CN106341539A - Automatic evidence obtaining method of malicious caller voiceprint, apparatus and mobile terminal thereof - Google Patents

Automatic evidence obtaining method of malicious caller voiceprint, apparatus and mobile terminal thereof Download PDF

Info

Publication number
CN106341539A
CN106341539A CN201610827254.XA CN201610827254A CN106341539A CN 106341539 A CN106341539 A CN 106341539A CN 201610827254 A CN201610827254 A CN 201610827254A CN 106341539 A CN106341539 A CN 106341539A
Authority
CN
China
Prior art keywords
malice
caller
vocal print
feature
incoming call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610827254.XA
Other languages
Chinese (zh)
Inventor
曹保康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anyun Century Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201610827254.XA priority Critical patent/CN106341539A/en
Publication of CN106341539A publication Critical patent/CN106341539A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • H04M1/665Preventing unauthorised calls to a telephone set by checking the validity of a code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/74Details of telephonic subscriber devices with voice recognition means

Abstract

The invention provides an automatic evidence obtaining method of a malicious caller voiceprint and an apparatus thereof. The method is characterized by determining an incoming call number corresponding to an incoming call to be a malicious incoming call; acquiring voice data of a caller during a conversation process and extracting a voiceprint characteristic of the caller from the voice data; and determining whether the voiceprint characteristic of the caller is stored in a malicious voiceprint database, and if the voiceprint characteristic is not stored, storing the voiceprint characteristic of the caller in the malicious voiceprint database. Therefore, the voiceprint characteristic of the caller is stored in the malicious voiceprint database as long as the incoming call is identified to be the malicious incoming call; and when a malicious caller uses other telephone numbers to call a user again, the malicious caller can be identified, and the user can be timely prompted so that safety is increased and user time is saved. The invention also provides a mobile terminal.

Description

The automatic evidence-collecting method of malice caller's vocal print, device and mobile terminal
Technical field
The present invention relates to call security technology area, specifically, the present invention relates to a kind of malice caller's vocal print from Dynamic evidence collecting method, device and mobile terminal.
Background technology
In recent years, telephone fraud, telemarketing, the malicious call behavior such as make nuisance calls are more and more rampant, and telecommunication user is not Win it to disturb.Some mobile phone safe software such as 360 mobile guards, the phone that these can be malice incoming call by numerous user's reports Number unifying identifier is malice number, and prompting this telephone number of called subscriber is malice number when this telephone number is called Code is so that called subscriber can effectively differentiate, it is to avoid cheated or lose time, and this ensure that user security to a certain extent With saved user time.If however, these malice caller has changed telephone number carries out malicious call behavior again, Because this telephone number is not effectively identified when just starting, called subscriber is led to there is cheated risk and use can be wasted Family time, security and efficiency all have much room for improvement.
Content of the invention
The purpose of the present invention is intended at least can solve one of above-mentioned technological deficiency, and the particularly not good technology of security lacks Fall into.
The present invention provides a kind of automatic evidence-collecting method of malice caller's vocal print, comprises the steps:
Determine that the corresponding caller ID of incoming call is that malice is sent a telegram here;
Obtain the speech data of caller in communication process, extract the vocal print feature of caller from described speech data;
Judging whether the vocal print feature of described caller has stored in malice voice print database, if not storing, depositing The vocal print feature storing up described caller is in described malice voice print database.
Wherein in an embodiment, the described caller ID determining that incoming call is corresponding is the process bag that malice is sent a telegram here Include:
Obtain the corresponding caller ID of incoming call;
Determine that caller ID is malice incoming call, and determine its malice type.
Wherein in an embodiment, described malice type is more than one, including swindle type, promotes type, harassing and wrecking class At least one of type.
Wherein in an embodiment, described malice voice print database is more than one, and each malice voice print database corresponds to Respective malice type, each malice voice print database is stored with the vocal print feature that prestores of corresponding malice type.
Wherein in an embodiment, the described vocal print feature that prestores is associated with telephone number.
Wherein in an embodiment, whether the described vocal print feature judging described caller has stored in malice vocal print Database includes:
Obtain, from described malice voice print database, the vocal print feature that prestores associating with described caller ID, judge described next Whether the vocal print feature of electric person is mated with the described vocal print feature that prestores.
Wherein in an embodiment, the described caller ID determining that incoming call is corresponding is the process bag that malice is sent a telegram here Include:
Judge whether described caller ID has stored in malice number blacklist, if then determining that corresponding incoming call is Malice is sent a telegram here.
Wherein in an embodiment, described malice number blacklist is stored in local or server.
Wherein in an embodiment, the vocal print feature of described caller is to carry the verbal information with tagged word or word Sound wave spectrum.
Wherein in an embodiment, the described caller's speech data obtaining in communication process, from described speech data The process of the middle vocal print feature extracting caller includes:
When caller's generation voice flow is detected, record and store at least one section speech data;
Described in parsing, at least one section speech data is to extract the vocal print feature of caller.
Wherein in an embodiment, described in described parsing, at least one section speech data is to extract the vocal print feature of caller Including:
At least one section speech data described in parsing, extracts least one set tagged word or word in speech data;
Extract the vocal print feature of caller according to described tagged word or word.
Wherein in an embodiment, described speech data is the speech data setting duration.
Wherein in an embodiment, after extracting the vocal print feature success of caller, or confirm to extract caller's After vocal print feature, delete described speech data.
Wherein in an embodiment, the described vocal print feature storing described caller is in described malice voice print database Including:
Storage and described caller ID set up the vocal print feature of the described caller having mapping relations to described malice vocal print In database.
Wherein in an embodiment, described malice voice print database is set up in server.
The present invention also provides a kind of automatic evidence-collecting device of malice caller's vocal print, comprising:
Identification module, for determining that the corresponding caller ID of incoming call is that malice is sent a telegram here;
Analysis module, for obtaining the speech data of caller in communication process, extracts incoming call from described speech data The vocal print feature of person;
Memory module, whether the vocal print feature for judging described caller has stored in malice voice print database, If not storing, the vocal print feature storing described caller is in described malice voice print database.
Wherein in an embodiment, described identification module is used for:
Obtain the corresponding caller ID of incoming call;
Determine that caller ID is malice incoming call, and determine its malice type.
Wherein in an embodiment, described malice type is more than one, including swindle type, promotes type, harassing and wrecking class At least one of type.
Wherein in an embodiment, described malice voice print database is more than one, and each malice voice print database corresponds to Respective malice type, each malice voice print database is stored with the vocal print feature that prestores of corresponding malice type.
Wherein in an embodiment, the described vocal print feature that prestores is associated with telephone number.
Wherein in an embodiment, described memory module is used for:
Obtain, from described malice voice print database, the vocal print feature that prestores associating with described caller ID, judge described next Whether the vocal print feature of electric person is mated with the described vocal print feature that prestores.
Wherein in an embodiment, described identification module is used for:
Judge whether described caller ID has stored in malice number blacklist, if then determining that corresponding incoming call is Malice is sent a telegram here.
Wherein in an embodiment, described malice number blacklist is stored in local or server.
Wherein in an embodiment, the vocal print feature of described caller is to carry the verbal information with tagged word or word Sound wave spectrum.
Wherein in an embodiment, described analysis module is used for:
When caller's generation voice flow is detected, record and store at least one section speech data;
Described in parsing, at least one section speech data is to extract the vocal print feature of caller.
Wherein in an embodiment, described in described parsing, at least one section speech data is to extract the vocal print feature of caller Including:
At least one section speech data described in parsing, extracts least one set tagged word or word in speech data;
Extract the vocal print feature of caller according to described tagged word or word.
Wherein in an embodiment, described speech data is the speech data setting duration.
Wherein in an embodiment, described device also includes removing module;Described removing module is used in described analysis After module extracts the vocal print feature success of caller, or after confirming to extract the vocal print feature of caller, delete described voice Data.
Wherein in an embodiment, described memory module is used for:
Storage and described caller ID set up the vocal print feature of the described caller having mapping relations to described malice vocal print In database.
Wherein in an embodiment, described malice voice print database is set up in server.
The present invention also provides a kind of mobile terminal, comprising:
Touch-sensitive display;
One or more processors;
Memory;
One or more application programs, wherein said one or more application programs are stored in described memory and quilt It is configured to by one or more of computing devices, one or more of programs are configured to: execution any embodiment institute The automatic evidence-collecting method of the malice caller's vocal print stated.
The above-mentioned automatic evidence-collecting method of malice caller's vocal print, device and mobile terminal, determine that incoming call is corresponding Caller ID be malice send a telegram here;Obtain the speech data of caller in communication process, extract caller from this speech data Vocal print feature;Judge whether the vocal print feature of this caller has stored in malice voice print database, if not storing, The vocal print feature storing this caller is in this malice voice print database.So, send a telegram here as long as incoming call is identified as malice, incoming call The vocal print feature of person is stored in malice voice print database, and this malice caller is called again using other telephone numbers Will be identified during user, timely point out user, improve security and saved user time.
And, even if by collect malice caller vocal print feature so that malice caller normally daily call is all Can be prompted to send a telegram here for malice, can effectively contain that malice caller no longer carries out malicious call behavior.If default at one section Investigate duration in malice caller incoming call no longer by user's report be malice send a telegram here, then can also delete malice voice print database The vocal print feature of this caller in storehouse.
The aspect that the present invention adds and advantage will be set forth in part in the description, and these will become from the following description Obtain substantially, or recognized by the practice of the present invention.
Brief description
The above-mentioned and/or additional aspect of the present invention and advantage will become from the following description of the accompanying drawings of embodiments Substantially and easy to understand, wherein:
Fig. 1 is the automatic evidence-collecting method flow chart of malice caller's vocal print of an embodiment;
Fig. 2 is the automatic evidence-collecting apparatus module figure of malice caller's vocal print of an embodiment;
Fig. 3 is illustrated that the block diagram of the part-structure of the mobile phone related to terminal provided in an embodiment of the present invention.
Specific embodiment
Embodiments of the invention are described below in detail, the example of described embodiment is shown in the drawings, wherein from start to finish The element that same or similar label represents same or similar element or has same or like function.Below with reference to attached The embodiment of figure description is exemplary, is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " " used herein, " Individual ", " described " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that arranging used in the specification of the present invention Diction " inclusion " refers to there is described feature, integer, step, operation, element and/or assembly, but it is not excluded that existing or adding Other features one or more, integer, step, operation, element, assembly and/or their group.It should be understood that when we claim unit Part is " connected " or during " coupled " to another element, and it can be directly connected or coupled to other elements, or can also exist Intermediary element.Additionally, " connection " used herein or " coupling " can include wirelessly connecting or wirelessly coupling.Used herein arrange Diction "and/or" includes one or more associated list the whole of item or any cell and combines with whole.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, and all terms used herein (include technology art Language and scientific terminology), there is the general understanding identical meaning with the those of ordinary skill in art of the present invention.Also should Be understood by, those terms defined in such as general dictionary it should be understood that have with the context of prior art in The consistent meaning of meaning, and unless by specific definitions as here, otherwise will not use idealization or excessively formal implication To explain.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal device " had both included wireless communication The equipment of number receiver, it only possesses the equipment of the wireless signal receiver of non-emissive ability, includes receiving and transmitting hardware again Equipment, its have can on both-way communication link, execute both-way communication reception and transmitting hardware equipment.This equipment May include that honeycomb or other communication apparatus, it has single line display or multi-line display or does not have multi-line to show The honeycomb of device or other communication apparatus;Pcs (personal communications service, person communication system), it can With combine voice, data processing, fax and/or data communication capabilities;Pda (personal digital assistant, personal Digital assistants), it can include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, day Go through and/or gps (global positioning system, global positioning system) receiver;Conventional laptop and/or palm Type computer or other equipment, its have and/or include the conventional laptop of radio frequency receiver and/or palmtop computer or its His equipment." terminal " used herein above, " terminal device " they can be portable, can transport, be arranged on the vehicles (aviation, Sea-freight and/or land) in, or be suitable for and/or be configured in local runtime, and/or with distribution form, operate in the earth And/or any other position operation in space." terminal " used herein above, " terminal device " can also be communicating terminal, on Network termination, music/video playback terminal, for example, can be pda, mid (mobile internet device, mobile Internet Equipment) and/or there is mobile phone or the equipment such as intelligent television, Set Top Box of music/video playing function.
Those skilled in the art of the present technique are appreciated that remote network devices used herein above, and it is including but not limited to counted The cloud that calculation machine, network host, single network server, multiple webserver collection or multiple server are constituted.Here, Yun Youji Constitute in a large amount of computers of cloud computing (cloud computing) or the webserver, wherein, cloud computing is Distributed Calculation One kind, a super virtual computer being made up of a group loosely-coupled computer collection.In embodiments of the invention, far-end Communication can be realized by any communication modes between the network equipment, terminal device and wns server, including but not limited to, be based on The mobile communication of 3gpp, lte, wimax, the computer network communication based on tcp/ip, udp agreement and based on bluetooth, infrared The low coverage wireless transmission method of transmission standard.
The automatic evidence-collecting method of malice caller's vocal print described below and device, can apply to mobile terminal, for example It is applied to mobile phone, panel computer, be the terminal with communication function in a word, in the following description with terminal as example.
Fig. 1 is the automatic evidence-collecting method flow chart of malice caller's vocal print of an embodiment.
The present invention provides a kind of automatic evidence-collecting method of malice caller's vocal print, comprises the steps:
Step s100: determine that the corresponding caller ID of incoming call is that malice is sent a telegram here.
Malice number blacklist can be pre-build in the machine or server, when terminal receives incoming call, obtain incoming call Number, judges whether caller ID has stored in malice number blacklist, if then determining that corresponding incoming call is come for malice Electricity.If malice number blacklist is stored in the machine, locally it is being identified;If malice number blacklist is stored in service Device, then be identified in server, and recognition result is fed back to terminal by server.
Malice number blacklist both can be the blacklist voluntarily set up by user, and such as user is being connected to some malice electricity During words, this telephone number is added in blacklist, this when, malice number blacklist can be stored in locally, and user also may be used To share this malice number blacklist to server.Certainly, malice number blacklist can also be the black name set up by server Single, such as, during the telephone number of numerous user's reports is piped off by server, this when, malice number blacklist was permissible It is stored in server, user can also actively arrive server request and obtain this malice number blacklist.
Malice number blacklist both can be a blacklist it is also possible to be divided into multiple malice number names according to malice type Single.Such as malice type can be divided into swindle type, promote type, harassing and wrecking type etc., then malice number blacklist can divide Become swindle blacklist, promote blacklist, harassing and wrecking blacklist.Terminal is recognizing which malice number black name caller ID is belonging to Dan Zhong, is then pointed out accordingly.Such as identification caller ID is belonging to swindle in blacklist, then prompting user of incoming call is Swindle incoming call.Therefore, when being also finely divided to malice type, terminal can obtain the corresponding caller ID of incoming call, Determine that caller ID is malice incoming call, and determine its malice type.Detailed process is: terminal obtains corresponding the coming of incoming call After electric number, caller ID is compared in multiple malice number blacklists, when the malice number of a certain malice type is black Be stored with list this telephone number when it is determined that this telephone number is malice caller ID, and determine its malice type.
Step s200: obtain the speech data of caller in communication process, extract the sound of caller from this speech data Line feature.
Due to everyone sound organ, vocal cords, oral cavity, nasal cavity, tongue, tooth, lip, lung etc., assume thousand in pronunciation Appearance different expressions.Due to the many reasons such as age, personality, speech habits, along with pronunciation amount of capacity differs, pronouncing frequency phase not to the utmost With even small difference, also resulting in the sound that these organs send necessarily has respective feature, thus forming each The original in style vocal print of people (voiceprint), available sound spectrograph is observed out.
Application on Voiceprint Recognition is it is simply that identify the process of the identity of speaker from certain section of voice.Similar with fingerprint, everyone says The phonetic feature containing during words and pronunciation custom etc. are also almost unique.Speech recognition is general character identification, judges described Content (say what).Application on Voiceprint Recognition is individual character identification, judges speaker's identity (being who says).
Application on Voiceprint Recognition has two key issues, and one is feature extraction, and two is pattern-recognition.
The task of feature extraction is to extract and select have the characteristics such as separability is strong, stability is high to the vocal print of speaker Acoustics or language feature.Although at present most of Voiceprint Recognition System be all acoustics aspect feature, characterize one The feature of people's feature should be multifaceted, comprising: (1) acoustic feature relevant with the anatomical structure of the pronunciation mechanism of the mankind (as frequency spectrum, cepstrum, formant, fundamental tone, reflectance factor etc.), nasal sound, band deep breathing sound, hoarse sound, laugh etc.;(2) it is subject to The semanteme of the impacts such as socioeconomic status, education level, birthplace, rhetoric, pronunciation, speech custom etc.;(3) personal touch or The features such as the rhythm that affected by father and mother, rhythm, speed, intonation, volume.From the angle that can be modeled using mathematical method, The feature that vocal print automatic identification model can use at present includes: (1) acoustic feature (cepstrum);(2) lexical characteristics (speaker Related word n-gram, phoneme n-gram);(3) prosodic features (using fundamental tone and the energy " posture " of n-gram description);(4) Languages, dialect and accent information;(5) channel information (using which kind of passage);Etc..
For pattern-recognition, mainly there are this few big class method: (1) template matching method: bend (dtw) using dynamic time To be directed at training and test feature sequence, it is mainly used in the application (usually text inter-related task) of fixed phrases;(2) arest neighbors Method: retain all characteristic vectors during training, during identification, each vector is found with nearest k in trained vector, enters accordingly Row identification, the amount of usual model storage and similar calculating is all very big;(3) neural net method: have a variety of forms, such as multilayer sense Know, RBF (rbf) etc., can explicitly train to distinguish speaker and its background speaker, its training burden is very big, and mould The replicability of type is bad;(4) hidden Markov model (hmm) method: the hmm of single state is usually used, or Gaussian Mixture Model (gmm), is popular method, and effectiveness comparison is good;(5) vq clustering method (such as lbg, k- average): effectiveness comparison is good, Algorithm complex is not also high, and hmm method cooperates and more can receive more preferable effect;(6) multinomial classifier methods: have Higher precision, but model storage and amount of calculation are all than larger.
The main points of wherein template matching method are to extract corresponding in the training process from the training sentence of each speaker Characteristic vector is describing the behavior of each speaker;In test phase, with same side from the tested speech signal of speaker Method extracts test template, mainly has dynamic time warping method and vector quantization method.In the following description, with template matches As a example method.
Because everyone vocal print is unique, therefore can obtain caller's by parsing the sound of caller Thus identifying malice caller, the vocal print feature of caller is to carry the sound of the verbal information with tagged word or word to vocal print feature Wave frequency is composed.For example, terminal can detect caller speak (generation voice flow) when, record and store at least one section language Sound data;Then parse at least one section speech data to extract the vocal print feature of caller.This speech data can be for during setting Long speech data, such as, a length of 10 seconds when setting, start when caller speaks to record from detecting, record 10 seconds.
Obtain the speech data of caller in communication process, the vocal print feature extracting caller from this speech data is permissible Realized by following process: at least one section speech data of parsing, extracts least one set tagged word or word in speech data;According to this Tagged word or the vocal print feature of word extraction caller.
Tagged word or word pre-set, this is because usual swindler, pusher, harassing and wrecking person can be in calls Say specific word or word, such as " hello ", " feeding ", " may I ask ", " you are ", " sir ", " Ms ", " " etc. tagged word or Word, by identifying these tagged words or word in speech data, can effectively improve the efficiency of Application on Voiceprint Recognition.For example, in voice The sentence " hello, could you tell me it is Mr. Tang Baihu " that caller says is have identified, terminal extracts " hello ", " asks in fragment Ask ", " you are ", " sir ", " " this five stack features word or word, then extract the vocal print of caller according to these tagged words or word Feature.
If first vocal print of the caller getting with this that is not stored with following malice voice print database is special Levy corresponding vocal print feature, then after the first vocal print feature that this stores this caller, if this caller follow-up uses it His telephone number calls other users again, generally also can say above-mentioned tagged word or word, then terminal can be according to tagged word Or word extracts second vocal print feature of caller, the second vocal print feature of first vocal print feature of caller and caller is entered Row contrast identification malice is sent a telegram here.
The speech data obtaining can store or be stored temporarily in the storage medium of terminal, when the vocal print extracting caller is special After levying successfully, or after confirming to extract the vocal print feature of caller, terminal can delete sound bite, to save depositing of terminal Storage space.
Step s300: judge whether the vocal print feature of described caller has stored in malice voice print database, if not having Storage is had then to store the vocal print feature of caller in malice voice print database.
After terminal extracts the vocal print feature of caller of caller, judge whether the vocal print feature of caller has stored in In malice voice print database.Malice voice print database is stored with the vocal print feature that prestores being associated with telephone number, and these prestore Vocal print feature is server collects in numerous malice incoming calls before and stores, and will prestore after collection vocal print feature with Corresponding telephone number establishes mapping relations.Therefore, malice voice print database is set up in server.
The possible more than one of malice voice print database, for example, can be more than one malice voice print database, each evil Meaning voice print database corresponds to respective malice type.For example malice type be more than kind, can be divided into swindle type, promote type, Harass type etc., then malice voice print database is segmented into fraud database, promotional database, harassing and wrecking database.Work as terminal When getting the telephone number that malice is sent a telegram here, during above-mentioned identification malice is sent a telegram here, can be true according to this telephone number Determine malice type, then when whether the vocal print feature judging caller has stored in malice voice print database, Ke Yigen According to the malice type having determined in corresponding malice voice print database matching judgment, improve efficiency.
Therefore, whether judging the vocal print feature of caller, have stored in malice voice print database can be by following mistake Cheng Shixian: obtain the vocal print feature that prestores associating with caller ID from malice voice print database, judge that the vocal print of caller is special Levy and whether mate with the vocal print feature that prestores.
If be divided into the malice voice print database of multiple correspondence malice types according to malice type, terminal is storing this incoming call During the vocal print feature of person, store corresponding malice voice print database according to its malice type.In storage it should storing and coming Electric number sets up the vocal print feature of the caller having mapping relations in malice voice print database, will caller vocal print feature Establish storage after mapping relations with caller ID.Because malice voice print database is built upon server, therefore terminal exists After getting the vocal print feature of caller, the vocal print feature of caller is uploaded onto the server and is stored.
Certainly, if malice caller no longer carries out malicious call behavior, can be special by the vocal print of this malice caller Levy and delete from malice voice print database.For example, preset and investigate duration (such as 2 months), if this incoming call in investigation duration The vocal print feature of person is no longer collected, that is, the incoming call being equivalent to malice caller in investigation duration by user's report is no longer Malice is sent a telegram here, then can also delete the vocal print feature of this caller in malice voice print database.
The automatic evidence-collecting method of above-mentioned malice caller's vocal print, determines that the corresponding caller ID of incoming call is malice Incoming call;Obtain the speech data of caller in communication process, extract the vocal print feature of caller from this speech data;Judging should Whether the vocal print feature of caller has stored in malice voice print database, if not storing, stores the vocal print of this caller Feature is in this malice voice print database.So, send a telegram here as long as incoming call is identified as malice, the vocal print feature of caller is deposited Store up in malice voice print database, this malice caller use other telephone numbers again calling party when will be identified Come, timely point out user, improve security and saved user time.
And, even if by collect malice caller vocal print feature so that malice caller normally daily call is all Can be prompted to send a telegram here for malice, can effectively contain that malice caller no longer carries out malicious call behavior.If default at one section Investigate duration in malice caller incoming call no longer by user's report be malice send a telegram here, then can also delete malice voice print database The vocal print feature of this caller in storehouse.
The malice voice print database being formed by the participation of numerous users, except passing through caller's when malice is sent a telegram here Vocal print feature, to identify and to point out to use open air, can also have following extension effect.For example, handle sim card with system of real name Business persistently carry out, database (db1) system of follow-up " identity card-phone number " can be gradually improved, and treats terminal magnanimity The database (db2) of " user's vocal print-phone number-whether have swindle record " perfect, by the mutual visit of two databases Ask, subsequently can accomplish following Data Query Platform:
1st, swindle record queries platform:
When swindler has fraudulent act by phone, the vocal print feature that high in the clouds (server) passes through database db2 is permissible Inquire about the phone number of its authentication, then the real identity by database db1 acknowledgment of your inquiry to swindler.
2nd, financial credit searching platform:
In conjunction with database db1 and db2, complete credit appraisal platform can be integrated out, common foundation safeguards that society is sincere Institutional guarantee.
The corresponding device of automatic evidence-collecting method of a kind of and above-mentioned malice caller's vocal print is below described, this device is applied to Mobile terminal.Fig. 2 is the automatic evidence-collecting apparatus module figure of malice caller's vocal print of an embodiment.A kind of malice caller's sound The automatic evidence-collecting device of line, comprising: identification module 100, analysis module 200 and memory module 300.
Identification module 100 is used for determining that the corresponding caller ID of incoming call is that malice is sent a telegram here;Analysis module 200 is used for Obtain the speech data of caller in communication process, extract the vocal print feature of caller from described speech data;Memory module 300 judge whether the vocal print feature of described caller has stored in malice voice print database, if not storing, store institute The vocal print feature stating caller is in described malice voice print database.
Identification module 100 determines that the corresponding caller ID of incoming call is that malice is sent a telegram here.
Malice number blacklist, when terminal receives incoming call, identification module can be pre-build in the machine or server 100 acquisition caller IDs, judge whether caller ID has stored in malice number blacklist, if then determining corresponding next Electricity is sent a telegram here for malice.If malice number blacklist is stored in the machine, locally it is being identified;If malice number blacklist It is stored in server, is then identified in server, recognition result is fed back to terminal by server.
Malice number blacklist both can be the blacklist voluntarily set up by user, and such as user is being connected to some malice electricity During words, this telephone number is added in blacklist, this when, malice number blacklist can be stored in locally, and user also may be used To share this malice number blacklist to server.Certainly, malice number blacklist can also be the black name set up by server Single, such as, during the telephone number of numerous user's reports is piped off by server, this when, malice number blacklist was permissible It is stored in server, user can also actively arrive server request and obtain this malice number blacklist.
Malice number blacklist both can be a blacklist it is also possible to be divided into multiple malice number names according to malice type Single.Such as malice type can be divided into swindle type, promote type, harassing and wrecking type etc., then malice number blacklist can divide Become swindle blacklist, promote blacklist, harassing and wrecking blacklist.Terminal is recognizing which malice number black name caller ID is belonging to Dan Zhong, is then pointed out accordingly.Such as identification caller ID is belonging to swindle in blacklist, then prompting user of incoming call is Swindle incoming call.Therefore, when being also finely divided to malice type, identification module 100 can obtain corresponding the coming of incoming call Electric number, determines that caller ID is malice incoming call, and determines its malice type.Detailed process is: identification module 100 obtains incoming call After calling corresponding caller ID, caller ID is compared in multiple malice number blacklists, when a certain malice class Be stored with the malice number blacklist of type this telephone number when it is determined that this telephone number is malice caller ID, and determine Its malice type.
Analysis module 200 obtains the speech data of caller in communication process, extracts caller's from this speech data Vocal print feature.
Due to everyone sound organ, vocal cords, oral cavity, nasal cavity, tongue, tooth, lip, lung etc., assume thousand in pronunciation Appearance different expressions.Due to the many reasons such as age, personality, speech habits, along with pronunciation amount of capacity differs, pronouncing frequency phase not to the utmost With even small difference, also resulting in the sound that these organs send necessarily has respective feature, thus forming each The original in style vocal print of people (voiceprint), available sound spectrograph is observed out.
Application on Voiceprint Recognition is it is simply that identify the process of the identity of speaker from certain section of voice.Similar with fingerprint, everyone says The phonetic feature containing during words and pronunciation custom etc. are also almost unique.Speech recognition is general character identification, judges described Content (say what).Application on Voiceprint Recognition is individual character identification, judges speaker's identity (being who says).
Application on Voiceprint Recognition has two key issues, and one is feature extraction, and two is pattern-recognition.
The task of feature extraction is to extract and select have the characteristics such as separability is strong, stability is high to the vocal print of speaker Acoustics or language feature.Although at present most of Voiceprint Recognition System be all acoustics aspect feature, characterize one The feature of people's feature should be multifaceted, comprising: (1) acoustic feature relevant with the anatomical structure of the pronunciation mechanism of the mankind (as frequency spectrum, cepstrum, formant, fundamental tone, reflectance factor etc.), nasal sound, band deep breathing sound, hoarse sound, laugh etc.;(2) it is subject to The semanteme of the impacts such as socioeconomic status, education level, birthplace, rhetoric, pronunciation, speech custom etc.;(3) personal touch or The features such as the rhythm that affected by father and mother, rhythm, speed, intonation, volume.From the angle that can be modeled using mathematical method, The feature that vocal print automatic identification model can use at present includes: (1) acoustic feature (cepstrum);(2) lexical characteristics (speaker Related word n-gram, phoneme n-gram);(3) prosodic features (using fundamental tone and the energy " posture " of n-gram description);(4) Languages, dialect and accent information;(5) channel information (using which kind of passage);Etc..
For pattern-recognition, mainly there are this few big class method: (1) template matching method: bend (dtw) using dynamic time To be directed at training and test feature sequence, it is mainly used in the application (usually text inter-related task) of fixed phrases;(2) arest neighbors Method: retain all characteristic vectors during training, during identification, each vector is found with nearest k in trained vector, enters accordingly Row identification, the amount of usual model storage and similar calculating is all very big;(3) neural net method: have a variety of forms, such as multilayer sense Know, RBF (rbf) etc., can explicitly train to distinguish speaker and its background speaker, its training burden is very big, and mould The replicability of type is bad;(4) hidden Markov model (hmm) method: the hmm of single state is usually used, or Gaussian Mixture Model (gmm), is popular method, and effectiveness comparison is good;(5) vq clustering method (such as lbg, k- average): effectiveness comparison is good, Algorithm complex is not also high, and hmm method cooperates and more can receive more preferable effect;(6) multinomial classifier methods: have Higher precision, but model storage and amount of calculation are all than larger.
The main points of wherein template matching method are to extract corresponding in the training process from the training sentence of each speaker Characteristic vector is describing the behavior of each speaker;In test phase, with same side from the tested speech signal of speaker Method extracts test template, mainly has dynamic time warping method and vector quantization method.In the following description, with template matches As a example method.
Because everyone vocal print is unique, therefore analysis module 200 can by parse caller sound with Thus identifying malice caller, the vocal print feature of caller is to carry to have tagged word or word to the vocal print feature obtaining caller The sound wave spectrum of verbal information.For example, terminal can detect caller speak (generation voice flow) when, record and deposit At least one section speech data of storage;Then analysis module 200 parses at least one section speech data to extract the vocal print feature of caller. This speech data, can be spoken from caller is detected a length of 10 seconds when for example setting for setting the speech data of duration When start record, record 10 seconds.
Analysis module 200 obtains the speech data of caller in communication process, extracts caller's from this speech data Vocal print feature can be realized by following process: analysis module 200 parses at least one section speech data, obtains in speech data extremely A few stack features word or word;Obtain the vocal print feature of caller according to this feature word or word.
Tagged word or word pre-set, this is because usual swindler, pusher, harassing and wrecking person can be in calls Say specific word or word, such as " hello ", " feeding ", " may I ask ", " you are ", " sir ", " Ms ", " " etc. tagged word or Word, by identifying these tagged words or word in speech data, can effectively improve the efficiency of Application on Voiceprint Recognition.For example, in voice The sentence " hello, could you tell me it is Mr. Tang Baihu " that caller says is have identified, terminal extracts " hello ", " asks in data Ask ", " you are ", " sir ", " " this five stack features word or word, then extract the vocal print of caller according to these tagged words or word Feature.
If first vocal print of the caller getting with this that is not stored with following malice voice print database is special Levy corresponding vocal print feature, then after the first vocal print feature that this stores this caller, if this caller follow-up uses it His telephone number calls other users again, generally also can say above-mentioned tagged word or word, then terminal can be according to tagged word Or word extracts second vocal print feature of caller, the second vocal print feature of first vocal print feature of caller and caller is entered Row contrast identification malice is sent a telegram here.
This device can also include removing module.The storage that the speech data obtaining can store or be stored temporarily in terminal is situated between In matter, after extracting the vocal print feature success of caller, or after confirming to extract the vocal print feature of caller, removing module can To delete speech data, to save the memory space of terminal.
Memory module 300 judges whether the vocal print feature of described caller has stored in malice voice print database, if Do not have to store and then store the vocal print feature of caller in malice voice print database.
After analysis module 200 extracts the vocal print feature of caller of caller, memory module 300 judges the vocal print of caller Whether feature has stored in malice voice print database.Malice voice print database is stored with prestoring of being associated with telephone number Vocal print feature, these vocal print features that prestore are that server is collected in numerous malice incoming calls before and stored, and are collecting After the vocal print feature that will prestore establish mapping relations with corresponding telephone number.Therefore, malice voice print database is set up in service Device.
The possible more than one of malice voice print database, for example, can be more than one malice voice print database, each evil Meaning voice print database corresponds to respective malice type.For example malice type be more than kind, can be divided into swindle type, promote type, Harass type etc., then malice voice print database is segmented into fraud database, promotional database, harassing and wrecking database.Work as identification When module 100 gets the telephone number of malice incoming call, during above-mentioned identification malice is sent a telegram here, analysis module 200 can To determine malice type according to this telephone number, then whether memory module 300 has deposited in the vocal print feature judging caller When storage is in malice voice print database, memory module 300 can be according to the malice type having determined to corresponding malice vocal print Matching judgment in database, improves efficiency.
Therefore, analysis module 200 judge whether the vocal print feature of caller has stored in can in malice voice print database To be realized by procedure below: obtain, from malice voice print database, the vocal print feature that prestores associating with caller ID, judge to come Whether the vocal print feature of electric person is mated with the vocal print feature that prestores.
If be divided into the malice voice print database of multiple correspondence malice types according to malice type, storing this caller's During vocal print feature, store corresponding malice voice print database according to its malice type.In storage it should store and incoming call number Code set up have mapping relations caller vocal print feature in malice voice print database, will caller vocal print feature with come Electric number stores after establishing mapping relations.Because malice voice print database is built upon server, therefore memory module 300 After getting the vocal print feature of caller, the vocal print feature of caller is uploaded onto the server and is stored.
Certainly, if malice caller no longer carries out malicious call behavior, removing module can be by this malice caller Vocal print feature delete from malice voice print database.For example, preset and investigate duration (such as 2 months), if investigating duration The vocal print feature of this caller interior is no longer collected, that is, be equivalent to investigate duration in malice caller incoming call no longer by with Family reports and sends a telegram here, then removing module can also delete the vocal print feature of this caller of malice voice print database for malice.
The automatic evidence-collecting device of above-mentioned malice caller's vocal print, identification module determines the corresponding incoming call number of incoming call Code is sent a telegram here for malice;Analysis module obtains the speech data of caller in communication process, extracts caller from this speech data Vocal print feature;Memory module judges whether the vocal print feature of this caller has stored in malice voice print database, if not having Storage is had then to store the vocal print feature of this caller in this malice voice print database.So, as long as incoming call is identified as malice Incoming call, the vocal print feature of caller is stored in malice voice print database, and this malice caller uses other phone number Code again calling party when will be identified, timely point out user, improve security and saved user time.
And, even if by collect malice caller vocal print feature so that malice caller normally daily call is all Can be prompted to send a telegram here for malice, can effectively contain that malice caller no longer carries out malicious call behavior.If default at one section Investigate duration in malice caller incoming call no longer by user's report be malice send a telegram here, then can also delete malice voice print database The vocal print feature of this caller in storehouse.
The embodiment of the present invention additionally provides mobile terminal, as shown in figure 3, for convenience of description, illustrate only and the present invention The related part of embodiment, particular technique details does not disclose, and refer to present invention method part.This terminal can be Including mobile phone, panel computer, pda (personal digital assistant, personal digital assistant), pos (point of Sales, point-of-sale terminal), the arbitrarily terminal device such as vehicle-mounted computer, so that terminal is as mobile phone as a example:
Fig. 3 is illustrated that the block diagram of the part-structure of the mobile phone related to terminal provided in an embodiment of the present invention.With reference to figure 3, mobile phone includes: radio frequency (radio frequency, rf) circuit 1510, memory 1520, input block 1530, display unit 1540th, sensor 1550, voicefrequency circuit 1560, Wireless Fidelity (wireless fidelity, wifi) module 1570, processor The part such as 1580 and power supply 1590.It will be understood by those skilled in the art that the handset structure shown in Fig. 3 do not constitute right The restriction of mobile phone, can include ratio and illustrate more or less of part, or combine some parts, or different part cloth Put.
With reference to Fig. 3, each component parts of mobile phone is specifically introduced:
Rf circuit 1510 can be used for receiving and sending messages or communication process in, the reception of signal and transmission, especially, by base station After downlink information receives, process to processor 1580;In addition, up data is activation will be designed to base station.Generally, rf circuit 1510 include but is not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (low noise Amplifier, lna), duplexer etc..Additionally, rf circuit 1510 can also be led to network and other equipment by radio communication Letter.Above-mentioned radio communication can use arbitrary communication standard or agreement, including but not limited to global system for mobile communications (global System of mobile communication, gsm), general packet radio service (general packet radio Service, gprs), CDMA (code division multiple access, cdma), WCDMA (wideband code division multiple access, wcdma), Long Term Evolution (long term evolution, Lte), Email, Short Message Service (short messaging service, sms) etc..
Memory 1520 can be used for storing software program and module, and processor 1580 is stored in memory by operation 1520 software program and module, thus execute various function application and the data processing of mobile phone.Memory 1520 can be led Storing program area to be included and storage data field, wherein, storing program area can be needed for storage program area, at least one function Application program (such as vocal print playing function, image player function etc.) etc.;Storage data field can store the use institute according to mobile phone Data (such as voice data, phone directory etc.) creating etc..Additionally, memory 1520 can include high random access storage Device, can also include nonvolatile memory, and for example, at least one disk memory, flush memory device or other volatibility are solid State memory device.
Input block 1530 can be used for numeral or the character information of receives input, and produce with the user setup of mobile phone with And the key signals input that function control is relevant.Specifically, input block 1530 may include contact panel 1531 and other inputs Equipment 1532.Contact panel 1531, also referred to as touch-screen, can collect user thereon or neighbouring touch operation (such as user Using any suitable object such as finger, stylus or annex on contact panel 1531 or the behaviour near contact panel 1531 Make), and corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 1531 may include touch detection Device and two parts of touch controller.Wherein, touch detecting apparatus detect the touch orientation of user, and detect touch operation band The signal coming, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then give processor 1580, and can the order sent of receiving processor 1580 being executed.Additionally, Contact panel 1531 can be realized using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except touch surface Plate 1531, input block 1530 can also include other input equipments 1532.Specifically, other input equipments 1532 can include But it is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more.
Display unit 1540 can be used for display and by the information of user input or is supplied to the information of user and each of mobile phone Plant menu.Display unit 1540 may include display floater 1541, optionally, can adopt liquid crystal display (liquid Crystal display, lcd), the form such as Organic Light Emitting Diode (organic light-emitting diode, oled) To configure display floater 1541.Further, contact panel 1531 can cover display floater 1541, when contact panel 1531 detects Arrive thereon or after neighbouring touch operation, send processor 1580 to determine the type of touch event, with preprocessor 1580 provide corresponding visual output according to the type of touch event on display floater 1541.Although in figure 3, contact panel 1531 is input and the input function to realize mobile phone as two independent parts with display floater 1541, but in some realities Apply in example, can contact panel 1531 is integrated with display floater 1541 and input and the output function of realizing mobile phone.
Mobile phone may also include at least one sensor 1550, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, and wherein, ambient light sensor can be according to ambient light The brightness to adjust display floater 1541 for the light and shade, proximity transducer can cut out display floater when mobile phone moves in one's ear 1541 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect that in all directions, (generally three axles) adds The size of speed, can detect that size and the direction of gravity when static, can be used for identifying application (the such as horizontal/vertical screen of mobile phone attitude Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;As for mobile phone also The other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, will not be described here.
Voicefrequency circuit 1560, loudspeaker 1561, microphone 1562 can provide the COBBAIF between user and mobile phone.Audio frequency Electric signal after the voice data receiving conversion can be transferred to loudspeaker 1561, is changed by loudspeaker 1561 by circuit 1560 For vocal print signal output;On the other hand, the vocal print signal of collection is converted to electric signal by microphone 1562, by voicefrequency circuit 1560 Voice data is converted to after reception, then after voice data output processor 1580 is processed, through rf circuit 1510 to be sent to ratio As another mobile phone, or voice data is exported to memory 1520 to process further.
Wifi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by wifi module 1570 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Fig. 3 shows Wifi module 1570, but it is understood that, it is simultaneously not belonging to must be configured into of mobile phone, can not change as needed completely Omit in the scope of the essence becoming invention.
Processor 1580 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, It is stored in software program and/or module in memory 1520 by running or executing, and call and be stored in memory 1520 Interior data, the various functions of execution mobile phone and processing data, thus carry out integral monitoring to mobile phone.Optionally, processor 1580 may include one or more processing units;Preferably, processor 1580 can integrated application processor and modulation /demodulation process Device, wherein, application processor mainly processes operating system, user interface and application program etc., and modem processor is mainly located Reason radio communication.It is understood that above-mentioned modem processor can not also be integrated in processor 1580.
Mobile phone also includes the power supply 1590 (such as battery) powered to all parts it is preferred that power supply can pass through power supply Management system is logically contiguous with processor 1580, thus realizing management charging, electric discharge and power consumption pipe by power-supply management system The functions such as reason.
Although not shown, mobile phone can also include camera, bluetooth module etc., will not be described here.
In embodiments of the present invention, the processor 1580 included by this terminal also has following functions: determines incoming call Corresponding caller ID is that malice is sent a telegram here;Obtain the speech data of caller in communication process, extract from this speech data The vocal print feature of caller;Judge whether the vocal print feature of this caller has stored in malice voice print database, if not having Storage then stores the vocal print feature of this caller in this malice voice print database.Namely processor 1580 possess execution above-mentioned The function of the automatic evidence-collecting method of any embodiment malice caller's vocal print, will not be described here.
It should be understood that although each step in the flow chart of Fig. 1 shows successively according to the instruction of arrow, this A little steps are not that the inevitable order according to arrow instruction executes successively.Unless expressly stated otherwise herein, these steps The not strict order of execution limits, and it can execute in the other order.And, at least a portion step in Fig. 1 can To include many sub-steps or multiple stage, these sub-steps or stage are not necessarily to complete in synchronization execution, But can execute in different moment, its execution sequence also be not necessarily and carry out successively, but can with other steps or At least a portion in the sub-step of other steps or stage executes in turn or alternately.
The above is only some embodiments of the present invention it is noted that ordinary skill people for the art For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (10)

1. a kind of automatic evidence-collecting method of malice caller's vocal print is it is characterised in that comprise the steps:
Determine that the corresponding caller ID of incoming call is that malice is sent a telegram here;
Obtain the speech data of caller in communication process, extract the vocal print feature of caller from described speech data;
Judging whether the vocal print feature of described caller has stored in malice voice print database, if not storing, storing institute The vocal print feature stating caller is in described malice voice print database.
2. the automatic evidence-collecting method of malice caller's vocal print according to claim 1 is it is characterised in that described determination is sent a telegram here Call the process that corresponding caller ID is malice incoming call to include:
Obtain the corresponding caller ID of incoming call;
Determine that caller ID is malice incoming call, and determine its malice type.
3. the automatic evidence-collecting method of malice caller's vocal print according to claim 2 is it is characterised in that described malice type More than one, including swindle type, promote at least one of type, harassing and wrecking type.
4. the automatic evidence-collecting method of malice caller's vocal print according to claim 3 is it is characterised in that described malice vocal print Database is more than one, and each malice voice print database corresponds to respective malice type, and each malice voice print database is stored with The vocal print feature that prestores of corresponding malice type.
5. the automatic evidence-collecting method of malice caller's vocal print according to claim 4 is it is characterised in that the described vocal print that prestores Feature is associated with telephone number.
6. the automatic evidence-collecting method of malice caller's vocal print according to claim 5 is it is characterised in that described in described judgement Whether the vocal print feature of caller has stored in malice voice print database includes:
Obtain, from described malice voice print database, the vocal print feature that prestores associating with described caller ID, judge described caller Vocal print feature whether mate with the described vocal print feature that prestores.
7. the automatic evidence-collecting method of malice caller's vocal print according to claim 1 is it is characterised in that described determination is sent a telegram here Call the process that corresponding caller ID is malice incoming call to include:
Judge whether described caller ID has stored in malice number blacklist, if then determining corresponding incoming call as malice Incoming call.
8. the automatic evidence-collecting method of malice caller's vocal print according to claim 7 is it is characterised in that described malice number Blacklist is stored in local or server.
9. a kind of automatic evidence-collecting device of malice caller's vocal print is it is characterised in that include:
Identification module, for determining that the corresponding caller ID of incoming call is that malice is sent a telegram here;
Analysis module, for obtaining the speech data of caller in communication process, extracts caller's from described speech data Vocal print feature;
Memory module, whether the vocal print feature for judging described caller has stored in malice voice print database, if not having Storage is had then to store the vocal print feature of described caller in described malice voice print database.
10. a kind of mobile terminal it is characterised in that comprising:
Touch-sensitive display;
One or more processors;
Memory;
One or more application programs, wherein said one or more application programs are stored in described memory and are configured It is by one or more of computing devices, one or more of programs are configured to: execution is according to claim 1~8 The automatic evidence-collecting method of the malice caller's vocal print described in any one.
CN201610827254.XA 2016-09-14 2016-09-14 Automatic evidence obtaining method of malicious caller voiceprint, apparatus and mobile terminal thereof Pending CN106341539A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610827254.XA CN106341539A (en) 2016-09-14 2016-09-14 Automatic evidence obtaining method of malicious caller voiceprint, apparatus and mobile terminal thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610827254.XA CN106341539A (en) 2016-09-14 2016-09-14 Automatic evidence obtaining method of malicious caller voiceprint, apparatus and mobile terminal thereof

Publications (1)

Publication Number Publication Date
CN106341539A true CN106341539A (en) 2017-01-18

Family

ID=57840062

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610827254.XA Pending CN106341539A (en) 2016-09-14 2016-09-14 Automatic evidence obtaining method of malicious caller voiceprint, apparatus and mobile terminal thereof

Country Status (1)

Country Link
CN (1) CN106341539A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107154996A (en) * 2017-06-30 2017-09-12 广东欧珀移动通信有限公司 Call blocking method, device, storage medium and terminal
CN107197463A (en) * 2017-07-10 2017-09-22 北京亿赛通网络安全技术有限公司 A kind of detection method of telephone fraud, storage medium and electronic equipment
CN108234485A (en) * 2017-12-30 2018-06-29 广东世纪网通信设备股份有限公司 Swindle vocal print acquisition device based on VOIP platforms and the methods, devices and systems that fraudulent call is intercepted using the device
CN109819089A (en) * 2017-11-21 2019-05-28 中国移动通信集团广东有限公司 Method, core network element, electronic equipment and the storage medium of voiceprint extraction
CN110010135A (en) * 2018-01-05 2019-07-12 北京搜狗科技发展有限公司 A kind of voice-based personal identification method, device and electronic equipment
CN111429918A (en) * 2020-03-26 2020-07-17 云知声智能科技股份有限公司 Phone call fraud visiting method and system based on voiceprint recognition and intention analysis
CN112784038A (en) * 2019-10-23 2021-05-11 阿里巴巴集团控股有限公司 Information identification method, system, computing device and storage medium
CN113160831A (en) * 2021-04-14 2021-07-23 浙江百应科技有限公司 Voiceprint recognition-based outbound method and device and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110072499A1 (en) * 2009-09-18 2011-03-24 Chung-Yu Lin Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password
CN105306657A (en) * 2014-06-20 2016-02-03 中兴通讯股份有限公司 Identity identification method, identity identification device and communication terminal
CN105872185A (en) * 2016-04-20 2016-08-17 乐视控股(北京)有限公司 Information prompting method, device and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110072499A1 (en) * 2009-09-18 2011-03-24 Chung-Yu Lin Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password
CN105306657A (en) * 2014-06-20 2016-02-03 中兴通讯股份有限公司 Identity identification method, identity identification device and communication terminal
CN105872185A (en) * 2016-04-20 2016-08-17 乐视控股(北京)有限公司 Information prompting method, device and system

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107154996A (en) * 2017-06-30 2017-09-12 广东欧珀移动通信有限公司 Call blocking method, device, storage medium and terminal
CN107197463A (en) * 2017-07-10 2017-09-22 北京亿赛通网络安全技术有限公司 A kind of detection method of telephone fraud, storage medium and electronic equipment
CN109819089A (en) * 2017-11-21 2019-05-28 中国移动通信集团广东有限公司 Method, core network element, electronic equipment and the storage medium of voiceprint extraction
CN108234485A (en) * 2017-12-30 2018-06-29 广东世纪网通信设备股份有限公司 Swindle vocal print acquisition device based on VOIP platforms and the methods, devices and systems that fraudulent call is intercepted using the device
CN108234485B (en) * 2017-12-30 2020-09-01 广东世纪网通信设备股份有限公司 VOIP platform-based fraud voiceprint acquisition device and method, device and system for intercepting fraud calls by using same
CN110010135A (en) * 2018-01-05 2019-07-12 北京搜狗科技发展有限公司 A kind of voice-based personal identification method, device and electronic equipment
CN110010135B (en) * 2018-01-05 2024-05-07 北京搜狗科技发展有限公司 Speech-based identity recognition method and device and electronic equipment
CN112784038A (en) * 2019-10-23 2021-05-11 阿里巴巴集团控股有限公司 Information identification method, system, computing device and storage medium
CN111429918A (en) * 2020-03-26 2020-07-17 云知声智能科技股份有限公司 Phone call fraud visiting method and system based on voiceprint recognition and intention analysis
CN113160831A (en) * 2021-04-14 2021-07-23 浙江百应科技有限公司 Voiceprint recognition-based outbound method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN106210239A (en) The maliciously automatic identifying method of caller's vocal print, device and mobile terminal
CN106341539A (en) Automatic evidence obtaining method of malicious caller voiceprint, apparatus and mobile terminal thereof
CN106201424B (en) A kind of information interacting method, device and electronic equipment
CN105940407B (en) System and method for assessing the intensity of audio password
CN108735209A (en) Wake up word binding method, smart machine and storage medium
CN110265040A (en) Training method, device, storage medium and the electronic equipment of sound-groove model
CN110853617B (en) Model training method, language identification method, device and equipment
CN112464661B (en) Model training method, voice conversation detection method and related equipment
US20150112680A1 (en) Method for Updating Voiceprint Feature Model and Terminal
CN110534099A (en) Voice wakes up processing method, device, storage medium and electronic equipment
CN108511002B (en) Method for recognizing sound signal of dangerous event, terminal and computer readable storage medium
CN110570840B (en) Intelligent device awakening method and device based on artificial intelligence
CN109302338A (en) Intelligent indicating risk method, mobile terminal and computer readable storage medium
CN109558512A (en) A kind of personalized recommendation method based on audio, device and mobile terminal
CN110890093A (en) Intelligent device awakening method and device based on artificial intelligence
CN108962241B (en) Position prompting method and device, storage medium and electronic equipment
CN110096611A (en) A kind of song recommendations method, mobile terminal and computer readable storage medium
CN110070863A (en) A kind of sound control method and device
CN109903773A (en) Audio-frequency processing method, device and storage medium
CN110544468B (en) Application awakening method and device, storage medium and electronic equipment
CN107104994A (en) Audio recognition method, electronic installation and speech recognition system
CN109545221A (en) Parameter regulation means, mobile terminal and computer readable storage medium
CN108597512A (en) Method for controlling mobile terminal, mobile terminal and computer readable storage medium
CN111522592A (en) Intelligent terminal awakening method and device based on artificial intelligence
CN107403623A (en) Store method, terminal, Cloud Server and the readable storage medium storing program for executing of recording substance

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20170721

Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801

Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant before: Beijing Qihu Technology Co., Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170118