the current user voice data extraction unit is used to obtain the current user name and current verification corresponding to the current user voice data through voice recognition and keyword extraction if the current user voice data sent by the user terminal or other user terminals is received code;
  • the current target item process data calling unit is used to call if the current user’s name is the same as the authorized person’s name and the current verification code is the same as the authorized person’s verification code, call the locally stored and authorized
  • the current target event process data corresponding to the event name is sent to the client or other client in sequence in the sequence of the process.
  • the process of voice recognition and keyword acquisition can refer to the voice keyword extraction unit 140.
  • the authorized person can follow the current target item process data sent by the server as a guide, so as to quickly handle the item.
  • the current target item data receiving unit 180 is configured to receive current target item data corresponding to the current target item process data sent by the client or other client terminals.
  • the corresponding data is fed back to each sub-process in the current target item process data, and the corresponding current target item data is formed, At this time, the current target item data can be stored in the server.
  • voiceprint recognition can also be performed on the current user's voice data to obtain voiceprint features corresponding to the authorized person.
  • the authorized person communicates with the intelligent dialogue system to handle matters at other times, there is no need to repeat the voiceprint feature registration of the authorized person.
  • the principal can supplement the registration of his user identity information.
  • the principal can continue to cancel the authorized person's authority to handle matters through the communication with the intelligent dialogue system, and can say "I want to remove the authority to handle **", then the previous authorized person cannot handle the authorized person's authority again matter.
  • the device 100 for authorization of transaction handling authority further includes:
  • the data link unit is used to upload the current target item process data to the blockchain network.
  • the current target item process data that each user handles or entrusts others to handle can be uploaded to the blockchain network for storage, making full use of the non-tampering feature of the blockchain to realize the Matters deal with the storage of data.
  • the device 100 for authorization of transaction handling authority further includes:
  • the second keyword subset acquiring unit is configured to, if the keyword set does not include the first keyword subset corresponding to authorized others to handle, acquire the second key corresponding to the item type included in the keyword set Word sub-collection
  • the target event process data sending unit is used to call the target event process data stored locally and corresponding to the second keyword subset, and send the target event process data to the user terminal in sequence according to the process sequence;
  • the target item data on-chain unit is used to obtain the target item data corresponding to the target item process data sent by the client, and upload it to the blockchain for storage.
  • the keyword set does not include the first keyword sub-set, it means that the user did not clearly indicate that other people are required to handle the matter during this communication process, and the user himself/herself will continue to handle the matter by default.
  • the second keyword sub-set corresponding to the item type included in the keyword set can be obtained, and the second keyword sub-set determines the user’s waiting list. Do things. Obtain target item flow data corresponding to the user's to-do items in the item flow data respectively corresponding to various to-do items stored in advance by the server.
  • target item process data corresponding to the user's to-do items.
  • These target process item data generally include many item handling steps. In each step, the user is prompted to make a yes or no choice, or provide some user information At this time, in order to guide the user to handle matters, the process data of the target matters are sent to the user terminal in sequence according to the process sequence.
  • the target item process data is sent to the user terminal in sequence according to the process sequence
  • the first sub-step data of the item therein is first sent to the user terminal, and the user terminal will give feedback on the first item step sub-data.
  • the second sub-step data of the item will continue to be pushed, and the subsequent processing process is analogous to that until the user finishes the current item according to the target item process data .
  • the target item data can be stored in the server at this time ,
  • the server can also upload the target item data to the blockchain network for storage.
  • the device realizes the identity verification of the user based on voiceprint recognition, and can voice authorization entrusted matters to be handled by others who are proficient in handling matters, which not only improves the security of user data, but also improves the efficiency of data processing.
  • the above-mentioned matter handling authority authorization device can be implemented in the form of a computer program, and the computer program can be run on the computer device as shown in FIG. 4.
  • FIG. 4 is a schematic block diagram of a computer device according to an embodiment of the present application.
  • the computer device 500 is a server, and the server may be an independent server or a server cluster composed of multiple servers.
  • the computer device 500 includes a processor 502, a memory, and a network interface 505 connected through a system bus 501, where the memory may include a non-volatile storage medium 503 and an internal memory 504.
  • the non-volatile storage medium 503 can store an operating system 5031 and a computer program 5032.
  • the processor 502 can execute the method for authorization of transaction handling authority.
  • the processor 502 is used to provide calculation and control capabilities, and support the operation of the entire computer device 500.
  • the internal memory 504 provides an environment for the operation of the computer program 5032 in the non-volatile storage medium 503.
  • the processor 502 can execute the method for authorization of transaction handling rights.
  • the network interface 505 is used for network communication, such as providing data information transmission.
  • the structure shown in FIG. 4 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the computer device 500 to which the solution of the present application is applied.
  • the specific computer device 500 may include more or fewer components than shown in the figure, or combine certain components, or have a different component arrangement.
  • the processor 502 is configured to run a computer program 5032 stored in a memory, so as to implement the method for authorization of transaction handling rights disclosed in the embodiments of the present application.
  • the embodiment of the computer device shown in FIG. 4 does not constitute a limitation on the specific configuration of the computer device.
  • the computer device may include more or less components than those shown in the figure. Or some parts are combined, or different parts are arranged.
  • the computer device may only include a memory and a processor. In such an embodiment, the structures and functions of the memory and the processor are consistent with the embodiment shown in FIG. 4, and will not be repeated here.
  • the processor 502 may be a central processing unit (Central Processing Unit, CPU), and the processor 502 may also be other general-purpose processors, digital signal processors (Digital Signal Processors, DSPs), Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor.
  • a computer-readable storage medium In another embodiment of the present application, a computer-readable storage medium is provided.
  • the computer-readable storage medium may be non-volatile or volatile.
  • the computer-readable storage medium stores a computer program, where the computer program, when executed by a processor, implements the method for authorization of transaction handling rights disclosed in the embodiments of the present application.
  • the disclosed equipment, device, and method may be implemented in other ways.
  • the device embodiments described above are only illustrative.
  • the division of the units is only a logical function division. In actual implementation, there may be other division methods, or the units with the same function may be combined into one. Units, for example, multiple units or components can be combined or integrated into another system, or some features can be omitted or not implemented.
  • the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may also be electrical, mechanical or other forms of connection.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments of the present application.
  • the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
  • the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a storage medium.
  • the technical solution of this application is essentially or the part that contributes to the existing technology, or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium. It includes several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), magnetic disk or optical disk and other media that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Acoustics & Sound (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present application relates to artificial intelligence biometrics, and discloses a service item processing permissions authorization method and apparatus, a computer device, and a storage medium. If a user identity is confirmed by means of voiceprint recognition and the keyword set corresponding to user speech data includes a first keyword subset, obtaining the name of an authorized person, the verification code of the authorized person, and the title of the authorized service item; if current user speech data transmitted by a user terminal or another user terminal is received, obtaining the corresponding name of the current user and the current verification code; if the name of the current user is identical to the name of the authorized person and the current verification code is identical to the verification code of the authorized person, calling the corresponding current target service item process data and transmitting same to the user terminal or the other user terminal in order according to the process sequence. The method implements identity verification by means of voiceprint recognition, and enables voice authorization of the commission of a third party who is highly familiar with service item processing to help with the service item processing, thereby enhancing user data security and data processing efficiency.

Description

事项办理权限授权方法、装置、计算机设备及存储介质Matter handling authority authorization method, device, computer equipment and storage medium
本申请要求于2020年5月22日提交中国专利局、申请号为202010442306.8,申请名称为“事项办理权限授权方法、装置、计算机设备及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application filed with the Chinese Patent Office on May 22, 2020, the application number is 202010442306.8, and the application name is "method handling authority authorization method, device, computer equipment and storage medium". The entire content of the application is approved The reference is incorporated in this application.
技术领域Technical field
本申请涉及人工智能的生物识别技术领域,尤其涉及一种事项办理权限授权方法、装置、计算机设备及存储介质。This application relates to the field of artificial intelligence biometric technology, and in particular to a method, device, computer equipment, and storage medium for authorization of matter handling authority.
背景技术Background technique
目前,应用了语音识别技术的智能对话系统得到了越来越广泛的应用。例如在电信服务场景中,用户与智能对话系统进行语音对话时,可以进行各项电信业务相关事项的办理,如充值话费、办理流量包等。如在银行业务场景中,用户与智能对话系统进行语音对话时,可以进行各项银行业务相关事项的办理,如存款余额查询、预约大额取款时间、修改取款密码等。At present, intelligent dialogue systems using speech recognition technology have been more and more widely used. For example, in a telecom service scenario, when a user conducts a voice dialogue with an intelligent dialogue system, he can handle various telecom business-related matters, such as recharging phone bills, processing traffic packages, and so on. For example, in a banking business scenario, when a user conducts a voice dialogue with an intelligent dialogue system, he can handle various banking-related matters, such as deposit balance inquiry, appointment of large withdrawal time, and modification of withdrawal password.
发明人意识到现有的智能对话系统存在以下问题:The inventor realizes that the existing intelligent dialogue system has the following problems:
1)对用户的身份进行识别时,是基于用户输入的用户密码进行识别,若密码有泄漏,导致用户数据也有泄露风险,降低了用户数据的安全性;1) When the user's identity is identified, it is based on the user password entered by the user. If the password is leaked, the user data will also be at risk of leakage, which reduces the security of the user data;
2)对用户的发音标准度和用户对系统熟练程度要求较高,这就导致一些发音不标准或是对系统熟练程度不高的用户在进行事项办理时,系统无法识别其办理事项的意图,导致操作时长变长甚至无法成功办理事项,降低了数据处理的效率。2) The user's pronunciation standard and the user's proficiency in the system are relatively high, which leads to some users with non-standard pronunciation or low proficiency in the system when handling matters, the system cannot recognize their intention to handle matters. As a result, the operation time becomes longer and even the transaction cannot be successfully handled, which reduces the efficiency of data processing.
发明内容Summary of the invention
本申请实施例提供了一种事项办理权限授权方法、装置、计算机设备及存储介质,旨在解决现有技术中智能对话系统对用户的身份进行识别是基于用户密码,且智能对话系统对用户发音标准度及系统使用熟练度较高,导致用户数据的安全性低,且数据处理效率低的问题。The embodiment of the application provides a method, device, computer equipment and storage medium for authorization of transaction handling authority, aiming to solve the problem that the intelligent dialogue system in the prior art recognizes the user's identity based on the user password, and the intelligent dialogue system pronounces the user The standards and system use proficiency are high, resulting in low user data security and low data processing efficiency.
第一方面,本申请实施例提供了一种事项办理权限授权方法,其包括:In the first aspect, the embodiment of the application provides a method for authorization of transaction handling authority, which includes:
若接收到用户端发送的用户语音数据和用户通讯识别码,对所述用户语音数据进行语音识别和声纹识别,得到与所述用户语音数据对应的语音文本数据和语音声纹特征;If the user voice data and the user communication identification code sent by the user terminal are received, perform voice recognition and voiceprint recognition on the user voice data to obtain voice text data and voice voiceprint characteristics corresponding to the user voice data;
判断本地的声纹数据库中是否存在与所述语音声纹特征相同的声纹特征;Judging whether there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database;
若本地的声纹数据库中存在与所述语音声纹特征相同的声纹特征,以对应的声纹特征作为目标声纹特征,获取所述目标声纹特征对应的目标用户身份信息;If there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, use the corresponding voiceprint feature as the target voiceprint feature to obtain the target user identity information corresponding to the target voiceprint feature;
若用户通讯识别码对应的用户唯一识别信息与所述目标用户身份信息有相同的用户唯一识别码,通过对所述语音文本数据依次进行文本分词和关键词抽取得到对应的关键词集合;If the user unique identification information corresponding to the user communication identification code has the same unique user identification code as the target user identification information, the corresponding keyword set is obtained by sequentially performing text segmentation and keyword extraction on the voice text data;
判断所述关键词集合中是否包括与授权他人办理对应的第一关键词子集合;Judging whether the keyword set includes the first keyword sub-set corresponding to authorized others to handle it;
若所述关键词集合中包括与授权他人办理对应的第一关键词子集合,获取所述第一关键词子集合中包括的被授权人名字、被授权人验证码和被授权事项名称;If the keyword set includes the first keyword sub-set corresponding to authorized others to handle, obtain the authorized person's name, the authorized person's verification code, and the authorized item name included in the first keyword sub-set;
根据所接收到的由用户端或其他用户端发送的与第一关键词子集合对应的当前用户语音数据,调用对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端;以及According to the received current user voice data corresponding to the first keyword subset sent by the user terminal or other user terminals, call the corresponding current target item process data, and sequentially order the current target item process data according to the process sequence Send to the client or other clients; and
接收用户端或其他用户端发送的与所述当前目标事项流程数据对应的当前目标事项数据。Receive current target item data corresponding to the current target item process data sent by the client or other client terminals.
第二方面,本申请实施例提供了一种事项办理权限授权装置,其包括:In the second aspect, an embodiment of the present application provides a matter handling authority authorization device, which includes:
用户语音提取单元,用于若接收到用户端发送的用户语音数据和用户通讯识别码,对所述用户语音数据进行语音识别和声纹识别,得到与所述用户语音数据对应的语音文本数据和 语音声纹特征;The user voice extraction unit is configured to perform voice recognition and voiceprint recognition on the user voice data if the user voice data and the user communication identification code sent by the user terminal are received to obtain the voice text data and the voice text data corresponding to the user voice data. Voice voiceprint characteristics;
声纹特征比对单元,用于判断本地的声纹数据库中是否存在与所述语音声纹特征相同的声纹特征;The voiceprint feature comparison unit is used to determine whether there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database;
目标用户身份获取单元,用于若本地的声纹数据库中存在与所述语音声纹特征相同的声纹特征,以对应的声纹特征作为目标声纹特征,获取所述目标声纹特征对应的目标用户身份信息;The target user identity acquiring unit is configured to, if there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, use the corresponding voiceprint feature as the target voiceprint feature to obtain the corresponding voiceprint feature Target user identity information;
语音关键词抽取单元,用于若用户通讯识别码对应的用户唯一识别信息与所述目标用户身份信息有相同的用户唯一识别码,通过对所述语音文本数据依次进行文本分词和关键词抽取得到对应的关键词集合;The voice keyword extraction unit is used to obtain the unique user identification code by sequentially performing text word segmentation and keyword extraction on the voice text data if the user unique identification information corresponding to the user communication identification code and the target user identification information have the same unique user identification code Corresponding keyword set;
关键词判断单元,用于判断所述关键词集合中是否包括与授权他人办理对应的第一关键词子集合;The keyword judgment unit is used to judge whether the keyword set includes the first keyword sub-set corresponding to authorized others to handle;
被授权人信息获取单元,用于若所述关键词集合中包括与授权他人办理对应的第一关键词子集合,获取所述第一关键词子集合中包括的被授权人名字、被授权人验证码和被授权事项名称;The authorized person information obtaining unit is used to obtain the name of the authorized person and the authorized person included in the first keyword sub-set if the keyword set includes a first keyword sub-set corresponding to authorized others to handle Verification code and authorized item name;
当前目标事项流程数据发送单元,用于根据所接收到的由用户端或其他用户端发送的与第一关键词子集合对应的当前用户语音数据,调用对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端;以及The current target item process data sending unit is used to call the corresponding current target item process data according to the received current user voice data corresponding to the first keyword subset sent by the user terminal or other user terminals, and transfer the The current target item process data is sent to the client or other clients in sequence in the sequence of the process; and
当前目标事项数据接收单元,用于接收用户端或其他用户端发送的与所述当前目标事项流程数据对应的当前目标事项数据。The current target item data receiving unit is configured to receive the current target item data corresponding to the current target item process data sent by the user terminal or other user terminals.
第三方面,本申请实施例又提供了一种计算机设备,其包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现以下步骤:In a third aspect, an embodiment of the present application provides a computer device, which includes a memory, a processor, and a computer program stored on the memory and running on the processor, and the processor executes the computer The following steps are implemented during the program:
若接收到用户端发送的用户语音数据和用户通讯识别码,对所述用户语音数据进行语音识别和声纹识别,得到与所述用户语音数据对应的语音文本数据和语音声纹特征;If the user voice data and the user communication identification code sent by the user terminal are received, perform voice recognition and voiceprint recognition on the user voice data to obtain voice text data and voice voiceprint characteristics corresponding to the user voice data;
判断本地的声纹数据库中是否存在与所述语音声纹特征相同的声纹特征;Judging whether there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database;
若本地的声纹数据库中存在与所述语音声纹特征相同的声纹特征,以对应的声纹特征作为目标声纹特征,获取所述目标声纹特征对应的目标用户身份信息;If there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, use the corresponding voiceprint feature as the target voiceprint feature to obtain the target user identity information corresponding to the target voiceprint feature;
若用户通讯识别码对应的用户唯一识别信息与所述目标用户身份信息有相同的用户唯一识别码,通过对所述语音文本数据依次进行文本分词和关键词抽取得到对应的关键词集合;If the user unique identification information corresponding to the user communication identification code has the same unique user identification code as the target user identification information, the corresponding keyword set is obtained by sequentially performing text segmentation and keyword extraction on the voice text data;
判断所述关键词集合中是否包括与授权他人办理对应的第一关键词子集合;Judging whether the keyword set includes the first keyword sub-set corresponding to authorized others to handle it;
若所述关键词集合中包括与授权他人办理对应的第一关键词子集合,获取所述第一关键词子集合中包括的被授权人名字、被授权人验证码和被授权事项名称;If the keyword set includes the first keyword sub-set corresponding to authorized others to handle, obtain the authorized person's name, the authorized person's verification code, and the authorized item name included in the first keyword sub-set;
根据所接收到的由用户端或其他用户端发送的与第一关键词子集合对应的当前用户语音数据,调用对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端;以及According to the received current user voice data corresponding to the first keyword subset sent by the user terminal or other user terminals, call the corresponding current target item process data, and sequentially order the current target item process data according to the process sequence Send to the client or other clients; and
接收用户端或其他用户端发送的与所述当前目标事项流程数据对应的当前目标事项数据。Receive current target item data corresponding to the current target item process data sent by the client or other client terminals.
第四方面,本申请实施例还提供了一种计算机可读存储介质,其中所述计算机可读存储介质存储有计算机程序,所述计算机程序当被处理器执行时使所述处理器执行以下操作:In a fourth aspect, the embodiments of the present application also provide a computer-readable storage medium, wherein the computer-readable storage medium stores a computer program, which when executed by a processor causes the processor to perform the following operations :
若接收到用户端发送的用户语音数据和用户通讯识别码,对所述用户语音数据进行语音识别和声纹识别,得到与所述用户语音数据对应的语音文本数据和语音声纹特征;If the user voice data and the user communication identification code sent by the user terminal are received, perform voice recognition and voiceprint recognition on the user voice data to obtain voice text data and voice voiceprint characteristics corresponding to the user voice data;
判断本地的声纹数据库中是否存在与所述语音声纹特征相同的声纹特征;Judging whether there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database;
若本地的声纹数据库中存在与所述语音声纹特征相同的声纹特征,以对应的声纹特征作为目标声纹特征,获取所述目标声纹特征对应的目标用户身份信息;If there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, use the corresponding voiceprint feature as the target voiceprint feature to obtain the target user identity information corresponding to the target voiceprint feature;
若用户通讯识别码对应的用户唯一识别信息与所述目标用户身份信息有相同的用户唯一识别码,通过对所述语音文本数据依次进行文本分词和关键词抽取得到对应的关键词集合;If the user unique identification information corresponding to the user communication identification code has the same unique user identification code as the target user identification information, the corresponding keyword set is obtained by sequentially performing text segmentation and keyword extraction on the voice text data;
判断所述关键词集合中是否包括与授权他人办理对应的第一关键词子集合;Judging whether the keyword set includes the first keyword sub-set corresponding to authorized others to handle it;
若所述关键词集合中包括与授权他人办理对应的第一关键词子集合,获取所述第一关键词子集合中包括的被授权人名字、被授权人验证码和被授权事项名称;If the keyword set includes the first keyword sub-set corresponding to authorized others to handle, obtain the authorized person's name, the authorized person's verification code, and the authorized item name included in the first keyword sub-set;
根据所接收到的由用户端或其他用户端发送的与第一关键词子集合对应的当前用户语音数据,调用对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端;以及According to the received current user voice data corresponding to the first keyword subset sent by the user terminal or other user terminals, call the corresponding current target item process data, and sequentially order the current target item process data according to the process sequence Send to the client or other clients; and
接收用户端或其他用户端发送的与所述当前目标事项流程数据对应的当前目标事项数据。Receive current target item data corresponding to the current target item process data sent by the client or other client terminals.
本申请实施例提供了一种事项办理权限授权方法、装置、计算机设备及存储介质,包括若服务器通过声纹识别确认用户身份后,用户的用户语音数据对应的关键词集合中包括与授权他人办理对应的第一关键词子集合,获取所述第一关键词子集合中包括的被授权人名字、被授权人验证码和被授权事项名称,若接收到用户端或其他用户端发送的当前用户语音数据,通过语音识别和关键词抽取获取与所述当前用户语音数据对应的当前用户人名字和当前验证码,若所述当前用户人名字与所述被授权人名字相同、且所述当前验证码与所述被授权人验证码相同,调用本地已存储并与被授权事项名称对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端。该方法实现了基于声纹识别对用户进行身份验证,而且能语音授权委托事项办理熟练度高的他人帮忙办理事项,不仅提高了用户数据的安全性,而且提高了数据处理效率。The embodiment of the application provides a method, device, computer equipment, and storage medium for authorization of transaction handling authority, including if the server confirms the user's identity through voiceprint recognition, the keyword set corresponding to the user's user voice data includes the set of keywords that are related to authorized others to handle the transaction. Corresponding to the first keyword sub-set, obtain the authorized person name, authorized person verification code and authorized item name included in the first keyword sub-set, if the current user sent by the client or other client is received Voice data, obtain the current user’s name and current verification code corresponding to the current user’s voice data through voice recognition and keyword extraction, if the current user’s name is the same as the authorized person’s name and the current verification The code is the same as the authorized person’s verification code, calling the current target item process data stored locally and corresponding to the authorized item name, and sending the current target item process data to the client or other clients in sequence in the process sequence . The method realizes user identity verification based on voiceprint recognition, and can help others with high proficiency in handling entrusted matters by voice authorization, which not only improves the security of user data, but also improves the efficiency of data processing.
附图说明Description of the drawings
为了更清楚地说明本申请实施例技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to explain the technical solutions of the embodiments of the present application more clearly, the following will briefly introduce the drawings used in the description of the embodiments. Obviously, the drawings in the following description are some embodiments of the present application. Ordinary technicians can obtain other drawings based on these drawings without creative work.
图1为本申请实施例提供的事项办理权限授权方法的应用场景示意图;Fig. 1 is a schematic diagram of an application scenario of a method for authorization of matter handling authority provided by an embodiment of the application;
图2为本申请实施例提供的事项办理权限授权方法的流程示意图;Figure 2 is a schematic flow chart of a method for authorization of matter handling authority provided by an embodiment of the application;
图3为本申请实施例提供的事项办理权限授权装置的示意性框图;Fig. 3 is a schematic block diagram of a matter handling authority authorization device provided by an embodiment of the application;
图4为本申请实施例提供的计算机设备的示意性框图。Fig. 4 is a schematic block diagram of a computer device provided by an embodiment of the application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be described clearly and completely in conjunction with the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, rather than all of them. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of this application.
应当理解,当在本说明书和所附权利要求书中使用时,术语“包括”和“包含”指示所描述特征、整体、步骤、操作、元素和/或组件的存在,但并不排除一个或多个其它特征、整体、步骤、操作、元素、组件和/或其集合的存在或添加。It should be understood that when used in this specification and appended claims, the terms "including" and "including" indicate the existence of the described features, wholes, steps, operations, elements and/or components, but do not exclude one or The existence or addition of multiple other features, wholes, steps, operations, elements, components, and/or collections thereof.
还应当理解,在此本申请说明书中所使用的术语仅仅是出于描述特定实施例的目的而并不意在限制本申请。如在本申请说明书和所附权利要求书中所使用的那样,除非上下文清楚地指明其它情况,否则单数形式的“一”、“一个”及“该”意在包括复数形式。It should also be understood that the terms used in the specification of this application are only for the purpose of describing specific embodiments and are not intended to limit the application. As used in the specification of this application and the appended claims, unless the context clearly indicates other circumstances, the singular forms "a", "an" and "the" are intended to include plural forms.
还应当进一步理解,在本申请说明书和所附权利要求书中使用的术语“和/或”是指相关联列出的项中的一个或多个的任何组合以及所有可能组合,并且包括这些组合。It should be further understood that the term "and/or" used in the specification and appended claims of this application refers to any combination and all possible combinations of one or more of the associated listed items, and includes these combinations .
请参阅图1和图2,图1为本申请实施例提供的事项办理权限授权方法的应用场景示意图,图2为本申请实施例提供的事项办理权限授权方法的流程示意图,该事项办理权限授权方法应用于服务器中,该方法通过安装于服务器中的应用软件进行执行。Please refer to Figure 1 and Figure 2. Figure 1 is a schematic diagram of the application scenario of the matter handling authority authorization method provided by an embodiment of the application, and Figure 2 is a schematic flow diagram of the matter handling authorization authorization method provided by an embodiment of the application. The method is applied to a server, and the method is executed by application software installed in the server.
如图2所示,该方法包括步骤S110~S180。As shown in Figure 2, the method includes steps S110 to S180.
S110、若接收到用户端发送的用户语音数据,对所述用户语音数据进行语音识别和声纹识别,得到与所述用户语音数据对应的语音文本数据和语音声纹特征。S110: If the user voice data sent by the user terminal is received, perform voice recognition and voiceprint recognition on the user voice data to obtain voice text data and voice voiceprint characteristics corresponding to the user voice data.
在本实施例中,为了更清楚的理解技术方案,对具体实现场景所涉及的终端进行详细介 绍。本申请是在服务器的角度描述技术方案。In this embodiment, in order to understand the technical solution more clearly, the terminal involved in the specific implementation scenario is introduced in detail. This application describes the technical solution from the perspective of the server.
一是用户端,用户端为用户所使用的智能终端(如智能手机等终端),用户可以使用用户端与服务器对应提供的智能对话系统进行语音交流,以实现具体的事项办理。也即用户端可以将所采集到的用户语音发送至服务器。One is the user side. The user side is an intelligent terminal used by the user (such as a terminal such as a smart phone). The user can use the intelligent dialogue system provided by the user side and the server to communicate with each other to achieve specific matters. That is, the user terminal can send the collected user voice to the server.
二是服务器,服务器对所接收到的由用户端所发送的用户语音,结合本地的智能对话系统的语音识别功能和声纹识别功能,进行各种事项办理。The second is the server. The server handles various matters by combining the voice recognition function and voiceprint recognition function of the local intelligent dialogue system with the received user voice sent by the user terminal.
服务器若接收到用户端发送的用户语音数据及用户通讯识别码,表示此时通过用户端与服务器建立连接后,用户可与服务器一侧所部署的智能对话系统进行交流。由于用户端一般使用电话呼入或具有通讯功能的应用软件(如微信等)与智能对话系统建立连接时,服务器一侧能识别到用户通讯识别码(该通讯识别码可以是电话号码,也可以是微信号码等),由于用户通讯识别码一般是绑定了用户唯一识别信息(如身份证号),故服务器一侧可以通过用户通讯识别码来进行用户身份初次判断。If the server receives the user voice data and the user communication identification code sent by the user terminal, it means that the user can communicate with the intelligent dialogue system deployed on the server side after establishing a connection with the server through the user terminal at this time. Since the user side generally uses phone calls or application software with communication functions (such as WeChat, etc.) to establish a connection with the intelligent dialogue system, the server side can recognize the user communication identification code (the communication identification code can be a phone number or It is the WeChat ID code, etc.). Since the user communication identification code is generally bound to the user's unique identification information (such as the ID number), the server side can use the user communication identification code to make the initial judgment of the user's identity.
在一实施例中,步骤S110包括:In an embodiment, step S110 includes:
通过预先训练的N元模型对所述用户语音数据进行语音识别得到语音文本数据,并通过预先训练的混合高斯-通用背景模型对所述用户语音数据进行声纹识别得到语音声纹特征。Perform voice recognition on the user voice data through a pre-trained N-ary model to obtain voice text data, and perform voiceprint recognition on the user voice data through a pre-trained mixed Gaussian-universal background model to obtain voice voiceprint features.
在本实施例中,当服务器接收到了用户端所发送的用户语音数据时,可以通过调用预先存储的语音识别模型(例如N-gram语音识别模型等,其中N-gram语音识别模型即为N元模型),对所述用户语音数据进行语音识别以得到对应的语音文本数据。In this embodiment, when the server receives the user voice data sent by the user terminal, it can call a pre-stored voice recognition model (such as the N-gram voice recognition model, etc., where the N-gram voice recognition model is the N element Model) to perform voice recognition on the user voice data to obtain corresponding voice text data.
同时,在服务器中还通过调用预先存储的声纹识别模型(如混合高斯-通用背景模型等),对所述用户语音数据进行声纹识别,得到语音声纹特征。通过N元模型和混合高斯-通用背景模型这些模型对用户语音数据分别进行文本提取和声纹识别后,能基于这些识别结果进行后续的事项办理流程。At the same time, the server also performs voiceprint recognition on the user's voice data by calling a pre-stored voiceprint recognition model (such as a mixed Gaussian-universal background model, etc.) to obtain voice voiceprint features. After text extraction and voiceprint recognition are performed on the user's voice data through the N-ary model and the mixed Gaussian-universal background model, the follow-up transaction processing process can be carried out based on these recognition results.
S120、判断本地的声纹数据库中是否存在与所述语音声纹特征相同的声纹特征。S120: Determine whether there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database.
在本实施例中,由于在声纹数据库中存储了大量用户的声纹特征,且声纹数据库是在服务器本地中,故当获取了当前用户的语音声纹特征后,需对该用户身份进行核实。In this embodiment, since the voiceprint features of a large number of users are stored in the voiceprint database, and the voiceprint database is locally on the server, when the voice and voiceprint features of the current user are acquired, the user’s identity needs to be checked. Verify.
S130、若本地的声纹数据库中存在与所述语音声纹特征相同的声纹特征,以对应的声纹特征作为目标声纹特征,获取所述目标声纹特征对应的目标用户身份信息。S130: If there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, use the corresponding voiceprint feature as the target voiceprint feature, and obtain target user identity information corresponding to the target voiceprint feature.
在本实施例中,若服务器本地的声纹数据库中存在与所述语音声纹特征相同的声纹特征,表示该用户之前是在服务器中已存储过其声纹特征数据,并且登记了该声纹特征数据对应的用户身份信息(如该用户的姓名和身份证件号),此时在获取了目标声纹特征后,即可获取与目标声纹特征相对应的目标用户身份信息。In this embodiment, if there is a voiceprint feature that is the same as the voiceprint feature in the server's local voiceprint database, it means that the user has previously stored his voiceprint feature data in the server and registered the voiceprint. The user identity information corresponding to the fingerprint feature data (such as the user's name and ID number). At this time, after the target voiceprint feature is acquired, the target user's identity information corresponding to the target voiceprint feature can be acquired.
在一实施例中,步骤S120之后还包括:In an embodiment, after step S120, the method further includes:
若本地的声纹数据库中不存在与所述语音声纹特征相同的声纹特征,将根据语音模板录制用户初始语音的第一提示信息发送至用户端;If there is no voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, sending the first prompt message for recording the user's initial voice according to the voice template to the user terminal;
接收用户端根据第一提示信息发送的用户初始语音数据;其中,用户初始语音数据中包括用户姓名和身份证件号;Receive the user's initial voice data sent by the user terminal according to the first prompt message; wherein the user's initial voice data includes the user's name and ID number;
根据所述用户初始语音数据进行声纹识别和文本识别,得到与所述用户初始语音数据对应的用户声纹特征及用户语音文本数据;Performing voiceprint recognition and text recognition according to the user's initial voice data to obtain user voiceprint features and user voice text data corresponding to the user's initial voice data;
将所述用户语音文本数据进行分词和关键词提取,得到与所述用户语音文本数据对应的用户身份信息;Performing word segmentation and keyword extraction on the user voice text data to obtain user identity information corresponding to the user voice text data;
将所述用户声纹特征及所述用户语音文本数据对应进行数据绑定以上传至区块链进行存储。The user's voiceprint feature and the user's voice and text data are correspondingly data-bound to upload to the blockchain for storage.
在本实施例中,若本地的声纹数据库中不存在与所述语音声纹特征相同的声纹特征,表示用户可能是首次与服务器中部署的智能对话系统进行交流,此时跳转执行上述用户登记声纹特征和用户身份信息的流程。In this embodiment, if there is no voiceprint feature that is the same as the voiceprint feature in the local voiceprint database, it means that the user may be communicating with the intelligent dialogue system deployed in the server for the first time. At this time, jump to execute the above The process of user registration of voiceprint features and user identity information.
例如,服务器将“请用户结合示例中朗读的文字及自身真实用户身份进行首次用户登记, 示例文字我是***,身份证号是***”这一用于提示用户根据语音模板录制用户初始语音的第一提示信息发送至用户端。之后用户端根据第一提示信息发送的用户初始语音数据被服务器所接收,服务器此时对所述用户初始语音数据进行声纹识别和文本识别,得到与所述用户初始语音数据对应的用户声纹特征及用户语音文本数据。参考步骤S110中相同的方式对所述用户初始语音数据进行声纹识别和文本识别,得到与所述用户初始语音数据对应的用户声纹特征及用户语音文本数据。最后将基于所述用户语音文本数据提取的用户语音文本数据及之前得到的用户声纹特征均对应同一用户身份信息后上传至区块链进行存储。通过上述操作即可实现用户的声纹特征和用户身份信息的初次登记。For example, the server will ask the user to register the user for the first time with the text read aloud in the example and his real user identity. The example text is *** and the ID number is ***” to prompt the user to record the user according to the voice template The first prompt message of the initial voice is sent to the user terminal. After that, the user’s initial voice data sent by the user terminal according to the first prompt information is received by the server. At this time, the server performs voiceprint recognition and text recognition on the user’s initial voice data to obtain the user voiceprint corresponding to the user’s initial voice data. Features and user voice text data. Perform voiceprint recognition and text recognition on the user's initial voice data in the same manner as in step S110 to obtain user voiceprint features and user voice text data corresponding to the user's initial voice data. Finally, the user voice text data extracted based on the user voice text data and the previously obtained user voiceprint features are uploaded to the blockchain for storage after corresponding to the same user identity information. Through the above operations, the initial registration of the user's voiceprint characteristics and user identity information can be realized.
其中,基于所述用户声纹特征及所述用户语音文本数据得到对应的摘要信息,具体来说,摘要信息由所述用户声纹特征及所述用户语音文本数据进行散列处理得到,比如利用sha256算法处理得到。将摘要信息上传至区块链可保证其安全性和对用户的公正透明性。用户设备可以从区块链中下载得该摘要信息,以便查证所述用户声纹特征及所述用户语音文本数据是否被篡改。本示例所指区块链是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式。区块链(Blockchain),本质上是一个去中心化的数据库,是一串使用密码学方法相关联产生的数据块,每一个数据块中包含了一批次网络交易的信息,用于验证其信息的有效性(防伪)和生成下一个区块。区块链可以包括区块链底层平台、平台产品服务层以及应用服务层等。Wherein, the corresponding summary information is obtained based on the user's voiceprint features and the user's voice and text data. Specifically, the summary information is obtained by hashing the user's voiceprint features and the user's voice and text data, such as using Sha256 algorithm is processed. Uploading summary information to the blockchain can ensure its security and fairness and transparency to users. The user equipment can download the summary information from the blockchain to verify whether the user's voiceprint characteristics and the user's voice and text data have been tampered with. The blockchain referred to in this example is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. Blockchain, essentially a decentralized database, is a series of data blocks associated with cryptographic methods. Each data block contains a batch of network transaction information for verification. The validity of the information (anti-counterfeiting) and the generation of the next block. The blockchain can include the underlying platform of the blockchain, the platform product service layer, and the application service layer.
S140、若用户通讯识别码对应的用户唯一识别信息与所述目标用户身份信息有相同的用户唯一识别码,通过对所述语音文本数据依次进行文本分词和关键词抽取得到对应的关键词集合。S140: If the user unique identification information corresponding to the user communication identification code has the same unique user identification code as the target user identification information, a corresponding keyword set is obtained by sequentially performing text word segmentation and keyword extraction on the voice text data.
在本实施例中,若用户通讯识别码对应的用户唯一识别信息与所述目标用户身份信息有相同的用户唯一识别码,表示是用户本人与智能对话系统进行交流,此时用户本人可以继续自己办理业务,也可以选择委托他人办理(也即授权他人办理事项)。为了在判定用户通过身份验证后,真实理解用户的意图,此时需对与所述用户语音数据对应的语音文本数据进行语义分析。In this embodiment, if the user's unique identification information corresponding to the user communication identification code has the same unique user identification code as the target user's identification information, it means that the user himself is communicating with the intelligent dialogue system, and the user himself can continue to do so. To handle business, you can also choose to entrust others to handle it (that is, to authorize others to handle matters). In order to truly understand the user's intention after it is determined that the user has passed the identity verification, it is necessary to perform semantic analysis on the voice text data corresponding to the user's voice data at this time.
在一实施例中,步骤S140包括:In an embodiment, step S140 includes:
通过基于概率统计分词模型对所述语音文本数据进行文本分词得到文本分词结果,通过词频-逆向文件频率模型对所述文本分词结果进行关键词抽取得到对应的关键词集合。A text word segmentation result is obtained by performing text word segmentation on the voice text data based on a probability statistical word segmentation model, and a corresponding keyword set is obtained by keyword extraction on the text word segmentation result by a word frequency-inverse document frequency model.
在本实施例中,先通过基于概率统计分词模型对所述语音文本数据进行文本内容分词,得到对应的文本分词结果,然后通过词频-逆向文件频率模型对所述文本分词结果进行关键词抽取得到对应的关键词集合。其中,基于概率统计分词模型和词频-逆向文件频率模型均是比较成熟的现有技术,此处不再展开论述。其中,需要强调的是通过词频-逆向文件频率模型(也可以称为词频-逆文本频率指数模型,即TF-IDF模型)对所述文本分词结果进行关键词抽取得到对应的关键词集合时,抽取所述文本分词结果按词频-逆文本频率指数降序排序后位于预设的排名值之前的关键词,以组成关键词集合。In this embodiment, the speech text data is segmented by text content based on the probability statistical word segmentation model to obtain the corresponding text word segmentation result, and then the text word segmentation result is extracted by keyword extraction through the word frequency-inverse document frequency model The corresponding keyword set. Among them, the word segmentation model based on probability statistics and the word frequency-reverse document frequency model are relatively mature existing technologies, and will not be discussed here. Among them, what needs to be emphasized is when the word frequency-inverse document frequency model (also called the word frequency-inverse text frequency index model, that is, the TF-IDF model) is used to extract keywords from the text segmentation result to obtain the corresponding keyword set, The keyword segmentation results of the text are sorted in descending order of word frequency-inverse text frequency index, and keywords that are located before the preset ranking value are extracted to form a keyword set.
S150、判断所述关键词集合中是否包括与授权他人办理对应的第一关键词子集合。S150: Determine whether the keyword set includes a first keyword sub-set corresponding to authorized others to handle the processing.
在本实施例中,为了判断用户此次与智能对话系统进行沟通是为了本人办理事项,还是委托授权他人办理事项,此时需要对关键词集合中是否包括由[授权***办理***事项被授权人验证码***]组成的第一关键词子集合。若所述关键词集合中包括第一关键词子集合,表示用户此次沟通过程中明确表示需他人帮忙办理事项,此时即可继续执行委托他人办理事项的后续步骤。若所述关键词集合中不包括第一关键词子集合,表示用户此次沟通过程中未明确表示需他人帮忙办理事项,默认用户本人继续办理事项。In this embodiment, in order to determine whether the user communicates with the intelligent dialogue system this time is for the user to handle the matter, or to authorize others to handle the matter, it is necessary to check whether the keyword set includes the [authorization***Handle*** Matters authorized person verification code ***] the first keyword sub-collection. If the keyword set includes the first keyword sub-set, it means that the user clearly stated that other people are needed to handle the matter during the communication process, and the subsequent steps of entrusting others to handle the matter can be continued at this time. If the keyword set does not include the first keyword sub-set, it means that the user has not clearly stated that other people are required to handle the matter in the communication process, and the user himself will continue to handle the matter by default.
S160、若所述关键词集合中包括与授权他人办理对应的第一关键词子集合,获取所述第一关键词子集合中包括的被授权人名字、被授权人验证码和被授权事项名称。S160. If the keyword set includes a first keyword sub-set corresponding to authorized others to handle the processing, obtain the authorized person's name, authorized person verification code, and authorized item name included in the first keyword sub-set .
在本实施例中,若所述关键词集合中包括与授权他人办理对应的第一关键词子集合,表示此时服务器中的智能对话系统是已知当前事项是委托人授权被授权人帮其办理,此时为了 核实被授权人的身份,可以有双重核验,一是获取被授权人名字,二是获取被授权人验证码。其中,被授权人名字是授权人在对话过程中形成的用户语音数据中所包括的,同样用户语音数据中也是包括被授权人验证码、及被授权事项名称。In this embodiment, if the keyword set includes the first keyword sub-set corresponding to authorized others, it means that the intelligent dialogue system in the server at this time knows that the current matter is that the principal authorizes the authorized person to help it. When processing, in order to verify the identity of the authorized person, there can be double verification, one is to obtain the authorized person's name, and the other is to obtain the authorized person's verification code. Among them, the name of the authorized person is included in the user's voice data formed by the authorized person during the conversation, and the user's voice data also includes the authorized person's verification code and the name of the authorized item.
由于此时被授权人可能是与委托人在同一地点,被授权人可以继续使用委托人的用户端继续办理事项,这一场景类似于用户对终端使用熟练程度不高或是专业知识水平不高的大龄用户在某营业厅咨询办理业务时,营业厅工作人员可以直接告诉大龄用户在与智能对话系统沟通的过程中说出委托***办理***事项的文本段,此时营业厅工作人员即可继续使用该用户的用户端继续帮其办理事项。或者是该营业厅工作人员使用其他用户终端(其他用户终端可能是该营业厅工作人员自己所使用的用户端,与委托人使用的用户端不是同一个终端)。Since the authorized person may be at the same place as the principal at this time, the authorized person can continue to use the client terminal of the principal to continue handling matters. This scenario is similar to that the user is not proficient in using the terminal or has a low level of professional knowledge. When the older users consult and handle business in a business hall, the staff of the business hall can directly tell the older users to say the text segment of the entrusted *** deal with the matters in the process of communicating with the intelligent dialogue system, and the business hall will work at this time The personnel can continue to use the user's client to continue to help them handle matters. Or, the staff of the business hall uses other user terminals (the other user terminals may be the user terminals used by the staff of the business hall themselves, and are not the same terminal as the client used by the client).
S170、根据所接收到的由用户端或其他用户端发送的与第一关键词子集合对应的当前用户语音数据,调用对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端。S170. According to the received current user voice data corresponding to the first keyword subset sent by the user terminal or other user terminals, call the corresponding current target item process data, and put the current target item process data in a process sequence Sequentially sent to the client or other clients.
在本实施例中,当委托人授权给被授权人进行事项办理时,被授权人通过所述委托人的用户端或是被授权人自己使用的其他用户端与服务器中的智能对话系统进行沟通,从而将当前用户语音数据发送至服务器。此时在服务器中调用对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端,从而实现事项授权他人办理。In this embodiment, when the principal authorizes the authorized person to handle matters, the authorized person communicates with the intelligent dialogue system in the server through the client terminal of the principal or another client terminal used by the authorized person. , So as to send the current user's voice data to the server. At this time, the corresponding current target item process data is called in the server, and the current target item process data is sequentially sent to the user terminal or other user terminals in the sequence of the process, so as to realize the authorization of others to handle the item.
在一实施例中,步骤S170包括:In an embodiment, step S170 includes:
若接收到用户端或其他用户端发送的当前用户语音数据,通过语音识别和关键词抽取,获取与所述当前用户语音数据对应的当前用户人名字和当前验证码;If the current user voice data sent by the user terminal or other user terminals is received, through voice recognition and keyword extraction, the current user name and current verification code corresponding to the current user voice data are obtained;
若所述当前用户人名字与所述被授权人名字相同、且所述当前验证码与所述被授权人验证码相同,调用本地已存储并与被授权事项名称对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端。If the name of the current user is the same as the name of the authorized person, and the current verification code is the same as the verification code of the authorized person, call the current target item process data stored locally and corresponding to the authorized item name, The process data of the current target item is sent to the client or other clients in sequence in the sequence of the process.
在本实施例中,若接收到用户端或其他用户端发送的当前用户语音数据,此时为了对被授权人的身份进行核验,此时通过语音识别获取与所述当前用户语音数据对应的当前用户人名字和当前验证码,语音识别和关键词获取的过程可参考步骤S140。In this embodiment, if the current user voice data sent by the user terminal or other user terminals is received, in order to verify the identity of the authorized person at this time, the current user voice data corresponding to the current user’s voice data is obtained through voice recognition. Refer to step S140 for the process of user name and current verification code, voice recognition and keyword acquisition.
若所述当前用户人名字与所述被授权人名字相同、且所述当前验证码与所述被授权人验证码相同,表示被授权人的身份通过系统核验。此时被授权人即可根据服务器对应发送的当前目标事项流程数据为引导,从而快速办理事项。If the name of the current user is the same as the name of the authorized person, and the current verification code is the same as the verification code of the authorized person, it means that the identity of the authorized person has passed the system verification. At this time, the authorized person can follow the current target item process data sent by the server as a guide, so as to quickly handle the item.
S180、接收用户端或其他用户端发送的与所述当前目标事项流程数据对应的当前目标事项数据。S180: Receive current target item data corresponding to the current target item process data sent by the client or other client terminals.
在本实施例中,当被授权人根据当前目标事项流程数据办理完当前的事项,针对所述当前目标事项流程数据中每一子流程均反馈对应数据,并组成对应的当前目标事项数据后,此时可以将当前目标事项数据存储在服务器中。In this embodiment, after the authorized person has completed the current item according to the current target item process data, the corresponding data is fed back to each sub-process in the current target item process data, and the corresponding current target item data is formed, At this time, the current target item data can be stored in the server.
之后,还可以对当前用户语音数据进行声纹识别,获取与被授权人对应的声纹特征。一旦被授权人本人其他时刻与智能对话系统进行沟通办理事项时,不用重复对被授权人进行声纹特征登记,一般让委托人本人补充登记其用户身份信息即可。Afterwards, voiceprint recognition can also be performed on the current user's voice data to obtain voiceprint features corresponding to the authorized person. Once the authorized person communicates with the intelligent dialogue system to handle matters at other times, there is no need to repeat the voiceprint feature registration of the authorized person. Generally, the principal can supplement the registration of his user identity information.
之后,委托人还可以继续通过与智能对话系统沟通解除被授权人办理事项的权限,可以说出“我要解除**办理**的权限”,则之前的被授权人不能再次办理授权人的事项。After that, the principal can continue to cancel the authorized person's authority to handle matters through the communication with the intelligent dialogue system, and can say "I want to remove the authority to handle **", then the previous authorized person cannot handle the authorized person's authority again matter.
在一实施例中,步骤S180之后还包括:In an embodiment, after step S180, the method further includes:
将所述当前目标事项流程数据上传至区块链网络中。Upload the current target item process data to the blockchain network.
在本实施例中,将每一用户自己办理或委托他人办理的当前目标事项流程数据均可以上传至区块链网络进行存储,充分利用区块链的不可篡改的特性,以实现对用户每一次事项办理数据的存储。In this embodiment, the current target item process data that each user handles or entrusts others to handle can be uploaded to the blockchain network for storage, making full use of the non-tampering feature of the blockchain to realize the Matters deal with the storage of data.
在一实施例中,步骤S150之后还包括:In an embodiment, after step S150, the method further includes:
若所述关键词集合中不包括与授权他人办理对应的第一关键词子集合,获取所述关键词 集合中包括的与事项类型对应的第二关键词子集合;If the keyword set does not include the first keyword sub-set corresponding to authorized others to handle, obtain the second keyword sub-set corresponding to the item type included in the keyword set;
调用本地已存储并与所述第二关键词子集合对应的目标事项流程数据,将所述目标事项流程数据根据流程顺序依序发送至用户端;Call the target event process data stored locally and corresponding to the second keyword sub-set, and send the target event process data to the client in sequence according to the process sequence;
获取用户端发送的与所述目标事项流程数据对应的目标事项数据,并上传至区块链进行存储。Obtain the target event data corresponding to the target event process data sent by the client, and upload it to the blockchain for storage.
在本实施例中,若所述关键词集合中不包括第一关键词子集合,表示用户此次沟通过程中未明确表示需他人帮忙办理事项,默认用户本人继续办理事项。当用户无需委托他人办理事项时,此时为了更加方便引导客户办理业务,可获取关键词集合中包括的与事项类型对应的第二关键词子集合,由第二关键词子集合确定用户的待办事项。在服务器预先存储的多种待办事项分别对应的事项流程数据中,获取与用户的待办事项对应的目标事项流程数据。In this embodiment, if the keyword set does not include the first keyword sub-set, it means that the user did not clearly indicate that other people are required to handle the matter during this communication process, and the user himself/herself will continue to handle the matter by default. When the user does not need to entrust others to handle matters, in order to make it more convenient to guide customers to handle the business, the second keyword sub-set corresponding to the item type included in the keyword set can be obtained, and the second keyword sub-set determines the user’s waiting list. Do things. Obtain target item flow data corresponding to the user's to-do items in the item flow data respectively corresponding to various to-do items stored in advance by the server.
获取了与用户的待办事项对应的目标事项流程数据,这些目标流程事项数据一般是包括很多事项办理步骤,每一步骤中均是提示用户做出是或否的选择、或者是提供一些用户信息,此时为了引导用户办理事项,是将所述目标事项流程数据根据流程顺序依序发送至用户端。Obtained the target item process data corresponding to the user's to-do items. These target process item data generally include many item handling steps. In each step, the user is prompted to make a yes or no choice, or provide some user information At this time, in order to guide the user to handle matters, the process data of the target matters are sent to the user terminal in sequence according to the process sequence.
更具体的是将所述目标事项流程数据根据流程顺序依序发送至用户端时,首先将其中的事项第一子步骤数据发送至用户端,待用户端针对第一事项步骤子数据做出反馈(例如针对第一事项步骤子数据对应发送第一事项步骤子反馈数据)后才继续推送事项第二子步骤数据,后续的处理过程也是依次类推,直至用户根据目标事项流程数据办理完当前的事项。More specifically, when the target item process data is sent to the user terminal in sequence according to the process sequence, the first sub-step data of the item therein is first sent to the user terminal, and the user terminal will give feedback on the first item step sub-data. (For example, for the first item step sub-data corresponding to the first item step sub-feedback data), then the second sub-step data of the item will continue to be pushed, and the subsequent processing process is analogous to that until the user completes the current item according to the target item process data .
当用户根据目标事项流程数据办理完当前的事项,针对所述目标事项流程数据中每一子流程均反馈对应数据,并组成对应的目标事项数据后,此时可以将目标事项数据存储在服务器中,也可由服务器将目标事项数据上传至区块链网络进行存储。After the user finishes the current item according to the target item process data, and feeds back the corresponding data for each sub-process in the target item process data, and composes the corresponding target item data, the target item data can be stored in the server at this time , The server can also upload the target item data to the blockchain network for storage.
该方法实现了基于声纹识别对用户进行身份验证,而且能语音授权委托事项办理熟练度高的他人帮忙办理事项,不仅提高了用户数据的安全性,而且提高了数据处理效率。The method realizes user identity verification based on voiceprint recognition, and can help others with high proficiency in handling entrusted matters by voice authorization, which not only improves the security of user data, but also improves the efficiency of data processing.
本申请实施例还提供一种事项办理权限授权装置,该事项办理权限授权装置用于执行前述事项办理权限授权方法的任一实施例。具体地,请参阅图3,图3是本申请实施例提供的事项办理权限授权装置的示意性框图。该事项办理权限授权装置100可以配置于服务器中。The embodiment of the present application also provides a matter handling authority authorization device, which is used to execute any embodiment of the aforementioned matter handling authority authorization method. Specifically, please refer to FIG. 3, which is a schematic block diagram of a matter handling authority authorization device provided in an embodiment of the present application. The matter handling authority authorization device 100 may be configured in a server.
如图3所示,事项办理权限授权装置100包括:用户语音提取单元110、声纹特征比对单元120、目标用户身份获取单元130、语音关键词抽取单元140、关键词判断单元150、被授权人信息获取单元160、当前目标事项流程数据发送单元170、当前目标事项数据接收单元180。As shown in FIG. 3, the matter handling authority authorization device 100 includes: a user voice extraction unit 110, a voiceprint feature comparison unit 120, a target user identity acquisition unit 130, a voice keyword extraction unit 140, a keyword judgment unit 150, and an authorized unit. The person information acquiring unit 160, the current goal item flow data sending unit 170, and the current goal item data receiving unit 180.
用户语音提取单元110,用于判断是否检测到表格启动指令。The user voice extraction unit 110 is used to determine whether a form start instruction is detected.
在本实施例中,服务器若接收到用户端发送的用户语音数据及用户通讯识别码,表示此时通过用户端与服务器建立连接后,用户可与服务器一侧所部署的智能对话系统进行交流。由于用户端一般使用电话呼入或具有通讯功能的应用软件(如微信等)与智能对话系统建立连接时,服务器一侧能识别到用户通讯识别码(该通讯识别码可以是电话号码,也可以是微信号码等),由于用户通讯识别码一般是绑定了用户唯一识别信息(如身份证号),故服务器一侧可以通过用户通讯识别码来进行用户身份初次判断。In this embodiment, if the server receives the user voice data and the user communication identification code sent by the user terminal, it means that the user can communicate with the intelligent dialogue system deployed on the server side after establishing a connection with the server through the user terminal at this time. Since the user side generally uses phone calls or application software with communication functions (such as WeChat, etc.) to establish a connection with the intelligent dialogue system, the server side can recognize the user communication identification code (the communication identification code can be a phone number or It is the WeChat ID code, etc.). Since the user communication identification code is generally bound to the user's unique identification information (such as the ID number), the server side can use the user communication identification code to make the initial judgment of the user's identity.
在一实施例中,用户语音提取单元110还用于:In an embodiment, the user voice extraction unit 110 is further configured to:
通过预先训练的N元模型对所述用户语音数据进行语音识别得到语音文本数据,并通过预先训练的混合高斯-通用背景模型对所述用户语音数据进行声纹识别得到语音声纹特征。Perform voice recognition on the user voice data through a pre-trained N-ary model to obtain voice text data, and perform voiceprint recognition on the user voice data through a pre-trained mixed Gaussian-universal background model to obtain voice voiceprint features.
在本实施例中,当服务器接收到了用户端所发送的用户语音数据时,可以通过调用预先存储的语音识别模型(例如N-gram语音识别模型等,其中N-gram语音识别模型即为N元模型),对所述用户语音数据进行语音识别以得到对应的语音文本数据。In this embodiment, when the server receives the user voice data sent by the user terminal, it can call a pre-stored voice recognition model (such as the N-gram voice recognition model, etc., where the N-gram voice recognition model is the N element Model) to perform voice recognition on the user voice data to obtain corresponding voice text data.
同时,在服务器中还通过调用预先存储的声纹识别模型(如混合高斯-通用背景模型等),对所述用户语音数据进行声纹识别,得到语音声纹特征。通过N元模型和混合高斯-通用背景模型这些模型对用户语音数据分别进行文本提取和声纹识别后,能基于这些识别结果进行后续的事项办理流程。At the same time, the server also performs voiceprint recognition on the user's voice data by calling a pre-stored voiceprint recognition model (such as a mixed Gaussian-universal background model, etc.) to obtain voice voiceprint features. After text extraction and voiceprint recognition are performed on the user's voice data through the N-ary model and the mixed Gaussian-universal background model, the follow-up transaction processing process can be carried out based on these recognition results.
声纹特征比对单元120,用于判断本地的声纹数据库中是否存在与所述语音声纹特征相同的声纹特征。The voiceprint feature comparison unit 120 is used to determine whether there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database.
在本实施例中,由于在声纹数据库中存储了大量用户的声纹特征,且声纹数据库是在服务器本地中,故当获取了当前用户的语音声纹特征后,需对该用户身份进行核实。In this embodiment, since the voiceprint features of a large number of users are stored in the voiceprint database, and the voiceprint database is locally on the server, when the voice and voiceprint features of the current user are acquired, the user’s identity needs to be checked. Verify.
目标用户身份获取单元130,用于若本地的声纹数据库中存在与所述语音声纹特征相同的声纹特征,以对应的声纹特征作为目标声纹特征,获取所述目标声纹特征对应的目标用户身份信息。The target user identity acquiring unit 130 is configured to, if there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, use the corresponding voiceprint feature as the target voiceprint feature to obtain the target voiceprint feature correspondence The identity information of the target user.
在本实施例中,若服务器本地的声纹数据库中存在与所述语音声纹特征相同的声纹特征,表示该用户之前是在服务器中已存储过其声纹特征数据,并且登记了该声纹特征数据对应的用户身份信息(如该用户的姓名和身份证件号),此时在获取了目标声纹特征后,即可获取与目标声纹特征相对应的目标用户身份信息。In this embodiment, if there is a voiceprint feature that is the same as the voiceprint feature in the server's local voiceprint database, it means that the user has previously stored his voiceprint feature data in the server and registered the voiceprint. The user identity information corresponding to the fingerprint feature data (such as the user's name and ID number). At this time, after the target voiceprint feature is acquired, the target user's identity information corresponding to the target voiceprint feature can be acquired.
在一实施例中,事项办理权限授权装置100还包括:In an embodiment, the device 100 for authorization of transaction handling authority further includes:
第一提示信息发送单元,用于若本地的声纹数据库中不存在与所述语音声纹特征相同的声纹特征,将根据语音模板录制用户初始语音的第一提示信息发送至用户端;The first prompt information sending unit is configured to send the first prompt information for recording the user's initial voice according to the voice template to the user terminal if there is no voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database;
用户初始语音数据接收单元,用于接收用户端根据第一提示信息发送的用户初始语音数据;其中,用户初始语音数据中包括用户姓名和身份证件号;The user's initial voice data receiving unit is configured to receive the user's initial voice data sent by the user terminal according to the first prompt information; wherein, the user's initial voice data includes the user's name and ID number;
初始语音提取单元,用于根据所述用户初始语音数据进行声纹识别和文本识别,得到与所述用户初始语音数据对应的用户声纹特征及用户语音文本数据;An initial voice extraction unit, configured to perform voiceprint recognition and text recognition according to the user's initial voice data to obtain user voiceprint features and user voice text data corresponding to the user's initial voice data;
初始语音关键词抽取单元,用于将所述用户语音文本数据进行分词和关键词提取,得到与所述用户语音文本数据对应的用户身份信息;The initial voice keyword extraction unit is used to perform word segmentation and keyword extraction on the user voice text data to obtain user identity information corresponding to the user voice text data;
初始数据登记单元,用于将所述用户声纹特征及所述用户语音文本数据对应进行数据绑定以上传至区块链进行存储。The initial data registration unit is used to bind the user's voiceprint characteristics and the user's voice and text data correspondingly to upload them to the blockchain for storage.
在本实施例中,若本地的声纹数据库中不存在与所述语音声纹特征相同的声纹特征,表示用户可能是首次与服务器中部署的智能对话系统进行交流,此时跳转执行上述用户登记声纹特征和用户身份信息的流程。In this embodiment, if there is no voiceprint feature that is the same as the voiceprint feature in the local voiceprint database, it means that the user may be communicating with the intelligent dialogue system deployed in the server for the first time. At this time, jump to execute the above The process of user registration of voiceprint features and user identity information.
例如,服务器将“请用户结合示例中朗读的文字及自身真实用户身份进行首次用户登记,示例文字我是***,身份证号是***”这一用于提示用户根据语音模板录制用户初始语音的第一提示信息发送至用户端。之后用户端根据第一提示信息发送的用户初始语音数据被服务器所接收,服务器此时对所述用户初始语音数据进行声纹识别和文本识别,得到与所述用户初始语音数据对应的用户声纹特征及用户语音文本数据。参考用户语音提取单元110中相同的方式对所述用户初始语音数据进行声纹识别和文本识别,得到与所述用户初始语音数据对应的用户声纹特征及用户语音文本数据。最后将基于所述用户语音文本数据提取的用户语音文本数据及之前得到的用户声纹特征均对应同一用户身份信息后上传至区块链进行存储。通过上述操作即可实现用户的声纹特征和用户身份信息的初次登记。For example, the server will ask the user to register the user for the first time with the text read aloud in the example and his real user identity. The example text is *** and the ID number is ***" to prompt the user to record the user according to the voice template The first prompt message of the initial voice is sent to the user terminal. After that, the user’s initial voice data sent by the user terminal according to the first prompt information is received by the server. At this time, the server performs voiceprint recognition and text recognition on the user’s initial voice data to obtain the user voiceprint corresponding to the user’s initial voice data. Features and user voice text data. The voiceprint recognition and text recognition are performed on the user's initial voice data in the same manner with reference to the user voice extraction unit 110 to obtain user voiceprint features and user voice text data corresponding to the user's initial voice data. Finally, the user voice text data extracted based on the user voice text data and the previously obtained user voiceprint features are uploaded to the blockchain for storage after corresponding to the same user identity information. Through the above operations, the initial registration of the user's voiceprint characteristics and user identity information can be realized.
其中,基于所述用户声纹特征及所述用户语音文本数据得到对应的摘要信息,具体来说,摘要信息由所述用户声纹特征及所述用户语音文本数据进行散列处理得到,比如利用sha256算法处理得到。将摘要信息上传至区块链可保证其安全性和对用户的公正透明性。用户设备可以从区块链中下载得该摘要信息,以便查证所述用户声纹特征及所述用户语音文本数据是否被篡改。本示例所指区块链是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式。区块链(Blockchain),本质上是一个去中心化的数据库,是一串使用密码学方法相关联产生的数据块,每一个数据块中包含了一批次网络交易的信息,用于验证其信息的有效性(防伪)和生成下一个区块。区块链可以包括区块链底层平台、平台产品服务层以及应用服务层等。Wherein, the corresponding summary information is obtained based on the user's voiceprint features and the user's voice and text data. Specifically, the summary information is obtained by hashing the user's voiceprint features and the user's voice and text data, such as using Sha256 algorithm is processed. Uploading summary information to the blockchain can ensure its security and fairness and transparency to users. The user equipment can download the summary information from the blockchain to verify whether the user's voiceprint characteristics and the user's voice and text data have been tampered with. The blockchain referred to in this example is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. Blockchain, essentially a decentralized database, is a series of data blocks associated with cryptographic methods. Each data block contains a batch of network transaction information for verification. The validity of the information (anti-counterfeiting) and the generation of the next block. The blockchain can include the underlying platform of the blockchain, the platform product service layer, and the application service layer.
语音关键词抽取单元140,用于若用户通讯识别码对应的用户唯一识别信息与所述目标用户身份信息有相同的用户唯一识别码,通过对所述语音文本数据依次进行文本分词和关键词抽取得到对应的关键词集合。The voice keyword extraction unit 140 is configured to: if the user unique identification information corresponding to the user communication identification code has the same user unique identification code as the target user identification information, by sequentially performing text word segmentation and keyword extraction on the voice text data Get the corresponding keyword set.
在本实施例中,若用户通讯识别码对应的用户唯一识别信息与所述目标用户身份信息有相同的用户唯一识别码,表示是用户本人与智能对话系统进行交流,此时用户本人可以继续自己办理业务,也可以选择委托他人办理(也即授权他人办理事项)。为了在判定用户通过身份验证后,真实理解用户的意图,此时需对与所述用户语音数据对应的语音文本数据进行语义分析。In this embodiment, if the user's unique identification information corresponding to the user communication identification code has the same unique user identification code as the target user's identification information, it means that the user himself is communicating with the intelligent dialogue system, and the user himself can continue to do so. To handle business, you can also choose to entrust others to handle it (that is, to authorize others to handle matters). In order to truly understand the user's intention after it is determined that the user has passed the identity verification, it is necessary to perform semantic analysis on the voice text data corresponding to the user's voice data at this time.
在一实施例中,语音关键词抽取单元140还用于:In an embodiment, the speech keyword extraction unit 140 is further used for:
通过基于概率统计分词模型对所述语音文本数据进行文本分词得到文本分词结果,通过词频-逆向文件频率模型对所述文本分词结果进行关键词抽取得到对应的关键词集合。A text word segmentation result is obtained by performing text word segmentation on the voice text data based on a probability statistical word segmentation model, and a corresponding keyword set is obtained by keyword extraction on the text word segmentation result by a word frequency-inverse document frequency model.
在本实施例中,先通过基于概率统计分词模型对所述语音文本数据进行文本内容分词,得到对应的文本分词结果,然后通过词频-逆向文件频率模型对所述文本分词结果进行关键词抽取得到对应的关键词集合。其中,基于概率统计分词模型和词频-逆向文件频率模型均是比较成熟的现有技术,此处不再展开论述。其中,需要强调的是通过词频-逆向文件频率模型(也可以称为词频-逆文本频率指数模型,即TF-IDF模型)对所述文本分词结果进行关键词抽取得到对应的关键词集合时,抽取所述文本分词结果按词频-逆文本频率指数降序排序后位于预设的排名值之前的关键词,以组成关键词集合。In this embodiment, the speech text data is segmented by text content based on the probability statistical word segmentation model to obtain the corresponding text word segmentation result, and then the text word segmentation result is extracted by keyword extraction through the word frequency-inverse document frequency model The corresponding keyword set. Among them, the word segmentation model based on probability statistics and the word frequency-reverse document frequency model are relatively mature existing technologies, and will not be discussed here. Among them, what needs to be emphasized is when the word frequency-inverse document frequency model (also called the word frequency-inverse text frequency index model, that is, the TF-IDF model) is used to extract keywords from the text segmentation result to obtain the corresponding keyword set, The keyword segmentation results of the text are sorted in descending order of word frequency-inverse text frequency index, and keywords that are located before the preset ranking value are extracted to form a keyword set.
关键词判断单元150,用于判断所述关键词集合中是否包括与授权他人办理对应的第一关键词子集合。The keyword judgment unit 150 is used for judging whether the keyword set includes a first keyword sub-set corresponding to authorized others to handle processing.
在本实施例中,为了判断用户此次与智能对话系统进行沟通是为了本人办理事项,还是委托授权他人办理事项,此时需要对关键词集合中是否包括由[授权***办理***事项被授权人验证码***]组成的第一关键词子集合。若所述关键词集合中包括第一关键词子集合,表示用户此次沟通过程中明确表示需他人帮忙办理事项,此时即可继续执行委托他人办理事项的后续步骤。若所述关键词集合中不包括第一关键词子集合,表示用户此次沟通过程中未明确表示需他人帮忙办理事项,默认用户本人继续办理事项。In this embodiment, in order to determine whether the user communicates with the intelligent dialogue system this time is for the user to handle the matter, or to authorize others to handle the matter, it is necessary to check whether the keyword set includes the [authorization***Handle*** Matters authorized person verification code ***] the first keyword sub-collection. If the keyword set includes the first keyword sub-set, it means that the user clearly stated that other people are needed to handle the matter during the communication process, and the subsequent steps of entrusting others to handle the matter can be continued at this time. If the keyword set does not include the first keyword sub-set, it means that the user has not clearly stated that other people are required to handle the matter in the communication process, and the user himself will continue to handle the matter by default.
被授权人信息获取单元160,用于若所述关键词集合中包括与授权他人办理对应的第一关键词子集合,获取所述第一关键词子集合中包括的被授权人名字、被授权人验证码和被授权事项名称。The authorized person information obtaining unit 160 is configured to obtain the authorized person’s name and authorized person’s name and authorized person included in the first keyword sub-set if the keyword set includes the first keyword sub-set corresponding to the authorization of others. Person verification code and authorized item name.
在本实施例中,若所述关键词集合中包括与授权他人办理对应的第一关键词子集合,表示此时服务器中的智能对话系统是已知当前事项是委托人授权被授权人帮其办理,此时为了核实被授权人的身份,可以有双重核验,一是获取被授权人名字,二是获取被授权人验证码。其中,被授权人名字是授权人在对话过程中形成的用户语音数据中所包括的,同样用户语音数据中也是包括被授权人验证码、及被授权事项名称。In this embodiment, if the keyword set includes the first keyword sub-set corresponding to authorized others, it means that the intelligent dialogue system in the server at this time knows that the current matter is that the principal authorizes the authorized person to help it. When processing, in order to verify the identity of the authorized person, there can be double verification, one is to obtain the authorized person's name, and the other is to obtain the authorized person's verification code. Among them, the name of the authorized person is included in the user's voice data formed by the authorized person during the conversation, and the user's voice data also includes the authorized person's verification code and the name of the authorized item.
由于此时被授权人可能是与委托人在同一地点,被授权人可以继续使用委托人的用户端继续办理事项,这一场景类似于用户对终端使用熟练程度不高或是专业知识水平不高的大龄用户在某营业厅咨询办理业务时,营业厅工作人员可以直接告诉大龄用户在与智能对话系统沟通的过程中说出委托***办理***事项的文本段,此时营业厅工作人员即可继续使用该用户的用户端继续帮其办理事项。或者是该营业厅工作人员使用其他用户终端(其他用户终端可能是该营业厅工作人员自己所使用的用户端,与委托人使用的用户端不是同一个终端)。Since the authorized person may be at the same place as the principal at this time, the authorized person can continue to use the client terminal of the principal to continue handling matters. This scenario is similar to that the user is not proficient in using the terminal or has a low level of professional knowledge. When the older users consult and handle business in a business hall, the staff of the business hall can directly tell the older users to say the text segment of the entrusted *** deal with the matters in the process of communicating with the intelligent dialogue system, and the business hall will work at this time The personnel can continue to use the user's client to continue to help them handle matters. Or, the staff of the business hall uses other user terminals (the other user terminals may be the user terminals used by the staff of the business hall themselves, and are not the same terminal as the client used by the client).
当前目标事项流程数据发送单元170,用于根据所接收到的由用户端或其他用户端发送的与第一关键词子集合对应的当前用户语音数据,调用对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端。The current target event process data sending unit 170 is configured to call the corresponding current target event process data according to the received current user voice data corresponding to the first keyword subset sent by the user terminal or other user terminals, and transfer all the current target event process data. The flow data of the current target item is sent to the client or other client in sequence in the sequence of the flow.
在本实施例中,当委托人授权给被授权人进行事项办理时,被授权人通过所述委托人的用户端或是被授权人自己使用的其他用户端与服务器中的智能对话系统进行沟通,从而将当前用户语音数据发送至服务器。此时在服务器中调用对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端,从而实现事项授权他人办理。In this embodiment, when the principal authorizes the authorized person to handle matters, the authorized person communicates with the intelligent dialogue system in the server through the client terminal of the principal or another client terminal used by the authorized person. , So as to send the current user's voice data to the server. At this time, the corresponding current target item process data is called in the server, and the current target item process data is sequentially sent to the user terminal or other user terminals in the sequence of the process, so as to realize the authorization of others to handle the item.
在一实施例中,当前目标事项流程数据发送单元170包括:In an embodiment, the current target item process data sending unit 170 includes:
当前用户语音数据提取单元,用于若接收到用户端或其他用户端发送的当前用户语音数据,通过语音识别和关键词抽取,获取与所述当前用户语音数据对应的当前用户人名字和当前验证码;The current user voice data extraction unit is used to obtain the current user name and current verification corresponding to the current user voice data through voice recognition and keyword extraction if the current user voice data sent by the user terminal or other user terminals is received code;
当前目标事项流程数据调用单元,用于若所述当前用户人名字与所述被授权人名字相同、且所述当前验证码与所述被授权人验证码相同,调用本地已存储并与被授权事项名称对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端。The current target item process data calling unit is used to call if the current user’s name is the same as the authorized person’s name and the current verification code is the same as the authorized person’s verification code, call the locally stored and authorized The current target event process data corresponding to the event name is sent to the client or other client in sequence in the sequence of the process.
在本实施例中,若接收到用户端或其他用户端发送的当前用户语音数据,此时为了对被授权人的身份进行核验,此时通过语音识别获取与所述当前用户语音数据对应的当前用户人名字和当前验证码,语音识别和关键词获取的过程可参考语音关键词抽取单元140。In this embodiment, if the current user voice data sent by the user terminal or other user terminals is received, in order to verify the identity of the authorized person at this time, the current user voice data corresponding to the current user’s voice data is obtained through voice recognition. For the user's name and current verification code, the process of voice recognition and keyword acquisition can refer to the voice keyword extraction unit 140.
若所述当前用户人名字与所述被授权人名字相同、且所述当前验证码与所述被授权人验证码相同,表示被授权人的身份通过系统核验。此时被授权人即可根据服务器对应发送的当前目标事项流程数据为引导,从而快速办理事项。If the name of the current user is the same as the name of the authorized person, and the current verification code is the same as the verification code of the authorized person, it means that the identity of the authorized person has passed the system verification. At this time, the authorized person can follow the current target item process data sent by the server as a guide, so as to quickly handle the item.
当前目标事项数据接收单元180,用于接收用户端或其他用户端发送的与所述当前目标事项流程数据对应的当前目标事项数据。The current target item data receiving unit 180 is configured to receive current target item data corresponding to the current target item process data sent by the client or other client terminals.
在本实施例中,当被授权人根据当前目标事项流程数据办理完当前的事项,针对所述当前目标事项流程数据中每一子流程均反馈对应数据,并组成对应的当前目标事项数据后,此时可以将当前目标事项数据存储在服务器中。In this embodiment, after the authorized person has completed the current item according to the current target item process data, the corresponding data is fed back to each sub-process in the current target item process data, and the corresponding current target item data is formed, At this time, the current target item data can be stored in the server.
之后,还可以对当前用户语音数据进行声纹识别,获取与被授权人对应的声纹特征。一旦被授权人本人其他时刻与智能对话系统进行沟通办理事项时,不用重复对被授权人进行声纹特征登记,一般让委托人本人补充登记其用户身份信息即可。Afterwards, voiceprint recognition can also be performed on the current user's voice data to obtain voiceprint features corresponding to the authorized person. Once the authorized person communicates with the intelligent dialogue system to handle matters at other times, there is no need to repeat the voiceprint feature registration of the authorized person. Generally, the principal can supplement the registration of his user identity information.
之后,委托人还可以继续通过与智能对话系统沟通解除被授权人办理事项的权限,可以说出“我要解除**办理**的权限”,则之前的被授权人不能再次办理授权人的事项。After that, the principal can continue to cancel the authorized person's authority to handle matters through the communication with the intelligent dialogue system, and can say "I want to remove the authority to handle **", then the previous authorized person cannot handle the authorized person's authority again matter.
在一实施例中,事项办理权限授权装置100还包括:In an embodiment, the device 100 for authorization of transaction handling authority further includes:
数据上链单元,用于将所述当前目标事项流程数据上传至区块链网络中。The data link unit is used to upload the current target item process data to the blockchain network.
在本实施例中,将每一用户自己办理或委托他人办理的当前目标事项流程数据均可以上传至区块链网络进行存储,充分利用区块链的不可篡改的特性,以实现对用户每一次事项办理数据的存储。In this embodiment, the current target item process data that each user handles or entrusts others to handle can be uploaded to the blockchain network for storage, making full use of the non-tampering feature of the blockchain to realize the Matters deal with the storage of data.
在一实施例中,事项办理权限授权装置100还包括:In an embodiment, the device 100 for authorization of transaction handling authority further includes:
第二关键词子集合获取单元,用于若所述关键词集合中不包括与授权他人办理对应的第一关键词子集合,获取所述关键词集合中包括的与事项类型对应的第二关键词子集合;The second keyword subset acquiring unit is configured to, if the keyword set does not include the first keyword subset corresponding to authorized others to handle, acquire the second key corresponding to the item type included in the keyword set Word sub-collection
目标事项流程数据发送单元,用于调用本地已存储并与所述第二关键词子集合对应的目标事项流程数据,将所述目标事项流程数据根据流程顺序依序发送至用户端;The target event process data sending unit is used to call the target event process data stored locally and corresponding to the second keyword subset, and send the target event process data to the user terminal in sequence according to the process sequence;
目标事项数据上链单元,用于获取用户端发送的与所述目标事项流程数据对应的目标事项数据,并上传至区块链进行存储。The target item data on-chain unit is used to obtain the target item data corresponding to the target item process data sent by the client, and upload it to the blockchain for storage.
在本实施例中,若所述关键词集合中不包括第一关键词子集合,表示用户此次沟通过程中未明确表示需他人帮忙办理事项,默认用户本人继续办理事项。当用户无需委托他人办理事项时,此时为了更加方便引导客户办理业务,可获取关键词集合中包括的与事项类型对应的第二关键词子集合,由第二关键词子集合确定用户的待办事项。在服务器预先存储的多种待办事项分别对应的事项流程数据中,获取与用户的待办事项对应的目标事项流程数据。In this embodiment, if the keyword set does not include the first keyword sub-set, it means that the user did not clearly indicate that other people are required to handle the matter during this communication process, and the user himself/herself will continue to handle the matter by default. When the user does not need to entrust others to handle matters, in order to make it more convenient to guide customers to handle the business, the second keyword sub-set corresponding to the item type included in the keyword set can be obtained, and the second keyword sub-set determines the user’s waiting list. Do things. Obtain target item flow data corresponding to the user's to-do items in the item flow data respectively corresponding to various to-do items stored in advance by the server.
获取了与用户的待办事项对应的目标事项流程数据,这些目标流程事项数据一般是包括很多事项办理步骤,每一步骤中均是提示用户做出是或否的选择、或者是提供一些用户信息,此时为了引导用户办理事项,是将所述目标事项流程数据根据流程顺序依序发送至用户端。Obtained the target item process data corresponding to the user's to-do items. These target process item data generally include many item handling steps. In each step, the user is prompted to make a yes or no choice, or provide some user information At this time, in order to guide the user to handle matters, the process data of the target matters are sent to the user terminal in sequence according to the process sequence.
更具体的是将所述目标事项流程数据根据流程顺序依序发送至用户端时,首先将其中的事项第一子步骤数据发送至用户端,待用户端针对第一事项步骤子数据做出反馈(例如针对第一事项步骤子数据对应发送第一事项步骤子反馈数据)后才继续推送事项第二子步骤数据, 后续的处理过程也是依次类推,直至用户根据目标事项流程数据办理完当前的事项。More specifically, when the target item process data is sent to the user terminal in sequence according to the process sequence, the first sub-step data of the item therein is first sent to the user terminal, and the user terminal will give feedback on the first item step sub-data. (For example, for the first item step sub-data corresponding to the first item step sub-feedback data), then the second sub-step data of the item will continue to be pushed, and the subsequent processing process is analogous to that until the user finishes the current item according to the target item process data .
当用户根据目标事项流程数据办理完当前的事项,针对所述目标事项流程数据中每一子流程均反馈对应数据,并组成对应的目标事项数据后,此时可以将目标事项数据存储在服务器中,也可由服务器将目标事项数据上传至区块链网络进行存储。After the user finishes the current item according to the target item process data, and feeds back the corresponding data for each sub-process in the target item process data, and composes the corresponding target item data, the target item data can be stored in the server at this time , The server can also upload the target item data to the blockchain network for storage.
该装置实现了基于声纹识别对用户进行身份验证,而且能语音授权委托事项办理熟练度高的他人帮忙办理事项,不仅提高了用户数据的安全性,而且提高了数据处理效率。The device realizes the identity verification of the user based on voiceprint recognition, and can voice authorization entrusted matters to be handled by others who are proficient in handling matters, which not only improves the security of user data, but also improves the efficiency of data processing.
上述事项办理权限授权装置可以实现为计算机程序的形式,该计算机程序可以在如图4所示的计算机设备上运行。The above-mentioned matter handling authority authorization device can be implemented in the form of a computer program, and the computer program can be run on the computer device as shown in FIG. 4.
请参阅图4,图4是本申请实施例提供的计算机设备的示意性框图。该计算机设备500是服务器,服务器可以是独立的服务器,也可以是多个服务器组成的服务器集群。Please refer to FIG. 4, which is a schematic block diagram of a computer device according to an embodiment of the present application. The computer device 500 is a server, and the server may be an independent server or a server cluster composed of multiple servers.
参阅图4,该计算机设备500包括通过系统总线501连接的处理器502、存储器和网络接口505,其中,存储器可以包括非易失性存储介质503和内存储器504。4, the computer device 500 includes a processor 502, a memory, and a network interface 505 connected through a system bus 501, where the memory may include a non-volatile storage medium 503 and an internal memory 504.
该非易失性存储介质503可存储操作系统5031和计算机程序5032。该计算机程序5032被执行时,可使得处理器502执行事项办理权限授权方法。The non-volatile storage medium 503 can store an operating system 5031 and a computer program 5032. When the computer program 5032 is executed, the processor 502 can execute the method for authorization of transaction handling authority.
该处理器502用于提供计算和控制能力,支撑整个计算机设备500的运行。The processor 502 is used to provide calculation and control capabilities, and support the operation of the entire computer device 500.
该内存储器504为非易失性存储介质503中的计算机程序5032的运行提供环境,该计算机程序5032被处理器502执行时,可使得处理器502执行事项办理权限授权方法。The internal memory 504 provides an environment for the operation of the computer program 5032 in the non-volatile storage medium 503. When the computer program 5032 is executed by the processor 502, the processor 502 can execute the method for authorization of transaction handling rights.
该网络接口505用于进行网络通信,如提供数据信息的传输等。本领域技术人员可以理解,图4中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备500的限定,具体的计算机设备500可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。The network interface 505 is used for network communication, such as providing data information transmission. Those skilled in the art can understand that the structure shown in FIG. 4 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the computer device 500 to which the solution of the present application is applied. The specific computer device 500 may include more or fewer components than shown in the figure, or combine certain components, or have a different component arrangement.
其中,所述处理器502用于运行存储在存储器中的计算机程序5032,以实现本申请实施例公开的事项办理权限授权方法。Wherein, the processor 502 is configured to run a computer program 5032 stored in a memory, so as to implement the method for authorization of transaction handling rights disclosed in the embodiments of the present application.
本领域技术人员可以理解,图4中示出的计算机设备的实施例并不构成对计算机设备具体构成的限定,在其他实施例中,计算机设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。例如,在一些实施例中,计算机设备可以仅包括存储器及处理器,在这样的实施例中,存储器及处理器的结构及功能与图4所示实施例一致,在此不再赘述。Those skilled in the art can understand that the embodiment of the computer device shown in FIG. 4 does not constitute a limitation on the specific configuration of the computer device. In other embodiments, the computer device may include more or less components than those shown in the figure. Or some parts are combined, or different parts are arranged. For example, in some embodiments, the computer device may only include a memory and a processor. In such an embodiment, the structures and functions of the memory and the processor are consistent with the embodiment shown in FIG. 4, and will not be repeated here.
应当理解,在本申请实施例中,处理器502可以是中央处理单元(Central Processing Unit,CPU),该处理器502还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。其中,通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。It should be understood that, in this embodiment of the application, the processor 502 may be a central processing unit (Central Processing Unit, CPU), and the processor 502 may also be other general-purpose processors, digital signal processors (Digital Signal Processors, DSPs), Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc. Among them, the general-purpose processor may be a microprocessor or the processor may also be any conventional processor.
在本申请的另一实施例中提供计算机可读存储介质。所述计算机可读存储介质可以是非易失性,也可以是易失性。该计算机可读存储介质存储有计算机程序,其中计算机程序被处理器执行时实现本申请实施例公开的事项办理权限授权方法。In another embodiment of the present application, a computer-readable storage medium is provided. The computer-readable storage medium may be non-volatile or volatile. The computer-readable storage medium stores a computer program, where the computer program, when executed by a processor, implements the method for authorization of transaction handling rights disclosed in the embodiments of the present application.
所属领域的技术人员可以清楚地了解到,为了描述的方便和简洁,上述描述的设备、装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。本领域普通技术人员可以意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。Those skilled in the art can clearly understand that, for the convenience and conciseness of description, the specific working process of the above-described equipment, device, and unit can refer to the corresponding process in the foregoing method embodiment, which will not be repeated here. A person of ordinary skill in the art may be aware that the units and algorithm steps of the examples described in the embodiments disclosed herein can be implemented by electronic hardware, computer software, or a combination of both, in order to clearly illustrate the hardware and software Interchangeability, in the above description, the composition and steps of each example have been generally described in accordance with the function. Whether these functions are executed by hardware or software depends on the specific application and design constraint conditions of the technical solution. Professionals and technicians can use different methods for each specific application to implement the described functions, but such implementation should not be considered beyond the scope of this application.
在本申请所提供的几个实施例中,应该理解到,所揭露的设备、装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分, 仅仅为逻辑功能划分,实际实现时可以有另外的划分方式,也可以将具有相同功能的单元集合成一个单元,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另外,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口、装置或单元的间接耦合或通信连接,也可以是电的,机械的或其它的形式连接。In the several embodiments provided in this application, it should be understood that the disclosed equipment, device, and method may be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the units is only a logical function division. In actual implementation, there may be other division methods, or the units with the same function may be combined into one. Units, for example, multiple units or components can be combined or integrated into another system, or some features can be omitted or not implemented. In addition, the displayed or discussed mutual coupling or direct coupling or communication connection may be indirect coupling or communication connection through some interfaces, devices or units, and may also be electrical, mechanical or other forms of connection.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本申请实施例方案的目的。The units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, they may be located in one place, or they may be distributed on multiple network units. Some or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments of the present application.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以是两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, the functional units in the various embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit. The above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分,或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、磁碟或者光盘等各种可以存储程序代码的介质。If the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a storage medium. Based on this understanding, the technical solution of this application is essentially or the part that contributes to the existing technology, or all or part of the technical solution can be embodied in the form of a software product, and the computer software product is stored in a storage medium. It includes several instructions to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute all or part of the steps of the method described in each embodiment of the present application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), magnetic disk or optical disk and other media that can store program codes.
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到各种等效的修改或替换,这些修改或替换都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以权利要求的保护范围为准。The above are only specific implementations of this application, but the protection scope of this application is not limited to this. Anyone familiar with the technical field can easily think of various equivalents within the technical scope disclosed in this application. Modifications or replacements, these modifications or replacements shall be covered within the protection scope of this application. Therefore, the protection scope of this application should be subject to the protection scope of the claims.

Claims (20)

  1. 一种事项办理权限授权方法,其中,包括:A method of authorization for handling matters, including:
    若接收到用户端发送的用户语音数据和用户通讯识别码,对所述用户语音数据进行语音识别和声纹识别,得到与所述用户语音数据对应的语音文本数据和语音声纹特征;If the user voice data and the user communication identification code sent by the user terminal are received, perform voice recognition and voiceprint recognition on the user voice data to obtain voice text data and voice voiceprint characteristics corresponding to the user voice data;
    判断本地的声纹数据库中是否存在与所述语音声纹特征相同的声纹特征;Judging whether there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database;
    若本地的声纹数据库中存在与所述语音声纹特征相同的声纹特征,以对应的声纹特征作为目标声纹特征,获取所述目标声纹特征对应的目标用户身份信息;If there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, use the corresponding voiceprint feature as the target voiceprint feature to obtain the target user identity information corresponding to the target voiceprint feature;
    若用户通讯识别码对应的用户唯一识别信息与所述目标用户身份信息有相同的用户唯一识别码,通过对所述语音文本数据依次进行文本分词和关键词抽取得到对应的关键词集合;If the user unique identification information corresponding to the user communication identification code has the same unique user identification code as the target user identification information, the corresponding keyword set is obtained by sequentially performing text segmentation and keyword extraction on the voice text data;
    判断所述关键词集合中是否包括与授权他人办理对应的第一关键词子集合;Judging whether the keyword set includes the first keyword sub-set corresponding to authorized others to handle it;
    若所述关键词集合中包括与授权他人办理对应的第一关键词子集合,获取所述第一关键词子集合中包括的被授权人名字、被授权人验证码和被授权事项名称;If the keyword set includes the first keyword sub-set corresponding to authorized others to handle, obtain the authorized person's name, the authorized person's verification code, and the authorized item name included in the first keyword sub-set;
    根据所接收到的由用户端或其他用户端发送的与第一关键词子集合对应的当前用户语音数据,调用对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端;以及According to the received current user voice data corresponding to the first keyword subset sent by the user terminal or other user terminals, call the corresponding current target item process data, and sequentially order the current target item process data according to the process sequence Send to the client or other clients; and
    接收用户端或其他用户端发送的与所述当前目标事项流程数据对应的当前目标事项数据。Receive current target item data corresponding to the current target item process data sent by the client or other client terminals.
  2. 根据权利要求1所述的事项办理权限授权方法,其中,所述对所述用户语音数据进行语音识别和声纹识别,得到与所述用户语音数据对应的语音文本数据和语音声纹特征,包括:The method of claim 1, wherein said performing voice recognition and voiceprint recognition on said user voice data to obtain voice text data and voice voiceprint characteristics corresponding to said user voice data comprises :
    通过预先训练的N元模型对所述用户语音数据进行语音识别得到语音文本数据,并通过预先训练的混合高斯-通用背景模型对所述用户语音数据进行声纹识别得到语音声纹特征。Perform voice recognition on the user voice data through a pre-trained N-ary model to obtain voice text data, and perform voiceprint recognition on the user voice data through a pre-trained mixed Gaussian-universal background model to obtain voice voiceprint features.
  3. 根据权利要求1所述的事项办理权限授权方法,其中,所述判断本地的声纹数据库中是否存在与所述语音声纹特征相同的声纹特征之后,还包括:The matter handling authority authorization method according to claim 1, wherein after determining whether there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, the method further comprises:
    若本地的声纹数据库中不存在与所述语音声纹特征相同的声纹特征,将根据语音模板录制用户初始语音的第一提示信息发送至用户端;If there is no voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, sending the first prompt message for recording the user's initial voice according to the voice template to the user terminal;
    接收用户端根据第一提示信息发送的用户初始语音数据;其中,用户初始语音数据中包括用户姓名和身份证件号;Receive the user's initial voice data sent by the user terminal according to the first prompt message; wherein the user's initial voice data includes the user's name and ID number;
    根据所述用户初始语音数据进行声纹识别和文本识别,得到与所述用户初始语音数据对应的用户声纹特征及用户语音文本数据;Performing voiceprint recognition and text recognition according to the user's initial voice data to obtain user voiceprint features and user voice text data corresponding to the user's initial voice data;
    将所述用户语音文本数据进行分词和关键词提取,得到与所述用户语音文本数据对应的用户身份信息;Performing word segmentation and keyword extraction on the user voice text data to obtain user identity information corresponding to the user voice text data;
    将所述用户声纹特征及所述用户语音文本数据对应进行数据绑定以上传至区块链进行存储。The user's voiceprint feature and the user's voice and text data are correspondingly data-bound to upload to the blockchain for storage.
  4. 根据权利要求1所述的事项办理权限授权方法,其中,所述判断所述关键词集合中是否包括与授权他人办理对应的第一关键词子集合之后,还包括:The method for authorization of transaction handling rights according to claim 1, wherein after said determining whether said keyword set includes a first keyword sub-set corresponding to authorized others to handle, the method further comprises:
    若所述关键词集合中不包括与授权他人办理对应的第一关键词子集合,获取所述关键词集合中包括的与事项类型对应的第二关键词子集合;If the keyword set does not include the first keyword sub-set corresponding to authorized others to handle the processing, obtain the second keyword sub-set corresponding to the item type included in the keyword set;
    调用本地已存储并与所述第二关键词子集合对应的目标事项流程数据,将所述目标事项流程数据根据流程顺序依序发送至用户端;Call the target event process data stored locally and corresponding to the second keyword sub-set, and send the target event process data to the client in sequence according to the process sequence;
    获取用户端发送的与所述目标事项流程数据对应的目标事项数据,并上传至区块链进行存储。Obtain the target event data corresponding to the target event process data sent by the client, and upload it to the blockchain for storage.
  5. 根据权利要求1所述的事项办理权限授权方法,其中,所述根据所接收到的由用户端或其他用户端发送的与第一关键词子集合对应的当前用户语音数据,调用对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端,包括:The matter handling authority authorization method according to claim 1, wherein, according to the received current user voice data corresponding to the first keyword subset sent by the user terminal or other user terminals, the corresponding current target is called Event process data, which sends the current target event process data to the client or other clients in sequence in the sequence of the process, including:
    若接收到用户端或其他用户端发送的当前用户语音数据,通过语音识别和关键词抽取,获取与所述当前用户语音数据对应的当前用户人名字和当前验证码;If the current user voice data sent by the user terminal or other user terminals is received, through voice recognition and keyword extraction, the current user name and current verification code corresponding to the current user voice data are obtained;
    若所述当前用户人名字与所述被授权人名字相同、且所述当前验证码与所述被授权人验证码相同,调用本地已存储并与被授权事项名称对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端。If the name of the current user is the same as the name of the authorized person, and the current verification code is the same as the verification code of the authorized person, call the current target item process data stored locally and corresponding to the authorized item name, The process data of the current target item is sent to the client or other clients in sequence in the sequence of the process.
  6. 根据权利要求1所述的事项办理权限授权方法,其中,所述通过对所述语音文本数据依次进行文本分词和关键词抽取得到对应的关键词集合,包括:The matter handling authority authorization method according to claim 1, wherein the step of sequentially performing text segmentation and keyword extraction on the voice text data to obtain a corresponding keyword set includes:
    通过基于概率统计分词模型对所述语音文本数据进行文本分词得到文本分词结果,通过词频-逆向文件频率模型对所述文本分词结果进行关键词抽取得到对应的关键词集合。A text word segmentation result is obtained by performing text word segmentation on the voice text data based on a probability statistical word segmentation model, and a corresponding keyword set is obtained by keyword extraction on the text word segmentation result by a word frequency-inverse document frequency model.
  7. 根据权利要求1所述的事项办理权限授权方法,其中,所述接收用户端或其他用户端发送的与所述当前目标事项流程数据对应的当前目标事项数据之后,还包括:The matter handling authority authorization method according to claim 1, wherein after the receiving the current target item data corresponding to the current target item process data sent by the client or other client terminals, the method further comprises:
    将所述当前目标事项流程数据上传至区块链网络中。Upload the current target item process data to the blockchain network.
  8. 根据权利要求1所述的事项办理权限授权方法,其中,还包括:The matter handling authority authorization method according to claim 1, which further comprises:
    对当前用户语音数据进行声纹识别,获取与被授权人对应的声纹特征。Perform voiceprint recognition on the current user's voice data, and obtain the voiceprint characteristics corresponding to the authorized person.
  9. 根据权利要求1所述的事项办理权限授权方法,其中,还包括:The matter handling authority authorization method according to claim 1, further comprising:
    若检测到用户端发送的解除权限语音数据,将与所述被授权人对应的事项权限进行删除。If the permission-removed voice data sent by the user terminal is detected, the item permission corresponding to the authorized person is deleted.
  10. 一种事项办理权限授权装置,其中,包括:A matter handling authority authorization device, which includes:
    用户语音提取单元,用于若接收到用户端发送的用户语音数据和用户通讯识别码,对所述用户语音数据进行语音识别和声纹识别,得到与所述用户语音数据对应的语音文本数据和语音声纹特征;The user voice extraction unit is configured to perform voice recognition and voiceprint recognition on the user voice data if the user voice data and user communication identification code sent by the user terminal are received, to obtain the voice text data and the voice text data corresponding to the user voice data. Voice voiceprint characteristics;
    声纹特征比对单元,用于判断本地的声纹数据库中是否存在与所述语音声纹特征相同的声纹特征;The voiceprint feature comparison unit is used to determine whether there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database;
    目标用户身份获取单元,用于若本地的声纹数据库中存在与所述语音声纹特征相同的声纹特征,以对应的声纹特征作为目标声纹特征,获取所述目标声纹特征对应的目标用户身份信息;The target user identity acquiring unit is configured to, if there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, use the corresponding voiceprint feature as the target voiceprint feature to obtain the corresponding voiceprint feature Target user identity information;
    语音关键词抽取单元,用于若用户通讯识别码对应的用户唯一识别信息与所述目标用户身份信息有相同的用户唯一识别码,通过对所述语音文本数据依次进行文本分词和关键词抽取得到对应的关键词集合;The voice keyword extraction unit is used to obtain the unique user identification code by sequentially performing text word segmentation and keyword extraction on the voice text data if the user unique identification information corresponding to the user communication identification code and the target user identification information have the same unique user identification code Corresponding keyword set;
    关键词判断单元,用于判断所述关键词集合中是否包括与授权他人办理对应的第一关键词子集合;The keyword judgment unit is used to judge whether the keyword set includes the first keyword sub-set corresponding to authorized others to handle;
    被授权人信息获取单元,用于若所述关键词集合中包括与授权他人办理对应的第一关键词子集合,获取所述第一关键词子集合中包括的被授权人名字、被授权人验证码和被授权事项名称;The authorized person information obtaining unit is used to obtain the name of the authorized person and the authorized person included in the first keyword sub-set if the keyword set includes a first keyword sub-set corresponding to authorized others to handle Verification code and authorized item name;
    当前目标事项流程数据发送单元,用于根据所接收到的由用户端或其他用户端发送的与第一关键词子集合对应的当前用户语音数据,调用对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端;以及The current target item process data sending unit is used to call the corresponding current target item process data according to the received current user voice data corresponding to the first keyword subset sent by the user terminal or other user terminals, and transfer the The current target item process data is sent to the client or other clients in sequence in the sequence of the process; and
    当前目标事项数据接收单元,用于接收用户端或其他用户端发送的与所述当前目标事项流程数据对应的当前目标事项数据。The current target item data receiving unit is configured to receive the current target item data corresponding to the current target item process data sent by the user terminal or other user terminals.
  11. 一种计算机设备,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,其中,所述处理器执行所述计算机程序时实现以下步骤:A computer device includes a memory, a processor, and a computer program stored on the memory and capable of running on the processor, wherein the processor implements the following steps when the processor executes the computer program:
    若接收到用户端发送的用户语音数据和用户通讯识别码,对所述用户语音数据进行语音识别和声纹识别,得到与所述用户语音数据对应的语音文本数据和语音声纹特征;If the user voice data and the user communication identification code sent by the user terminal are received, perform voice recognition and voiceprint recognition on the user voice data to obtain voice text data and voice voiceprint characteristics corresponding to the user voice data;
    判断本地的声纹数据库中是否存在与所述语音声纹特征相同的声纹特征;Judging whether there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database;
    若本地的声纹数据库中存在与所述语音声纹特征相同的声纹特征,以对应的声纹特征作为目标声纹特征,获取所述目标声纹特征对应的目标用户身份信息;If there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, use the corresponding voiceprint feature as the target voiceprint feature to obtain the target user identity information corresponding to the target voiceprint feature;
    若用户通讯识别码对应的用户唯一识别信息与所述目标用户身份信息有相同的用户唯一识别码,通过对所述语音文本数据依次进行文本分词和关键词抽取得到对应的关键词集合;If the user unique identification information corresponding to the user communication identification code has the same unique user identification code as the target user identification information, the corresponding keyword set is obtained by sequentially performing text segmentation and keyword extraction on the voice text data;
    判断所述关键词集合中是否包括与授权他人办理对应的第一关键词子集合;Judging whether the keyword set includes the first keyword sub-set corresponding to authorized others to handle it;
    若所述关键词集合中包括与授权他人办理对应的第一关键词子集合,获取所述第一关键词子集合中包括的被授权人名字、被授权人验证码和被授权事项名称;If the keyword set includes the first keyword sub-set corresponding to authorized others to handle, obtain the authorized person's name, the authorized person's verification code, and the authorized item name included in the first keyword sub-set;
    根据所接收到的由用户端或其他用户端发送的与第一关键词子集合对应的当前用户语音数据,调用对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端;以及According to the received current user voice data corresponding to the first keyword subset sent by the user terminal or other user terminals, call the corresponding current target item process data, and sequentially order the current target item process data according to the process sequence Send to the client or other clients; and
    接收用户端或其他用户端发送的与所述当前目标事项流程数据对应的当前目标事项数据。Receive current target item data corresponding to the current target item process data sent by the client or other client terminals.
  12. 根据权利要求11所述的计算机设备,其中,所述对所述用户语音数据进行语音识别和声纹识别,得到与所述用户语音数据对应的语音文本数据和语音声纹特征,包括:The computer device according to claim 11, wherein said performing voice recognition and voiceprint recognition on said user voice data to obtain voice text data and voice voiceprint characteristics corresponding to said user voice data comprises:
    通过预先训练的N元模型对所述用户语音数据进行语音识别得到语音文本数据,并通过预先训练的混合高斯-通用背景模型对所述用户语音数据进行声纹识别得到语音声纹特征。Perform voice recognition on the user voice data through a pre-trained N-ary model to obtain voice text data, and perform voiceprint recognition on the user voice data through a pre-trained mixed Gaussian-universal background model to obtain voice voiceprint features.
  13. 根据权利要求11所述的计算机设备,其中,所述判断本地的声纹数据库中是否存在与所述语音声纹特征相同的声纹特征之后,还包括:11. The computer device according to claim 11, wherein after determining whether there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, the method further comprises:
    若本地的声纹数据库中不存在与所述语音声纹特征相同的声纹特征,将根据语音模板录制用户初始语音的第一提示信息发送至用户端;If there is no voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, sending the first prompt message for recording the user's initial voice according to the voice template to the user terminal;
    接收用户端根据第一提示信息发送的用户初始语音数据;其中,用户初始语音数据中包括用户姓名和身份证件号;Receive the user's initial voice data sent by the user terminal according to the first prompt message; wherein the user's initial voice data includes the user's name and ID number;
    根据所述用户初始语音数据进行声纹识别和文本识别,得到与所述用户初始语音数据对应的用户声纹特征及用户语音文本数据;Performing voiceprint recognition and text recognition according to the user's initial voice data to obtain user voiceprint features and user voice text data corresponding to the user's initial voice data;
    将所述用户语音文本数据进行分词和关键词提取,得到与所述用户语音文本数据对应的用户身份信息;Performing word segmentation and keyword extraction on the user voice text data to obtain user identity information corresponding to the user voice text data;
    将所述用户声纹特征及所述用户语音文本数据对应进行数据绑定以上传至区块链进行存储。The user's voiceprint feature and the user's voice and text data are correspondingly data-bound to upload to the blockchain for storage.
  14. 根据权利要求11所述的计算机设备,其中,所述判断所述关键词集合中是否包括与授权他人办理对应的第一关键词子集合之后,还包括:11. The computer device according to claim 11, wherein, after determining whether the keyword set includes a first keyword sub-set corresponding to authorized others to handle processing, the method further comprises:
    若所述关键词集合中不包括与授权他人办理对应的第一关键词子集合,获取所述关键词集合中包括的与事项类型对应的第二关键词子集合;If the keyword set does not include the first keyword sub-set corresponding to authorized others to handle the processing, obtain the second keyword sub-set corresponding to the item type included in the keyword set;
    调用本地已存储并与所述第二关键词子集合对应的目标事项流程数据,将所述目标事项流程数据根据流程顺序依序发送至用户端;Call the target event process data stored locally and corresponding to the second keyword sub-set, and send the target event process data to the client in sequence according to the process sequence;
    获取用户端发送的与所述目标事项流程数据对应的目标事项数据,并上传至区块链进行存储。Obtain the target event data corresponding to the target event process data sent by the client, and upload it to the blockchain for storage.
  15. 根据权利要求11所述的计算机设备,其中,所述根据所接收到的由用户端或其他用户端发送的与第一关键词子集合对应的当前用户语音数据,调用对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端,包括:11. The computer device according to claim 11, wherein, according to the received current user voice data corresponding to the first keyword subset sent by the user terminal or other user terminals, the corresponding current target item process data is called , And send the current target item process data to the client or other client in the sequence of the process, including:
    若接收到用户端或其他用户端发送的当前用户语音数据,通过语音识别和关键词抽取,获取与所述当前用户语音数据对应的当前用户人名字和当前验证码;If the current user voice data sent by the user terminal or other user terminals is received, through voice recognition and keyword extraction, the current user name and current verification code corresponding to the current user voice data are obtained;
    若所述当前用户人名字与所述被授权人名字相同、且所述当前验证码与所述被授权人验证码相同,调用本地已存储并与被授权事项名称对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端。If the name of the current user is the same as the name of the authorized person, and the current verification code is the same as the verification code of the authorized person, call the current target item process data stored locally and corresponding to the authorized item name, The process data of the current target item is sent to the client or other clients in sequence in the sequence of the process.
  16. 根据权利要求11所述的计算机设备,其中,所述通过对所述语音文本数据依次进行文本分词和关键词抽取得到对应的关键词集合,包括:The computer device according to claim 11, wherein the step of sequentially performing text segmentation and keyword extraction on the voice text data to obtain the corresponding keyword set comprises:
    通过基于概率统计分词模型对所述语音文本数据进行文本分词得到文本分词结果,通过词频-逆向文件频率模型对所述文本分词结果进行关键词抽取得到对应的关键词集合。A text word segmentation result is obtained by performing text word segmentation on the voice text data based on a probability statistical word segmentation model, and a corresponding keyword set is obtained by keyword extraction on the text word segmentation result by a word frequency-inverse document frequency model.
  17. 根据权利要求11所述的计算机设备,其中,所述接收用户端或其他用户端发送的与所述当前目标事项流程数据对应的当前目标事项数据之后,还包括:The computer device according to claim 11, wherein after the receiving the current target item data corresponding to the current target item process data sent by the client or other client terminals, the method further comprises:
    将所述当前目标事项流程数据上传至区块链网络中。Upload the current target item process data to the blockchain network.
  18. 根据权利要求11所述的计算机设备,其中,还包括:The computer device according to claim 11, further comprising:
    对当前用户语音数据进行声纹识别,获取与被授权人对应的声纹特征。Perform voiceprint recognition on the current user's voice data, and obtain the voiceprint characteristics corresponding to the authorized person.
  19. 根据权利要求11所述的计算机设备,其中,还包括:The computer device according to claim 11, further comprising:
    若检测到用户端发送的解除权限语音数据,将与所述被授权人对应的事项权限进行删除。If the permission-removed voice data sent by the user terminal is detected, the item permission corresponding to the authorized person is deleted.
  20. 一种计算机可读存储介质,其中,所述计算机可读存储介质存储有计算机程序,所述计算机程序当被处理器执行时使所述处理器执行以下操作:A computer-readable storage medium, wherein the computer-readable storage medium stores a computer program that, when executed by a processor, causes the processor to perform the following operations:
    若接收到用户端发送的用户语音数据和用户通讯识别码,对所述用户语音数据进行语音识别和声纹识别,得到与所述用户语音数据对应的语音文本数据和语音声纹特征;If the user voice data and the user communication identification code sent by the user terminal are received, perform voice recognition and voiceprint recognition on the user voice data to obtain voice text data and voice voiceprint characteristics corresponding to the user voice data;
    判断本地的声纹数据库中是否存在与所述语音声纹特征相同的声纹特征;Judging whether there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database;
    若本地的声纹数据库中存在与所述语音声纹特征相同的声纹特征,以对应的声纹特征作为目标声纹特征,获取所述目标声纹特征对应的目标用户身份信息;If there is a voiceprint feature that is the same as the voice voiceprint feature in the local voiceprint database, use the corresponding voiceprint feature as the target voiceprint feature to obtain the target user identity information corresponding to the target voiceprint feature;
    若用户通讯识别码对应的用户唯一识别信息与所述目标用户身份信息有相同的用户唯一识别码,通过对所述语音文本数据依次进行文本分词和关键词抽取得到对应的关键词集合;If the user unique identification information corresponding to the user communication identification code has the same unique user identification code as the target user identification information, the corresponding keyword set is obtained by sequentially performing text segmentation and keyword extraction on the voice text data;
    判断所述关键词集合中是否包括与授权他人办理对应的第一关键词子集合;Judging whether the keyword set includes the first keyword sub-set corresponding to authorized others to handle it;
    若所述关键词集合中包括与授权他人办理对应的第一关键词子集合,获取所述第一关键词子集合中包括的被授权人名字、被授权人验证码和被授权事项名称;If the keyword set includes the first keyword sub-set corresponding to authorized others to handle, obtain the authorized person's name, the authorized person's verification code, and the authorized item name included in the first keyword sub-set;
    根据所接收到的由用户端或其他用户端发送的与第一关键词子集合对应的当前用户语音数据,调用对应的当前目标事项流程数据,将所述当前目标事项流程数据按流程顺序依序发送至用户端或其他用户端;以及According to the received current user voice data corresponding to the first keyword subset sent by the user terminal or other user terminals, call the corresponding current target item process data, and sequentially order the current target item process data according to the process sequence Send to the client or other clients; and
    接收用户端或其他用户端发送的与所述当前目标事项流程数据对应的当前目标事项数据。Receive current target item data corresponding to the current target item process data sent by the client or other client terminals.
PCT/CN2020/123209 2020-05-22 2020-10-23 Service item processing permissions authorization method and apparatus, computer device, and storage medium WO2021135549A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010442306.8 2020-05-22
CN202010442306.8A CN111711523B (en) 2020-05-22 2020-05-22 Item handling authority authorization method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
WO2021135549A1 true WO2021135549A1 (en) 2021-07-08

Family

ID=72537456

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/123209 WO2021135549A1 (en) 2020-05-22 2020-10-23 Service item processing permissions authorization method and apparatus, computer device, and storage medium

Country Status (2)

Country Link
CN (1) CN111711523B (en)
WO (1) WO2021135549A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111711523B (en) * 2020-05-22 2022-10-04 平安科技(深圳)有限公司 Item handling authority authorization method and device, computer equipment and storage medium
CN112992154A (en) * 2021-05-08 2021-06-18 北京远鉴信息技术有限公司 Voice identity determination method and system based on enhanced voiceprint library

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015178600A1 (en) * 2014-05-23 2015-11-26 Samsung Electronics Co., Ltd. Speech recognition method and apparatus using device information
CN106506524A (en) * 2016-11-30 2017-03-15 百度在线网络技术(北京)有限公司 Method and apparatus for verifying user
CN109147797A (en) * 2018-10-18 2019-01-04 平安科技(深圳)有限公司 Client service method, device, computer equipment and storage medium based on Application on Voiceprint Recognition
CN109510806A (en) * 2017-09-15 2019-03-22 阿里巴巴集团控股有限公司 Method for authenticating and device
CN109660531A (en) * 2018-12-10 2019-04-19 武汉大晟极科技有限公司 A kind of auth method, server and customer service terminal
CN110210207A (en) * 2019-05-30 2019-09-06 中国联合网络通信集团有限公司 Authorization method and equipment
CN111711523A (en) * 2020-05-22 2020-09-25 平安科技(深圳)有限公司 Item handling authority authorization method and device, computer equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9396730B2 (en) * 2013-09-30 2016-07-19 Bank Of America Corporation Customer identification through voice biometrics
CN109450850B (en) * 2018-09-26 2022-10-11 深圳壹账通智能科技有限公司 Identity authentication method, identity authentication device, computer equipment and storage medium
CN110060190A (en) * 2019-04-18 2019-07-26 山东浪潮云信息技术有限公司 A kind of method and system that the auxiliary applied to administrative examination and approval field is handled affairs on the net
CN110830667A (en) * 2019-11-18 2020-02-21 中国银行股份有限公司 Intelligent interactive voice response method and device
CN112215615A (en) * 2020-10-23 2021-01-12 和安科技创新有限公司 Method and system for performing security authorization on service based on public and private keys

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015178600A1 (en) * 2014-05-23 2015-11-26 Samsung Electronics Co., Ltd. Speech recognition method and apparatus using device information
CN106506524A (en) * 2016-11-30 2017-03-15 百度在线网络技术(北京)有限公司 Method and apparatus for verifying user
CN109510806A (en) * 2017-09-15 2019-03-22 阿里巴巴集团控股有限公司 Method for authenticating and device
CN109147797A (en) * 2018-10-18 2019-01-04 平安科技(深圳)有限公司 Client service method, device, computer equipment and storage medium based on Application on Voiceprint Recognition
CN109660531A (en) * 2018-12-10 2019-04-19 武汉大晟极科技有限公司 A kind of auth method, server and customer service terminal
CN110210207A (en) * 2019-05-30 2019-09-06 中国联合网络通信集团有限公司 Authorization method and equipment
CN111711523A (en) * 2020-05-22 2020-09-25 平安科技(深圳)有限公司 Item handling authority authorization method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN111711523B (en) 2022-10-04
CN111711523A (en) 2020-09-25

Similar Documents

Publication Publication Date Title
WO2021135548A1 (en) Voice intent recognition method and device, computer equipment and storage medium
US7007298B1 (en) Apparatus and method for authenticating user according to biometric information
US20200143028A1 (en) Authentication system
JP4939121B2 (en) Methods, systems, and programs for sequential authentication using one or more error rates that characterize each security challenge
US9799338B2 (en) Voice print identification portal
CN100380271C (en) Methods and apparatus for dynamic user authentication
US8499166B2 (en) Controlling access to a protected network
CA2788373C (en) Personal allowed number system
US6389397B1 (en) User identification system using improved voice print identification processing
US20140310786A1 (en) Integrated interactive messaging and biometric enrollment, verification, and identification system
EP0622780A2 (en) Speaker verification system and process
US20060106605A1 (en) Biometric record management
WO2013177304A2 (en) Systems and methods for verifying uniqueness in anonymous authentication
CN101389133A (en) Identity verification system and method
WO2021135549A1 (en) Service item processing permissions authorization method and apparatus, computer device, and storage medium
WO2013013263A1 (en) Call authentication methods and systems
JP6970588B2 (en) Management systems, terminals, control methods, and programs
KR20170041799A (en) Secure mobile contact system (smcs)
US11044250B2 (en) Biometric one touch system
US20190130084A1 (en) Authentication method, electronic device, and computer-readable program medium
JP2007265219A (en) Biometrics system
JP2011215940A (en) Authentication device, authentication system, authentication program, and authentication method for personal authentication using cellular phone
CN115730944A (en) Identity verification method and device
JP2011118561A (en) Personal identification device and personal identification method
US20240338431A1 (en) Biometric gallery management at crowded venues

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20910274

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20910274

Country of ref document: EP

Kind code of ref document: A1