[go: up one dir, main page]

CN110933100A - Authority verification method, system and computer readable storage medium - Google Patents

Authority verification method, system and computer readable storage medium Download PDF

Info

Publication number
CN110933100A
CN110933100A CN201911254328.5A CN201911254328A CN110933100A CN 110933100 A CN110933100 A CN 110933100A CN 201911254328 A CN201911254328 A CN 201911254328A CN 110933100 A CN110933100 A CN 110933100A
Authority
CN
China
Prior art keywords
verification
instruction
public security
voiceprint
voiceprint library
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911254328.5A
Other languages
Chinese (zh)
Inventor
黄族良
龙洪锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou National Acoustic Intelligent Technology Co Ltd
Original Assignee
Guangzhou National Acoustic Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou National Acoustic Intelligent Technology Co Ltd filed Critical Guangzhou National Acoustic Intelligent Technology Co Ltd
Priority to CN201911254328.5A priority Critical patent/CN110933100A/en
Publication of CN110933100A publication Critical patent/CN110933100A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/22Interactive procedures; Man-machine interfaces

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a permission verification method, which is applied to a permission verification system, wherein the permission verification system comprises acquisition equipment and a public security voiceprint library, and the permission verification method comprises the following steps: the collection equipment receives the collected voice information of the suspect; sending a permission verification instruction to a public security voiceprint library according to the suspect voice information; receiving a verification passing instruction returned by the public security voiceprint library according to the authority verification instruction; and sending the voice information of the suspect to the public security voiceprint library according to the verification passing instruction. The invention also discloses a permission verification system and a computer readable storage medium. The invention can realize that the public security voiceprint library can also realize the verification of the voiceprint information under the condition that the acquisition equipment is not registered; the method and the device can realize that when the registered voice acquisition equipment fails, the voiceprint information of the suspect can be verified through the public security voiceprint library.

Description

Authority verification method, system and computer readable storage medium
Technical Field
The present invention relates to the field of public security technologies, and in particular, to a method and a system for authority verification and a computer-readable storage medium.
Background
At present, a voiceprint recognition technology generally acquires voice information of a suspect, extracts voiceprint information in the voice information, and compares the voiceprint information with data in a public security voiceprint library through acquisition equipment to obtain a comparison result; before comparing and verifying the voiceprint information of the suspect with the data in the public security voiceprint library, the voice acquisition equipment is generally required to be registered in the public security voiceprint library, the voice acquisition equipment can acquire the voiceprint information of the suspect after the voice acquisition equipment passes the registration, and the voiceprint information of the suspect can be verified after the voice acquisition equipment passes the registration; however, when the registered voice collecting device fails, the voice information of the suspect cannot be collected into the public security voiceprint library, the voiceprint information of the suspect cannot be verified through the public security voiceprint library, and the collected voice information of the suspect cannot be verified in time.
Disclosure of Invention
The invention mainly aims to provide a permission verification method, a permission verification system and a computer readable storage medium, and aims to solve the technical problem that a public security voiceprint library can verify voiceprint information under the condition that acquisition equipment is not registered.
In order to achieve the above object, the present invention provides a method for verifying authority, which is applied to an authority verification system, wherein the authority verification system comprises an acquisition device and a public security voiceprint library, and the method for verifying authority comprises the following steps:
the collection equipment receives the collected voice information of the suspect;
sending a permission verification instruction to a public security voiceprint library according to the suspect voice information;
receiving a verification passing instruction returned by the public security voiceprint library according to the authority verification instruction;
and sending the voice information of the suspect to the public security voiceprint library according to the verification passing instruction.
Optionally, the step of receiving a verification passing instruction returned by the public security voiceprint library according to the permission verification instruction includes:
receiving a verification failure instruction returned by the public security voiceprint library according to the authority verification instruction;
sending an authority application instruction to the public security voiceprint library according to the verification failure instruction;
and receiving a verification passing instruction returned by the public security voiceprint library according to the permission application instruction.
Optionally, the step of receiving a verification passing instruction returned by the public security voiceprint library according to the permission verification instruction further includes:
receiving a verification failure instruction returned by the public security voiceprint library according to the authority verification instruction;
sending a voiceprint verification instruction to the public security voiceprint library according to the verification failure instruction;
and receiving a verification passing instruction returned by the public security voiceprint library according to the voiceprint verification instruction.
In addition, in order to achieve the above object, the present invention further provides a method for verifying authority, wherein the method for verifying authority is applied to an authority verification system, the system includes an acquisition device and a public security voiceprint library, and the method for verifying authority includes the following steps:
the public security voiceprint library receives an authority verification instruction sent by the acquisition equipment;
generating a verification passing instruction according to the authority verification instruction, and sending the verification passing instruction to the acquisition equipment;
and receiving suspect voice information returned by the acquisition equipment according to the verification passing instruction.
Optionally, the step of generating a verification passing instruction according to the permission verification instruction and sending the verification passing instruction to the acquisition device includes:
generating a verification failure instruction according to the permission verification instruction, and sending the verification failure instruction to the acquisition equipment;
receiving an authority application instruction returned by the acquisition equipment according to the verification failure instruction;
and generating a verification passing instruction according to the permission application instruction, and sending the verification passing instruction to the acquisition equipment.
Optionally, the step of generating a verification passing instruction according to the permission verification instruction and sending the verification passing instruction to the acquisition device includes:
generating a verification failure instruction according to the permission verification instruction, and sending the verification failure instruction to the acquisition equipment;
receiving a voiceprint verification instruction returned by the acquisition equipment according to the verification failure instruction;
and generating a verification passing instruction according to the voiceprint verification instruction, and sending the verification passing instruction to the acquisition equipment.
Optionally, the step of generating a verification passing instruction according to the permission verification instruction and sending the verification passing instruction to the acquisition device includes:
generating a verification failure instruction according to the permission verification instruction, and sending the verification failure instruction to the acquisition equipment;
receiving a face verification instruction returned by the acquisition equipment according to the verification failure instruction;
and generating a verification passing instruction according to the face verification instruction, and sending the verification passing instruction to the acquisition equipment.
Optionally, after the step of receiving the suspect voice information returned by the acquisition device according to the verification passing instruction, the method includes:
analyzing the voice information of the suspect to obtain the voiceprint information of the suspect;
and comparing the suspected voiceprint information with the public security voiceprint library to obtain an identification comparison result.
In addition, to achieve the above object, the present invention further provides a right verification system, including: the system comprises a collection device, a public security voiceprint library, a memory, a processor and a permission verification program which is stored on the memory and can run on the processor, wherein the permission verification program realizes the steps of the permission verification method when being executed by the processor.
Further, to achieve the above object, the present invention also provides a computer readable storage medium having stored thereon a rights verification program which, when executed by a processor, implements the steps of the rights verification method as described above.
The invention provides a permission verification method, a permission verification system and a computer readable storage medium, wherein a collection device receives collected suspect voice information; sending a permission verification instruction to a public security voiceprint library according to the suspect voice information; receiving a verification passing instruction returned by the public security voiceprint library according to the authority verification instruction; and sending the voice information of the suspect to the public security voiceprint library according to the verification passing instruction. Through the mode, the public security voiceprint library can verify the voiceprint information under the condition that the acquisition equipment is not registered; the method and the device can realize that when the registered voice acquisition equipment fails, the voiceprint information of the suspect can be verified through the public security voiceprint library.
Drawings
Fig. 1 is a schematic terminal structure diagram of a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a first embodiment of a method for verifying authority according to the present invention;
FIG. 3 is a flowchart illustrating a second embodiment of a method for verifying authority according to the present invention;
FIG. 4 is a flowchart illustrating a third embodiment of a method for verifying authority according to the present invention;
FIG. 5 is a flowchart illustrating a method for verifying authority according to a fourth embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The main solution of the embodiment of the invention is as follows: the collection equipment receives the collected voice information of the suspect; sending a permission verification instruction to a public security voiceprint library according to the suspect voice information; receiving a verification passing instruction returned by the public security voiceprint library according to the authority verification instruction; and sending the voice information of the suspect to the public security voiceprint library according to the verification passing instruction.
The existing voiceprint recognition technology generally comprises the steps of firstly obtaining voice information of a suspect, extracting the voiceprint information in the voice information, and comparing the voiceprint information with data in a public security voiceprint library through acquisition equipment to obtain a comparison result; before comparing and verifying the voiceprint information of the suspect with the data in the public security voiceprint library, the voice acquisition equipment is generally required to be registered in the public security voiceprint library, the voice acquisition equipment can acquire the voiceprint information of the suspect after the voice acquisition equipment passes the registration, and the voiceprint information of the suspect can be verified after the voice acquisition equipment passes the registration; however, when the registered voice collecting device fails, the voice information of the suspect cannot be collected into the public security voiceprint library, the voiceprint information of the suspect cannot be verified through the public security voiceprint library, and the collected voice information of the suspect cannot be verified in time.
The invention aims to solve the technical problem that the public security voiceprint library can verify the voiceprint information under the condition that the acquisition equipment is not registered.
As shown in fig. 1, fig. 1 is a schematic terminal structure diagram of a hardware operating environment according to an embodiment of the present invention.
The terminal of the embodiment of the invention can be a PC, and can also be a mobile terminal device with a display function, such as a smart phone, a tablet computer and the like.
As shown in fig. 1, the terminal may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Preferably, the terminal may further include a camera, a Radio Frequency (RF) circuit, a sensor, an audio circuit, a WiFi module, and the like. Such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display screen according to the brightness of ambient light, and a proximity sensor that may turn off the display screen and/or the backlight when the mobile terminal is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), detect the magnitude and direction of gravity when the mobile terminal is stationary, and can be used for applications (such as horizontal and vertical screen switching, related games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer and tapping) and the like for recognizing the attitude of the mobile terminal; of course, the mobile terminal may also be configured with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which are not described herein again.
Those skilled in the art will appreciate that the terminal structure shown in fig. 1 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a rights authentication program.
In the terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to a backend server and performing data communication with the backend server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; and the processor 1001 may be configured to call the rights verification program stored in the memory 1005 and perform the following operations:
the collection equipment receives the collected voice information of the suspect;
sending a permission verification instruction to a public security voiceprint library according to the suspect voice information;
receiving a verification passing instruction returned by the public security voiceprint library according to the authority verification instruction;
and sending the voice information of the suspect to the public security voiceprint library according to the verification passing instruction.
Further, the processor 1001 may call the authority verification program stored in the memory 1005, and also perform the following operations:
receiving a verification failure instruction returned by the public security voiceprint library according to the authority verification instruction;
sending an authority application instruction to the public security voiceprint library according to the verification failure instruction;
and receiving a verification passing instruction returned by the public security voiceprint library according to the permission application instruction.
Further, the processor 1001 may call the authority verification program stored in the memory 1005, and also perform the following operations:
receiving a verification failure instruction returned by the public security voiceprint library according to the authority verification instruction;
sending a voiceprint verification instruction to the public security voiceprint library according to the verification failure instruction;
and receiving a verification passing instruction returned by the public security voiceprint library according to the voiceprint verification instruction.
Further, the processor 1001 may call the authority verification program stored in the memory 1005, and also perform the following operations:
the public security voiceprint library receives an authority verification instruction sent by the acquisition equipment;
generating a verification passing instruction according to the authority verification instruction, and sending the verification passing instruction to the acquisition equipment;
and receiving suspect voice information returned by the acquisition equipment according to the verification passing instruction.
Further, the processor 1001 may call the authority verification program stored in the memory 1005, and also perform the following operations:
generating a verification failure instruction according to the permission verification instruction, and sending the verification failure instruction to the acquisition equipment;
receiving an authority application instruction returned by the acquisition equipment according to the verification failure instruction;
and generating a verification passing instruction according to the permission application instruction, and sending the verification passing instruction to the acquisition equipment.
Further, the processor 1001 may call the authority verification program stored in the memory 1005, and also perform the following operations:
generating a verification failure instruction according to the permission verification instruction, and sending the verification failure instruction to the acquisition equipment;
receiving a voiceprint verification instruction returned by the acquisition equipment according to the verification failure instruction;
and generating a verification passing instruction according to the voiceprint verification instruction, and sending the verification passing instruction to the acquisition equipment.
Further, the processor 1001 may call the authority verification program stored in the memory 1005, and also perform the following operations:
generating a verification failure instruction according to the permission verification instruction, and sending the verification failure instruction to the acquisition equipment;
receiving a face verification instruction returned by the acquisition equipment according to the verification failure instruction;
and generating a verification passing instruction according to the face verification instruction, and sending the verification passing instruction to the acquisition equipment.
Further, the processor 1001 may call the authority verification program stored in the memory 1005, and also perform the following operations:
analyzing the voice information of the suspect to obtain the voiceprint information of the suspect;
and comparing the suspected voiceprint information with the public security voiceprint library to obtain an identification comparison result.
Based on the hardware structure, the embodiment of the permission verification method is provided.
The invention discloses a permission verification method.
Referring to fig. 2, fig. 2 is a flowchart illustrating a method for verifying authority according to a first embodiment of the present invention.
In the embodiment of the invention, the authority verification method is applied to an authority verification system, the authority verification system comprises acquisition equipment and a public security voiceprint library, and the authority verification method comprises the following steps:
step S10, the collection equipment receives the collected suspect voice information;
in this embodiment, when a user (a staff of the public security system) needs to upload the suspect voice information to the public security voiceprint library for comparison, or needs to import the suspect voice information into the public security voiceprint library for storage, the suspect voice information needs to be uploaded to the collection device first, and the collection device receives the collected suspect voice information.
Step S20, sending an authority verification instruction to a public security voiceprint library according to the suspect voice information;
in the embodiment, after the acquisition equipment receives the acquired suspect voice information, the acquisition equipment sends a permission verification instruction to the public security voiceprint library according to the suspect voice information; the authority verification instruction can be automatically triggered after the collection equipment receives the voice information of the suspect; the permission verification instruction may also be generated by the acquisition device according to permission verification information acquired by the sub-user verification information interface, wherein the acquisition device displays a user verification information interface on the acquisition device according to the suspect voice information, the user inputs the permission verification information on the user verification information interface after seeing the user verification information interface, and the acquisition device receives the acquired permission verification information from the sub-user verification information interface. Wherein the authority verification information can be used for passing a verified password or other information for verification.
Step S30, receiving a verification passing instruction returned by the public security voiceprint library according to the authority verification instruction;
in this embodiment, after the acquisition device sends the permission verification instruction to the public security voiceprint library, the public security voiceprint library verifies permission verification information in the permission verification instruction, when the permission verification information passes verification, the public security voiceprint library sends a verification passing instruction to the acquisition device, and the acquisition device receives the verification passing instruction returned by the public security voiceprint library according to the permission verification instruction.
Step S30 is to receive a verification passing instruction returned by the public security voiceprint library according to the permission verification instruction, where the verification passing instruction may include:
step a1, receiving a verification failure instruction returned by the public security voiceprint library according to the authority verification instruction;
in this embodiment, after the acquisition device sends the permission verification instruction to the public security voiceprint library, the public security voiceprint library verifies permission verification information in the permission verification instruction, when the permission verification information fails, the public security voiceprint library sends a verification failure instruction to the acquisition device, and the acquisition device receives the verification failure instruction sent by the public security voiceprint library.
Step a2, sending a voiceprint verification instruction to the public security voiceprint library according to the verification failure instruction;
in this embodiment, after the acquisition device receives the verification failure instruction, the user checks the information that the authority verification instruction fails to be verified in the public security voiceprint library through the acquisition device, the user inputs voiceprint verification information through the acquisition device, the acquisition device generates a voiceprint verification instruction according to the voiceprint verification information, and the acquisition device sends the voiceprint verification instruction to the public security voiceprint library; wherein the voiceprint verification instruction comprises voiceprint information of the user speaking.
Step a3, receiving a verification passing instruction returned by the public security voiceprint library according to the authority application instruction.
In this embodiment, after the collecting device sends the voiceprint verification instruction to the public security voiceprint library, the public security voiceprint library verifies the voiceprint information of the user speaking in the voiceprint verification instruction, when the voiceprint information of the user speaking passes the verification, the public security voiceprint library generates a verification passing instruction, the public security voiceprint library sends the verification passing instruction to the collecting device, and the collecting device receives the verification passing instruction returned by the public security voiceprint library according to the permission application.
Step S30 is to receive a verification passing instruction returned by the public security voiceprint library according to the permission verification instruction, and may further include:
step b1, receiving a verification failure instruction returned by the public security voiceprint library according to the authority verification instruction;
in this embodiment, after the acquisition device sends the permission verification instruction to the public security voiceprint library, the public security voiceprint library verifies permission verification information in the permission verification instruction, when the permission verification information fails, the public security voiceprint library sends a verification failure instruction to the acquisition device, and the acquisition device receives the verification failure instruction sent by the public security voiceprint library.
Step b2, sending a face verification instruction to the public security voiceprint library according to the verification failure instruction;
in this embodiment, after the acquisition device receives the verification failure instruction, the user checks the information that the authority verification instruction fails to be verified in the public security voiceprint library through the acquisition device, the user inputs face verification information through the acquisition device, the acquisition device generates a face verification instruction according to the face verification information, and the acquisition device sends the face verification instruction to the public security voiceprint library; the face verification instruction comprises face information of the user.
And b3, receiving a verification passing instruction returned by the public security voiceprint library according to the face verification instruction.
In this embodiment, after the acquisition device sends a face verification instruction to the public security voiceprint library, the public security voiceprint library verifies face information of a user in the face verification instruction, when the face information of the user passes verification, the public security voiceprint library generates a verification passing instruction, the public security voiceprint library sends the verification passing instruction to the acquisition device, and the acquisition device receives the verification passing instruction returned by the public security voiceprint library according to the authority application.
Step S30 is to receive a verification passing instruction returned by the public security voiceprint library according to the permission verification instruction, and may further include:
step c1, receiving a verification failure instruction returned by the public security voiceprint library according to the authority verification instruction;
in this embodiment, after the acquisition device sends the permission verification instruction to the public security voiceprint library, the public security voiceprint library verifies permission verification information in the permission verification instruction, when the permission verification information fails, the public security voiceprint library sends a verification failure instruction to the acquisition device, and the acquisition device receives the verification failure instruction sent by the public security voiceprint library.
Step c2, sending a fingerprint verification instruction to the public security voiceprint library according to the verification failure instruction;
in this embodiment, after the collecting device receives the verification failure instruction, the user checks the information that the authority verification instruction fails to be verified in the public security voiceprint library through the collecting device, the user inputs fingerprint verification information through the collecting device, the collecting device generates a fingerprint verification instruction according to the fingerprint verification information, and the collecting device sends the fingerprint verification instruction to the public security voiceprint library; wherein, the fingerprint verification instruction comprises fingerprint information of the user.
And c3, receiving a verification passing instruction returned by the public security voiceprint library according to the fingerprint verification instruction.
In this embodiment, after the collecting device sends the fingerprint verification instruction to the public security voiceprint library, the public security voiceprint library verifies the fingerprint information of the user in the fingerprint verification instruction, when the fingerprint information of the user passes verification, the public security voiceprint library generates a verification passing instruction, the public security voiceprint library sends the verification passing instruction to the collecting device, and the collecting device receives the verification passing instruction returned by the public security voiceprint library according to the permission application.
And step S40, sending the suspect voice information to the public security voiceprint library according to the verification passing instruction.
In this embodiment, after the collection device receives the verification passing instruction, the collection device wants the public security voiceprint library to send the suspect voice information according to the verification passing instruction sent by the public security voiceprint library.
According to the scheme, the collection equipment receives the collected voice information of the suspect; sending a permission verification instruction to a public security voiceprint library according to the suspect voice information; receiving a verification passing instruction returned by the public security voiceprint library according to the authority verification instruction; and sending the voice information of the suspect to the public security voiceprint library according to the verification passing instruction. Therefore, the public security voiceprint library can verify the voiceprint information under the condition that the acquisition equipment is not registered; the method and the device realize that the voiceprint information of the suspect can be verified through the public security voiceprint library when the registered voice acquisition device fails.
Further, referring to fig. 3, fig. 3 is a flowchart illustrating the method of the present invention according to a second embodiment of the method for verifying the authority. Based on the above embodiment shown in fig. 2, the step S30 receives a verification passing instruction returned by the public security voiceprint library according to the authority verification instruction, and may further include:
step S31, receiving a verification failure instruction returned by the public security voiceprint library according to the authority verification instruction;
in this embodiment, after the acquisition device sends the permission verification instruction to the public security voiceprint library, the public security voiceprint library verifies permission verification information in the permission verification instruction, when the permission verification information fails, the public security voiceprint library sends a verification failure instruction to the acquisition device, and the acquisition device receives the verification failure instruction sent by the public security voiceprint library.
Step S32, sending an authority application instruction to the public security voiceprint library according to the verification failure instruction;
in this embodiment, after the acquisition device receives the verification failure instruction, the user checks the information that the authority verification instruction fails to be verified in the public security voiceprint library through the acquisition device, the user inputs the authority application information through the acquisition device, the acquisition device generates the authority application instruction according to the authority application information, and the acquisition device sends the authority application instruction to the public security voiceprint library; wherein, the authority application instruction comprises: user identity information, user authentication information, or other information that is used to authenticate a user and that can be stored in a public security voiceprint repository.
And step S33, receiving a verification passing instruction returned by the public security voiceprint library according to the authority application instruction.
In this embodiment, after the acquisition device sends the permission application instruction to the public security voiceprint library, the public security voiceprint library verifies the identity information of the user in the permission application instruction, when the identity information of the user passes the verification, the public security voiceprint library generates a verification passing instruction, the public security voiceprint library sends the verification passing instruction to the acquisition device, and the acquisition device receives the verification passing instruction returned by the public security voiceprint library according to the permission application.
According to the scheme, the collection equipment receives the collected voice information of the suspect; sending a permission verification instruction to a public security voiceprint library according to the suspect voice information; receiving a verification failure instruction returned by the public security voiceprint library according to the authority verification instruction; sending an authority application instruction to the public security voiceprint library according to the verification failure instruction; receiving a verification passing instruction returned by the public security voiceprint library according to the authority application instruction; and sending the voice information of the suspect to the public security voiceprint library according to the verification passing instruction. Therefore, the public security voiceprint library can verify the voiceprint information under the condition that the acquisition equipment is not registered; the method and the device realize that the voiceprint information of the suspect can be verified through the public security voiceprint library when the registered voice acquisition device fails.
Further, referring to fig. 4, fig. 4 is a flowchart illustrating the method of the third embodiment of the present invention for verifying the authority. In the embodiment of the invention, the authority verification method is applied to an authority verification system, the authority verification system comprises acquisition equipment and a public security voiceprint library, and the authority verification method comprises the following steps:
step S50, the public security voiceprint library receives an authority verification instruction sent by the acquisition equipment;
in this embodiment, when a user (a staff of a public security system) needs to upload the voice information of a suspect to a public security voiceprint library for comparison, or the voice information of the suspect needs to be imported into the public security voiceprint library for storage, the voice information of the suspect needs to be uploaded to the acquisition equipment, and the acquisition equipment receives the acquired voice information of the suspect; after the acquisition equipment receives the acquired suspect voice information, the acquisition equipment sends an authority verification instruction to the public security voiceprint library according to the suspect voice information, wherein the authority verification instruction can be automatically triggered after the acquisition equipment receives the suspect voice information; the permission verification instruction may also be generated by the acquisition device according to permission verification information acquired by the sub-user verification information interface, wherein the acquisition device displays a user verification information interface on the acquisition device according to the suspect voice information, the user inputs the permission verification information on the user verification information interface after seeing the user verification information interface, and the acquisition device receives the acquired permission verification information from the sub-user verification information interface. Wherein the authority verification information can be used for passing a verified password or other information for verification.
Step S60, generating a verification passing instruction according to the authority verification instruction, and sending the verification passing instruction to the acquisition equipment;
in this embodiment, after the acquisition device sends the permission verification instruction to the public security voiceprint library, the public security voiceprint library verifies permission verification information in the permission verification instruction, when the permission verification information passes verification, the public security voiceprint library generates a verification passing instruction according to the permission verification instruction, the public security voiceprint library sends the verification passing instruction to the acquisition device, and the acquisition device receives the verification passing instruction returned by the public security voiceprint library according to the permission verification instruction.
Step S60 is to generate a verification passing instruction according to the permission verification instruction, and send the verification passing instruction to the collection device, where the step may include:
step d1, generating a verification failure instruction according to the authority verification instruction, and sending the verification failure instruction to the acquisition equipment;
in this embodiment, after the acquisition device sends the permission verification instruction to the public security voiceprint library, the public security voiceprint library verifies permission verification information in the permission verification instruction, when the permission verification information fails, the public security voiceprint library sends a verification failure instruction to the acquisition device, and the acquisition device receives the verification failure instruction sent by the public security voiceprint library.
Step d2, receiving a voiceprint verification instruction returned by the acquisition equipment according to the verification failure instruction;
in this embodiment, after the acquisition device receives the verification failure instruction, the user checks the information that the authority verification instruction fails to be verified in the public security voiceprint library through the acquisition device, the user inputs voiceprint verification information through the acquisition device, the acquisition device generates a voiceprint verification instruction according to the voiceprint verification information, the acquisition device sends the voiceprint verification instruction to the public security voiceprint library, and the public security voiceprint library receives the voiceprint verification instruction sent by the acquisition device; wherein the voiceprint verification instruction comprises voiceprint information of the user speaking.
And d3, generating a verification passing instruction according to the voiceprint verification instruction, and sending the verification passing instruction to the acquisition equipment.
In this embodiment, after receiving a voiceprint verification instruction sent by the acquisition device, the public security voiceprint library verifies voiceprint information of a user speaking in the voiceprint verification instruction, when the voiceprint information of the user speaking passes verification, the public security voiceprint library generates a verification passing instruction, the public security voiceprint library sends the verification passing instruction to the acquisition device, and the acquisition device receives the verification passing instruction returned by the public security voiceprint library according to the permission application.
Step S60 is to generate a verification passing instruction according to the permission verification instruction, and send the verification passing instruction to the collection device, and may further include:
step e1, generating a verification failure instruction according to the authority verification instruction, and sending the verification failure instruction to the acquisition equipment;
in this embodiment, after the acquisition device sends the permission verification instruction to the public security voiceprint library, the public security voiceprint library verifies permission verification information in the permission verification instruction, when the permission verification information fails, the public security voiceprint library sends a verification failure instruction to the acquisition device, and the acquisition device receives the verification failure instruction sent by the public security voiceprint library.
Step e2, receiving a face verification instruction returned by the acquisition equipment according to the verification failure instruction;
in this embodiment, after the acquisition device receives the verification failure instruction, the user checks the information that the authority verification instruction fails to be verified in the public security voiceprint library through the acquisition device, the user inputs face verification information through the acquisition device, the acquisition device generates a face verification instruction according to the voiceprint verification information, the acquisition device sends the face verification instruction to the public security voiceprint library, and the public security voiceprint library receives the face verification instruction sent by the acquisition device; the face verification instruction comprises face information of the user.
And e3, generating a verification passing instruction according to the face verification instruction, and sending the verification passing instruction to the acquisition equipment.
In this embodiment, after receiving a face verification instruction sent by an acquisition device, the public security voiceprint library verifies face information of a user in the face verification instruction, when the face information of the user passes verification, the public security voiceprint library generates a verification passing instruction, the public security voiceprint library sends the verification passing instruction to the acquisition device, and the acquisition device receives the verification passing instruction returned by the public security voiceprint library according to the authority application.
Step S60 is to generate a verification passing instruction according to the permission verification instruction, and send the verification passing instruction to the collection device, and may further include:
step f1, generating a verification failure instruction according to the authority verification instruction, and sending the verification failure instruction to the acquisition equipment;
in this embodiment, after the acquisition device sends the permission verification instruction to the public security voiceprint library, the public security voiceprint library verifies permission verification information in the permission verification instruction, when the permission verification information fails, the public security voiceprint library sends a verification failure instruction to the acquisition device, and the acquisition device receives the verification failure instruction sent by the public security voiceprint library.
Step f2, receiving a fingerprint verification instruction returned by the acquisition equipment according to the verification failure instruction;
in this embodiment, after the collecting device receives the verification failure instruction, the user checks the information that the authority verification instruction fails to be verified in the public security voiceprint library through the collecting device, the user inputs voiceprint verification information through the collecting device, the collecting device generates a fingerprint verification instruction according to the voiceprint verification information, the collecting device sends the fingerprint verification instruction to the public security voiceprint library, and the public security voiceprint library receives the fingerprint verification instruction sent by the collecting device; wherein, the fingerprint verification instruction comprises fingerprint information of the user.
And f3, generating a verification passing instruction according to the fingerprint verification instruction, and sending the verification passing instruction to the acquisition equipment.
In this embodiment, after receiving a fingerprint verification instruction sent by an acquisition device, the public security voiceprint library verifies fingerprint information of a user in the fingerprint verification instruction, when the fingerprint information of the user passes verification, the public security voiceprint library generates a verification passing instruction, the public security voiceprint library sends the verification passing instruction to the acquisition device, and the acquisition device receives the verification passing instruction returned by the public security voiceprint library according to the permission application.
Step S60 is to generate a verification passing instruction according to the permission verification instruction, and send the verification passing instruction to the collection device, where the step may include:
step g1, generating a verification failure instruction according to the authority verification instruction, and sending the verification failure instruction to a third-party device, wherein the verification failure instruction comprises user identity information;
in this embodiment, after the acquisition device sends the permission verification instruction to the public security voiceprint library, the public security voiceprint library verifies permission verification information in the permission verification instruction, when the permission verification information is not verified, the public security voiceprint library sends a verification failure instruction to the third-party device, and the third-party device receives the verification failure instruction sent by the public security voiceprint library.
Step g2, receiving an identity authentication passing instruction returned by the third-party equipment according to the authentication failure instruction;
in this embodiment, after the third-party device receives the verification failure instruction, the third-party device verifies the user identity information, when the third-party device determines that the user identity information is verified, the third-party device generates an identity verification passing instruction, the third-party device sends the identity verification passing instruction to the public security voiceprint library, and the public security voiceprint library receives the voiceprint verification instruction sent by the third-party device.
And g3, generating a verification passing instruction according to the identity verification passing instruction, and sending the verification passing instruction to the acquisition equipment.
In this embodiment, after the public security voiceprint library receives the authentication passing instruction sent by the third-party device, the public security voiceprint library generates an authentication passing instruction according to the authentication passing instruction, the public security voiceprint library sends the authentication passing instruction to the acquisition terminal, and the acquisition device receives the authentication passing instruction returned by the public security voiceprint library according to the permission application.
And step S70, receiving suspect voice information returned by the acquisition equipment according to the verification passing instruction.
In this embodiment, after the collection device receives the verification passing instruction, the collection device wants the public security voiceprint library to send the suspect voice information according to the verification passing instruction sent by the public security voiceprint library, and the public security voiceprint library returns the suspect voice information according to the verification passing instruction.
After the step S60 receives the suspect voice information returned by the acquisition device according to the verification pass instruction, the method includes:
h1, analyzing the suspect voice information to obtain suspect voiceprint information;
and h2, comparing the suspected person voiceprint information with the public security voiceprint library to obtain an identification comparison result.
In this embodiment, after receiving the voice information of the suspect, the public security voiceprint library processes the voice information of the suspect, and analyzes the voice information of the suspect to obtain the voiceprint information of the suspect; after the public security voiceprint library obtains the suspected voiceprint information, the public security voiceprint library respectively compares the suspected voiceprint information with the voiceprint information in the public security voiceprint library to obtain an identification comparison result.
According to the scheme, the public security voiceprint library receives the authority verification instruction sent by the acquisition equipment; generating a verification passing instruction according to the authority verification instruction, and sending the verification passing instruction to the acquisition equipment; and receiving the suspect voice information returned by the acquisition equipment according to the verification passing instruction. Therefore, the public security voiceprint library can verify the voiceprint information under the condition that the acquisition equipment is not registered; the method and the device realize that the voiceprint information of the suspect can be verified through the public security voiceprint library when the registered voice acquisition device fails.
Further, referring to fig. 5, fig. 5 is a flowchart illustrating the method of the fourth embodiment of the present invention for verifying the authority. Based on the embodiment shown in fig. 4, step S50 generates a verification passing instruction according to the authority verification instruction, and sends the verification passing instruction to the collection device, where the method may further include:
step S61, generating a verification failure instruction according to the authority verification instruction, and sending the verification failure instruction to the acquisition equipment;
in this embodiment, after the acquisition device sends the permission verification instruction to the public security voiceprint library, the public security voiceprint library verifies permission verification information in the permission verification instruction, when the permission verification information fails, the public security voiceprint library sends a verification failure instruction to the acquisition device, and the acquisition device receives the verification failure instruction sent by the public security voiceprint library.
Step S62, receiving an authority application instruction returned by the acquisition device according to the verification failure instruction, where the authority application instruction includes: the identity information of the user, the certification information, the system contains the identity information of the user;
in this embodiment, after the acquisition device receives the verification failure instruction, the user checks that the transmitted authority verification instruction fails to be verified in the public security voiceprint library through the acquisition device, the user inputs authority application information through the acquisition device, the acquisition device generates an authority application instruction according to the authority application information, the acquisition device transmits the authority application instruction to the public security voiceprint library, and the public security voiceprint library receives the authority application instruction transmitted by the acquisition device; wherein, the authority application instruction comprises: user identity information, user authentication information, or other information that is used to authenticate a user and that can be stored in a public security voiceprint repository.
And step S63, generating a verification passing instruction according to the authority application instruction, and sending the verification passing instruction to the acquisition equipment.
In this embodiment, after receiving the authority application instruction sent by the acquisition device, the public security voiceprint library verifies the identity information of the user in the authority application instruction, when the identity information of the user passes the verification, the public security voiceprint library generates a verification passing instruction, the public security voiceprint library sends the verification passing instruction to the acquisition device, and the acquisition device receives the verification passing instruction returned by the public security voiceprint library according to the authority application.
According to the scheme, the public security voiceprint library receives the authority verification instruction sent by the acquisition equipment; generating a verification failure instruction according to the permission verification instruction, and sending the verification failure instruction to the acquisition equipment; receiving an authority application instruction returned by the acquisition equipment according to the verification failure instruction; generating a verification passing instruction according to the permission application instruction, and sending the verification passing instruction to the acquisition equipment; and receiving the suspect voice information returned by the acquisition equipment according to the verification passing instruction. Therefore, the public security voiceprint library can verify the voiceprint information under the condition that the acquisition equipment is not registered; the method and the device realize that the voiceprint information of the suspect can be verified through the public security voiceprint library when the registered voice acquisition device fails.
The invention also provides a permission verification system.
The authority verification system of the invention comprises: a memory, a processor and a rights verification program stored on the memory and executable on the processor, the rights verification program when executed by the processor implementing the steps of the rights verification method as described above.
The method implemented when the right verification program running on the processor is executed may refer to each embodiment of the right verification method of the present invention, and details are not described here.
The invention also provides a computer readable storage medium.
The computer readable storage medium of the present invention has stored thereon a rights verification program which, when executed by a processor, implements the steps of the rights verification method as described above.
The method implemented when the right verification program running on the processor is executed may refer to each embodiment of the right verification method of the present invention, and details are not described here.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are only for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A permission verification method is applied to a permission verification system, the permission verification system comprises acquisition equipment and a public security voiceprint library, and the permission verification method comprises the following steps:
the collection equipment receives the collected voice information of the suspect;
sending a permission verification instruction to a public security voiceprint library according to the suspect voice information;
receiving a verification passing instruction returned by the public security voiceprint library according to the authority verification instruction;
and sending the voice information of the suspect to the public security voiceprint library according to the verification passing instruction.
2. The method for verifying the authority according to claim 1, wherein the step of receiving the verification passing instruction returned by the public security voiceprint library according to the authority verification instruction comprises the following steps:
receiving a verification failure instruction returned by the public security voiceprint library according to the authority verification instruction;
sending an authority application instruction to the public security voiceprint library according to the verification failure instruction;
and receiving a verification passing instruction returned by the public security voiceprint library according to the permission application instruction.
3. The method for right verification according to claim 1, wherein the step of receiving a verification passing instruction returned by the public security voiceprint library according to the right verification instruction further comprises:
receiving a verification failure instruction returned by the public security voiceprint library according to the authority verification instruction;
sending a voiceprint verification instruction to the public security voiceprint library according to the verification failure instruction;
and receiving a verification passing instruction returned by the public security voiceprint library according to the voiceprint verification instruction.
4. A permission verification method is applied to a permission verification system, the system comprises a collection device and a public security voiceprint library, and the permission verification method comprises the following steps:
the public security voiceprint library receives an authority verification instruction sent by the acquisition equipment;
generating a verification passing instruction according to the authority verification instruction, and sending the verification passing instruction to the acquisition equipment;
and receiving suspect voice information returned by the acquisition equipment according to the verification passing instruction.
5. The privilege verification method according to claim 4, wherein the step of generating a verification passing instruction according to the privilege verification instruction and sending the verification passing instruction to the acquisition device comprises:
generating a verification failure instruction according to the permission verification instruction, and sending the verification failure instruction to the acquisition equipment;
receiving an authority application instruction returned by the acquisition equipment according to the verification failure instruction;
and generating a verification passing instruction according to the permission application instruction, and sending the verification passing instruction to the acquisition equipment.
6. The privilege verification method according to claim 4, wherein the step of generating a verification passing instruction according to the privilege verification instruction and sending the verification passing instruction to the acquisition device comprises:
generating a verification failure instruction according to the permission verification instruction, and sending the verification failure instruction to the acquisition equipment;
receiving a voiceprint verification instruction returned by the acquisition equipment according to the verification failure instruction;
and generating a verification passing instruction according to the voiceprint verification instruction, and sending the verification passing instruction to the acquisition equipment.
7. The privilege verification method according to claim 4, wherein the step of generating a verification passing instruction according to the privilege verification instruction and sending the verification passing instruction to the acquisition device comprises:
generating a verification failure instruction according to the permission verification instruction, and sending the verification failure instruction to the acquisition equipment;
receiving a face verification instruction returned by the acquisition equipment according to the verification failure instruction;
and generating a verification passing instruction according to the face verification instruction, and sending the verification passing instruction to the acquisition equipment.
8. The permission verification method according to claim 4, wherein after the step of receiving the suspect voice information returned by the acquisition device according to the verification passing instruction, the method comprises:
analyzing the voice information of the suspect to obtain the voiceprint information of the suspect;
and comparing the suspected voiceprint information with the public security voiceprint library to obtain an identification comparison result.
9. A rights verification system, comprising: acquisition device, public security voiceprint library, memory, processor and a rights validation program stored on the memory and running on the processor, the rights validation program when executed by the processor implementing the steps of the rights validation method according to any of claims 3 to 8.
10. A computer-readable storage medium, having stored thereon a rights verification program which, when executed by a processor, implements the steps of the rights verification method of any one of claims 1 to 8.
CN201911254328.5A 2019-12-06 2019-12-06 Authority verification method, system and computer readable storage medium Pending CN110933100A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911254328.5A CN110933100A (en) 2019-12-06 2019-12-06 Authority verification method, system and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911254328.5A CN110933100A (en) 2019-12-06 2019-12-06 Authority verification method, system and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN110933100A true CN110933100A (en) 2020-03-27

Family

ID=69857854

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911254328.5A Pending CN110933100A (en) 2019-12-06 2019-12-06 Authority verification method, system and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110933100A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109036434A (en) * 2018-08-07 2018-12-18 广州势必可赢网络科技有限公司 A kind of method, device and equipment for assisting cracking of cases by vocal print
CN109543377A (en) * 2018-10-17 2019-03-29 深圳壹账通智能科技有限公司 Auth method, device, computer equipment and storage medium
CN110119606A (en) * 2018-02-07 2019-08-13 浙江宇视科技有限公司 Identity data verification method, system and computer readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110119606A (en) * 2018-02-07 2019-08-13 浙江宇视科技有限公司 Identity data verification method, system and computer readable storage medium
CN109036434A (en) * 2018-08-07 2018-12-18 广州势必可赢网络科技有限公司 A kind of method, device and equipment for assisting cracking of cases by vocal print
CN109543377A (en) * 2018-10-17 2019-03-29 深圳壹账通智能科技有限公司 Auth method, device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
KR102216877B1 (en) Authentication method and apparatus based on biometric information in a electronic device
CN105306204B (en) Security verification method, device and system
KR20180061311A (en) Service processing methods, devices and systems
US9124575B2 (en) Self-single sign-on
CN107231607B (en) Unlocking method, unlocking device and computer-readable storage medium of bluetooth smart lock
CN105468952A (en) Authentication method and apparatus
KR20200114392A (en) Method for installing a subscriber profile and electronic device thereof
KR102649375B1 (en) Methods, systems and media for authenticating users using biometric signatures
CN111935802A (en) Device distribution network method, device and computer-readable storage medium
CN109472903A (en) A kind of control of bluetooth access control method and its device
CN109215640B (en) Speech recognition method, intelligent terminal and computer readable storage medium
CN104579665B (en) Method for authenticating and device
CN111954164B (en) Device distribution network method, device and computer-readable storage medium
US10936705B2 (en) Authentication method, electronic device, and computer-readable program medium
KR102797533B1 (en) Providing Method of Autofill function and electric device including the same
CN113590248B (en) Screen projection method and device of vehicle-mounted terminal and readable storage medium
CN112349009A (en) User identity identification method, device, equipment and computer readable storage medium
CN118349988A (en) Unified authentication method, device, equipment and storage medium for application program
CN110933100A (en) Authority verification method, system and computer readable storage medium
KR20140076827A (en) System and Method for managing applet
KR102453161B1 (en) Apparatus and method for transmitting private information to automatic response system
CN114979048B (en) Identity verification method, system, electronic device and medium based on instant messaging
CN111339196A (en) Data processing method and system based on block chain and computer readable storage medium
CN112330865B (en) Doorbell sharing method, doorbell sharing system and computer readable storage medium
CN108377236B (en) Verification method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200327