CN109451169A - Harassing call prevention method and system based on biological identification technology - Google Patents

Harassing call prevention method and system based on biological identification technology Download PDF

Info

Publication number
CN109451169A
CN109451169A CN201811459660.0A CN201811459660A CN109451169A CN 109451169 A CN109451169 A CN 109451169A CN 201811459660 A CN201811459660 A CN 201811459660A CN 109451169 A CN109451169 A CN 109451169A
Authority
CN
China
Prior art keywords
information
people
blacklist
dialing
dialed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811459660.0A
Other languages
Chinese (zh)
Inventor
李鹏飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811459660.0A priority Critical patent/CN109451169A/en
Publication of CN109451169A publication Critical patent/CN109451169A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/663Preventing unauthorised calls to a telephone set
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

This application provides a kind of harassing call prevention method and system based on biological identification technology.The harassing call prevention method based on biological identification technology includes: reception dial request;Receive the biological information of dialing people;Judge that the biological information whether there is in the blacklist for being dialed people;If YES, then refuse the dial request;If NO, then dialing is connected.

Description

Harassing call prevention method and system based on biological identification technology
Technical field
Present application relates generally to mobile phone safes more particularly to harassing call to take precautions against.
Background technique
In daily life, all kinds of harassing calls explode mobile phone, allow people to can't bear it and disturb.In all harassing calls, business Marketing class harassing call accounts for very big specific gravity, is generally concentrated at the sales industry such as insurance, financing, house property, educational training.
In order to cope with the problem of making nuisance calls, there are many harassing calls and intercept software.These softwares are usually to pass through to set Black and white lists are set to realize and intercept, that is, intercept the telephone number for being added into blacklist.It is shared usually also to have phone label, that is, accuses Know that the strange phone of user is marked as the number or percentage of harassing call, so that user can be directed to same phone number The harassing and wrecking of code are intercepted.Telephone number can also be subdivided into intermediary, express delivery, food delivery, advertisement, distribution, financing, guarantor by this label Danger, training etc..
But in current harassing call precautionary scheme, the telephone number once dialed can only be stopped by harassing and wrecking people, And the harassing and wrecking again of dialing people can not be stopped, because different telephone numbers can be used in dialing people.For example, dialing people Ke Tong The random telephone signal number of phone number Mass production device generation is crossed to be harassed.
Therefore, in mobile phone safe field, need one kind that can effectively guard against harassing call, especially take precautions against same people Or the method and system of the harassing and wrecking of mechanism change telephone number progress.
Summary of the invention
In order to solve the above technical problems, the present invention provides a kind of harassing call prevention side based on biological identification technology Case, the scheme apply biological identification technology to effectively guard against harassing call.
An embodiment according to the present invention provides a kind of harassing call prevention method based on biological identification technology, comprising: Receive dial request;Receive the biological information of dialing people;Judge that the biological information whether there is in being dialed people Blacklist in;If YES, then refuse the dial request;If NO, then dialing is connected.
In an embodiment of the present invention, which is iris information.
In another embodiment of the invention, which is finger print information.
In another embodiment of the present invention, which is face information.
In one more embodiment of the present invention, which is human ear information.
In another embodiment of the invention, which is palm print information.
In another embodiment of the present invention, which is acoustic information.
In one more embodiment of the present invention, which is venous information.
In another embodiment of the invention, which is handwriting information.
In another embodiment of the present invention, which is gene information.
In an embodiment of the present invention, if finding that the phone is harassing call after being dialed people's call, by the dialing Blacklist is added in the telephone number of people and the map information of its biological information.
It in another embodiment of the invention, will if be dialed people's request deletes a dialing people from the blacklist The telephone number of dialing people and the map information of its biological information remove blacklist.
An embodiment according to the present invention provides a kind of harassing call crime prevention system based on biological identification technology, comprising: Receiving module, for receiving dial request;Receive the biological information of dialing people;And message processing module, it is used for: judgement The biological information whether there is in the blacklist for being dialed people;If YES, then refuse the dial request;If it is It is no, then connect dialing.
In an embodiment of the present invention, which is iris information.
In another embodiment of the invention, which is finger print information.
In another embodiment of the present invention, which is face information.
In one more embodiment of the present invention, which is human ear information.
In another embodiment of the invention, which is palm print information.
In another embodiment of the present invention, which is acoustic information.
In one more embodiment of the present invention, which is venous information.
In another embodiment of the invention, which is handwriting information.
In another embodiment of the present invention, which is gene information.
In an embodiment of the present invention, if finding that the phone is harassing call after being dialed people's call, by the dialing Blacklist is added in the telephone number of people and the map information of its biological information.
It in another embodiment of the invention, will if be dialed people's request deletes a dialing people from the blacklist The telephone number of dialing people and the map information of its biological information remove blacklist.
An embodiment according to the present invention provides a kind of computer readable storage medium for being stored with instruction, when the finger Order is performed so that machine executes method as described above.
An embodiment according to the present invention provides a kind of computer system, including for executing method as described above Device.
The harassing call prevention method based on biological identification technology and system of the application can effectively guard against harassing and wrecking electricity Words, the harassing and wrecking for especially taking precautions against same people or mechanism change telephone number progress.
This general introduction is provided to introduce some concepts further described in detailed description below in simplified form.This The key features or essential features for being not intended to mark claimed subject are summarized, are intended to be used to limit claimed The range of theme.
Detailed description of the invention
The above summary of the invention of the invention and following specific embodiment can obtain more preferably when reading in conjunction with the drawings Understanding.It should be noted that attached drawing is only used as the example of claimed invention.In the accompanying drawings, identical appended drawing reference Represent same or similar element.
Fig. 1 shows the process of the harassing call prevention method according to an embodiment of the invention based on biological identification technology Figure.
The process of Fig. 2 shows the according to another embodiment of the present invention harassing call prevention method based on iris recognition technology Figure.
Fig. 3 shows the process of the harassing call prevention method based on fingerprint identification technology of another embodiment according to the present invention Figure.
Fig. 4 shows the process of the harassing call prevention method based on face recognition technology according to yet another embodiment of the invention Figure.
Fig. 5 shows the process of the harassing call prevention method according to another embodiment of the present invention based on voice recognition technology Figure.
Fig. 6 shows the block diagram of the harassing call crime prevention system according to an embodiment of the invention based on biological identification technology.
Specific embodiment
To enable the above objects, features and advantages of the present invention more obvious and easy to understand, below in conjunction with attached drawing to the present invention Specific embodiment elaborate.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, but the present invention can be with It is different from other way described herein using other and implements, therefore the present invention is by the limit of following public specific embodiment System.
The present invention provides harassing call prevention methods and system based on biological identification technology.
Biological identification technology is a kind of technology that authentication is carried out using human body biological characteristics.Specifically, the technology It is intimately associated by the high-tech means such as computer and optics, acoustics, biosensor and biostatistics principle, utilizes human body Intrinsic physiological property (fingerprint, face, iris etc.) and behavioural characteristic (person's handwriting, sound, gait etc.) is a to carry out The identification of personal part.
Compared to traditional identity identifying method, including identity article (key, certificate, atm card etc.) and identity It identifies knowledge (such as username and password), biological identification technology is more safe, secrecy and convenience.Biometrics identification technology Have many advantages, such as to be not easy to forget, anti-counterfeit anti-theft performance is good, carry-on " carrying " and can use whenever and wherever possible.
Had already appeared the biological identification technologies of numerous species now, as fingerprint recognition, palmmprint (palm geometry) identification, Iris recognition, recognition of face, voice recognition, signature recognition, gene identification etc..
Biological identification technology is used to disturb by the harassing call prevention method based on biological identification technology and system of the application Phone prevention is disturbed, so that same people is not available different telephone numbers to make nuisance calls.Biological identification technology can be tied It closes in different hardware devices, such as mobile phone, PC, hand-held device, dedicated Local or Remote acquisition equipment etc..This Field technical staff is appreciated that the harassing call prevention method based on biological identification technology of the application and system can be combined Into other hardware devices, as long as the hardware device can combine biological identification technology.The application based on bio-identification The harassing call prevention method and system of technology can be applied by service organization (such as operator or other third-party institutions).At this It in the embodiment of application, will be specifically illustrated by taking operator as an example, it will be appreciated by a person skilled in the art that the base of the application Can be by different institutions or individual application in the harassing call prevention method and system of biological identification technology, and can be applied to difference Scene.
Harassing call prevention method based on biological identification technology
It is intercepted in software in current harassing call, can only be stopped once to dial or labeled phone number by harassing and wrecking people Code, and the harassing and wrecking again of dialing people can not be stopped, because different telephone numbers can be used in dialing people.For example, dialing people It can be harassed by the random telephone signal number that phone number Mass production device generates.The application based on biological identification technology Harassing call prevention method for this technical problem come based on biological identification technology carry out harassing call prevention.
Fig. 1 shows the process of the harassing call prevention method according to an embodiment of the invention based on biological identification technology Figure 100.
102, dial request is received.In the scene to dial using mobile phone, dial request is received by operator.? In other different scenes, dial request can be received by the different third-party institutions.
104, the biological information of dialing people is received.In the scene using mobile phone, it may be in response to receive dialing It requests and passes through the biological information that mobile phone acquires dialing people, finger print information, face information etc..Using dedicated acquisition In the scene of equipment, the other biological characteristic information of dialing people can be acquired, such as iris information, palm print information, human ear information, quiet Arteries and veins information, acoustic information, handwriting information, gene information etc..
106, judge that the biological information whether there is in the blacklist for being dialed people.It is dialed for each Its corresponding blacklist is preserved in people, operation commercial city.In the blacklist, different dialed numbers and biological information are preserved Mapping relations.In another embodiment, being dialed people can be reserved for the blacklist for having oneself, and operator has the right to transfer the black name It is single.Alternatively, other third-party institutions, which can be reserved for, each blacklist for being dialed people, and operator has the right to transfer the black name It is single.Optionally, which is storable at operator or other third-party institutions, for user sharing.
It will be understood by those skilled in the art that blacklist not necessarily exists with sheet format, it is also possible to mark, and The label can be shared in many ways.
Equally, it will be understood by those skilled in the art that white list also can be used in the technical solution of the application.Such as: it is counting In calculation machine system, there are many softwares to be applied to black and white lists rule, operating system, firewall, antivirus software, mail system System, application software etc..After blacklist enables, it is formulated into user's (or IP address, IP packet, mail, virus etc.) of blacklist no It can pass through.If setting up white list, user's (or IP address, IP packet, mail etc.) in white list can preferentially pass through, peace Full property and agility all greatly improve.
The difference of white list and blacklist is: the user that can pass through is arranged in white list, and the user other than white list is not It can pass through;And blacklist is the intransitable user of setting, the user other than blacklist can be transferred through.White list under normal circumstances User than blacklist limitation is some more.
If judging that the biological information is present in really in the blacklist for being dialed people 106, dialled in 108 refusals Number request.Alternatively, standby signal can be sent to the terminal for being dialed people, such as the standby signal can prompt to be dialed terminal Directly refuse the calling, or chooses whether to refuse for being dialed people by being dialed terminal presentation prompt.
If judging that the biological information is not present in the blacklist for being dialed people 106, it is somebody's turn to do in 108 records Dial the number of people and the map information of its biological information, and connects dialing.In another embodiment, the dialing recorded The number of people and the map information of its biological information can be added in the white list for being dialed people.Similarly, the white name List can be saved by being dialed people, operator or the third-party institution.
Optionally, if finding that the phone, can should for harassing call after being dialed people and strange dialing people call Blacklist is added in the telephone number and its biological information of dialing people.
It optionally, can be by the phone of dialing people if be dialed people's request deletes a dialing people from blacklist Number and its biological information remove blacklist.
The process of Fig. 2 shows the according to another embodiment of the present invention harassing call prevention method based on iris recognition technology Figure 200.Iris recognition technology carries out identification based on the iris in eyes, is to produce in bio-identification related with eyes to people The raw technology interfered less with.It uses relatively common camera component, and does not need user and be in contact with machine.For For everyone, iris feature is unique, while also just determining the uniqueness of identification.
201, dialing human hair goes out dial request.
202, the iris of Carrier Requirements scanning dialing people, then by be combined with iris scan ability mobile phone or its He arrives its iris information at equipment scanning.It is appreciated that with identification technology development, it is anticipated that its be incorporated in mobile device, A possibility that on hand-held device or other equipment and application scenarios can be more and more and increasingly wider.
203, iris information is returned into operator.
204, judge that this iris information whether there is in the blacklist for being dialed people by operator.If sentenced 204 The iris information of breaking is present in really in the blacklist for being dialed people, then refuses dial request 205.It alternatively, can be to being dialled Number people pops up dialog box, inquires whether it refuses the dial request.
If judging that the iris information is not present in the blacklist for being dialed people 204, puts through and be dialed 206 The telephone plant of people.208, it is dialed people and dialing people's call.
Optionally, if being dialed people after 208 calls thinks that the phone is harassing call, requesting 209 will Blacklist is added in the telephone number.210, iris information corresponding to operator's enquiring telephone number, by telephone number and rainbow Blacklist is added in the corresponding map information of film information.
Optionally, want a certain telephone number removing blacklist if being dialed people, request 211 by the phone Number removes blacklist.212, iris information corresponding to operator's enquiring telephone number, by telephone number and iris information Corresponding map information remove blacklist.
Fig. 3 shows the process of the harassing call prevention method based on fingerprint identification technology of another embodiment according to the present invention Figure 30 0.Fingerprint recognition is a kind of most commonly used biological identification technology of current application, easy to use, high reliablity.Realization refers to There are many methods for line identification.Some of them is to compare the local detail of fingerprint;Some are directly identified by whole features;Also There is the more unique method of some uses, such as the edges corrugated mode and ultrasonic wave of fingerprint.It is appreciated that the application based on fingerprint The harassing call prevention method of identification technology can be realized with any in all fingerprint identification methods.
301, dialing human hair goes out dial request.
302, the fingerprint of Carrier Requirements scanning dialing people, then by be combined with finger scan ability mobile phone or its He arrives its finger print information at equipment scanning.
303, finger print information is returned into operator.
304, judge that this finger print information whether there is in the blacklist for being dialed people by operator.If sentenced 304 The finger print information that breaks is present in really in the blacklist for being dialed people, then refuses dial requests 305.It alternatively, can be to being dialled Number people pops up dialog box, inquires whether it refuses the dial request.
If judging that the finger print information is not present in the blacklist for being dialed people 304, puts through and be dialed 306 The telephone plant of people.308, it is dialed people and dialing people's call.
Optionally, if being dialed people after 308 calls thinks that the phone is harassing call, requesting 309 will Blacklist is added in the telephone number.310, finger print information corresponding to operator's enquiring telephone number by telephone number and refers to Blacklist is added in the corresponding map information of line information.
Optionally, want a certain telephone number removing blacklist if being dialed people, request 311 by the phone Number removes blacklist.312, finger print information corresponding to operator's enquiring telephone number, by telephone number and finger print information Corresponding map information remove blacklist.
Fig. 4 shows the process of the harassing call prevention method based on face recognition technology according to yet another embodiment of the invention Figure 40 0.Face recognition technology refers to the technology or system that identity validation or identity finder are carried out by face.Face recognition technology Face feature based on people, i.e., the position of each face, size and each major facial organ location information, pointedly analyze The facial image inputted perhaps video flowing to identify the identity of each face in image or video flowing.
401, dialing human hair goes out dial request.
402, the face of Carrier Requirements scanning dialing people, then by be combined with human face scanning ability mobile phone or its He arrives its face information at equipment scanning.It is appreciated that with identification technology development, it is anticipated that its be incorporated in mobile device, A possibility that on hand-held device or other equipment and application scenarios can be more and more and increasingly wider.
403, face information is returned into operator.
404, judge that this face information whether there is in the blacklist for being dialed people by operator.If sentenced 404 The face information of breaking is present in really in the blacklist for being dialed people, then refuses dial request 405.It alternatively, can be to being dialled Number people pops up dialog box, inquires whether it refuses the dial request.
If judging that the face information is not present in the blacklist for being dialed people 404, puts through and be dialed 406 The telephone plant of people.408, it is dialed people and dialing people's call.
Optionally, if being dialed people after 408 calls thinks that the phone is harassing call, requesting 409 will Blacklist is added in the telephone number.410, face information corresponding to operator's enquiring telephone number, by telephone number and people Blacklist is added in the corresponding map information of face information.
Optionally, want a certain telephone number removing blacklist if being dialed people, request 411 by the phone Number removes blacklist.412, face information corresponding to operator's enquiring telephone number, by telephone number and face information Corresponding map information remove blacklist.
Fig. 5 shows the process of the harassing call prevention method according to another embodiment of the present invention based on voice recognition technology Figure 50 0.Voice recognition is exactly the technology identified by the physical characteristic for analyzing the sound of user.But due to sensing The limitation of device and the changeability of voice sound itself, the uniqueness of identification is not enough.It will be understood by those skilled in the art that with The harassing call prevention method based on voice recognition technology of the development of voice recognition technology, the application can be known using various sound Other technology is realized.
501, dialing human hair goes out dial request.
502, the sound of Carrier Requirements record dialing people, then by mobile phone or be combined with SoundRec ability its Its acoustic information is recorded in his equipment.
503, acoustic information is returned into operator.
504, judge that this acoustic information whether there is in the blacklist for being dialed people by operator.If sentenced 504 The acoustic information that breaks is present in really in the blacklist for being dialed people, then refuses dial requests 505.It alternatively, can be to being dialled Number people pops up dialog box, inquires whether it refuses the dial request.
If judging that the acoustic information is not present in the blacklist for being dialed people 504, puts through and be dialed 506 The telephone plant of people.508, it is dialed people and dialing people's call.
Optionally, if being dialed people after 508 calls thinks that the phone is harassing call, requesting 509 will Blacklist is added in the telephone number.510, acoustic information corresponding to operator's enquiring telephone number, by telephone number and sound Blacklist is added in the corresponding map information of message breath.
Optionally, want a certain telephone number removing blacklist if being dialed people, request 511 by the phone Number removes blacklist.512, acoustic information corresponding to operator's enquiring telephone number, by telephone number and acoustic information Corresponding map information remove blacklist.
The harassing call prevention method based on biological identification technology of the application is also based on other biological identification technology It realizes, such as ear recognition technology, personal recognition (palm geometry) technology, vein identification technology, person's handwriting identification technology, appearance State identification technology, gene identification technology etc..
It only gives a few examples herein.Vein identification technology is that personal vein distribution map is read by using near infrared ray, and is deposited The vein pattern of storage compares, the identification technology of Lai Jinhang person identification.Palm geometry identification technology is used by measurement The physical features of the palm of person and finger identify, or even can also identify 3-D image.Palm geometry identification technology Not only performance is good, but also using more convenient.
Various bio-identification skills can be used in the harassing call prevention method based on biological identification technology of the application Art is realized.It will be understood by those skilled in the art that with the development and diversification of biological identification technology, the application based on life The application of the harassing call prevention method of object identification technology also can be diversified therewith.
Fig. 6 shows the block diagram of the harassing call crime prevention system according to an embodiment of the invention based on biological identification technology 600。
Receiving module 602 is for receiving dial request.In the scene to be dialled using mobile phone, is received and dialled by operator Number request.In other different scenes, dial request can be received by the different third-party institutions.
Receiving module 602 is further used for receiving the biological information of dialing people.It is set using mobile phone or other acquisitions In standby scene, the biological information of dialing people, such as finger print information, face information, iris information, palmmprint letter can be acquired Breath, human ear information, venous information, acoustic information, handwriting information, gene information etc..
Message processing module 604 is for judging that biological information whether there is in the blacklist for being dialed people.For Each to be dialed people, its corresponding blacklist is preserved in operation commercial city.In the blacklist, different dialed numbers and biology are preserved The mapping relations of characteristic information.In another embodiment, being dialed people can be reserved for the blacklist for having oneself, and operator has the right to adjust Take the blacklist.Alternatively, other third-party institutions, which can be reserved for, each blacklist for being dialed people, and operator has the right to transfer The blacklist.
Message processing module 604 generates different outputs based on the judgement to the biological information.If information processing mould Block 604 judges that the biological information is present in really in the blacklist for being dialed people, then operator can be made to refuse the dialing and asked It asks.Alternatively, can send standby signal to the terminal for being dialed people, for example, the standby signal can prompt to be dialed terminal it is direct Refuse the calling, or chooses whether to refuse for being dialed people by being dialed terminal presentation prompt
If message processing module 604 judges that the biological information is not present in the blacklist for being dialed people, Operator is set to dial.
In another embodiment, the number of dialing people recorded can be added with the map information of its biological information Into the white list for being dialed people.Similarly, which can be saved by being dialed people, operator or the third-party institution.
Optionally, if finding the phone for harassing call, at information after being dialed people and strange dialing people call Blacklist can be added for the telephone number of dialing people and its biological information by managing module 604.
Optionally, if be dialed people's request deletes a dialing people from blacklist, message processing module 604 should The telephone number and its biological information of dialing people removes blacklist.
Equally, various biologies can be used to know for the harassing call crime prevention system based on biological identification technology of the application Other technology is realized.It will be understood by those skilled in the art that with the development and diversification of biological identification technology, the base of the application It also can be diversified therewith in the application of the harassing call crime prevention system of biological identification technology.
The each step and module of harassing call prevention method and system described above based on biological identification technology can With with hardware, software, or combinations thereof realize.If realized within hardware, in conjunction with the present invention describe various illustrative steps, Module and circuit can use general processor, digital signal processor (DSP), specific integrated circuit (ASIC), field-programmable Gate array (FPGA) or other programmable logic components, hardware component, or any combination thereof realize or execute.General procedure Device can be processor, microprocessor, controller, microcontroller or state machine etc..If realized in software, in conjunction with this The various illustrative steps of invention description, module can be used as one or more instruction or code is stored in computer-readable medium Above or it is transmitted.Realize that the software module of various operations of the invention can reside in storage medium, as RAM, flash memory, ROM, EPROM, EEPROM, register, hard disk, removable disk, CD-ROM, cloud storage etc..Storage medium can be coupled to processor so that Obtaining the processor can be from/to the storage medium reading writing information, and executes corresponding program module to realize each step of the invention Suddenly.Moreover, software-based embodiment can be uploaded, download or remotely be accessed by means of communication appropriate.It is this suitable When means of communication include for example internet, WWW, Intranet, software application, cable (including fiber optic cables), magnetic communication, Electromagnetic communication (including RF, microwave and infrared communication), electronic communication or other such means of communication.
It shall yet further be noted that these embodiments are probably as the process for being depicted as flow chart, flow graph, structure chart or block diagram Come what is described.Although all operations may be described as sequential process by flow chart, many of these operations operation can It executes parallel or concurrently.In addition, the order of these operations can be rearranged.
Disclosed methods, devices and systems should not be limited in any way.On the contrary, the present invention cover it is various disclosed Embodiment (individually and various combinations with one another and sub-portfolio) all novel and non-obvious feature and aspects.Institute is public The methods, devices and systems opened are not limited to any specific aspect or feature or their combination, disclosed any embodiment It does not require the existence of any one or more specific advantages or solves specific or all technical problems.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Change, these are within the scope of the present invention.

Claims (10)

1. a kind of harassing call prevention method based on biological identification technology, comprising:
Receive dial request;
Receive the biological information of dialing people;
Judge that the biological information whether there is in the blacklist for being dialed people;
If YES, then refuse the dial request;
If NO, then dialing is connected.
2. the method as described in claim 1, which is characterized in that the biological information is iris information, finger print information, people Face information, human ear information, palm print information, acoustic information, venous information, handwriting information, and/or gene information.
3. the method as described in claim 1, which is characterized in that if described be dialed after people converses finds the phone for harassing and wrecking Then the blacklist is added in the map information of the telephone number of the dialing people and its biological information by phone.
4. the method as described in claim 1, which is characterized in that if it is described be dialed people request deleted from the blacklist The map information of the telephone number of the dialing people and its biological information is then removed the blacklist by one dialing people.
5. a kind of harassing call crime prevention system based on biological identification technology, comprising:
Receiving module is used for:
Receive dial request;
Receive the biological information of dialing people;
Message processing module is used for:
Judge that the biological information whether there is in the blacklist for being dialed people;
If YES, then refuse the dial request;
If NO, then dialing is connected.
6. system as claimed in claim 5, which is characterized in that the biological information is iris information, finger print information, people Face information, human ear information, palm print information, acoustic information, venous information, handwriting information, and/or gene information.
7. system as claimed in claim 5, which is characterized in that if described be dialed after people converses finds the phone for harassing and wrecking Then the blacklist is added in the map information of the telephone number of the dialing people and its biological information by phone.
8. system as claimed in claim 5, which is characterized in that if it is described be dialed people request deleted from the blacklist The map information of the telephone number of the dialing people and its biological information is then removed the blacklist by one dialing people.
9. a kind of computer readable storage medium for being stored with instruction makes machine execute such as right when executed It is required that method described in any one of 1-4.
10. a kind of computer system, including for executing the device such as method of any of claims 1-4.
CN201811459660.0A 2018-11-30 2018-11-30 Harassing call prevention method and system based on biological identification technology Pending CN109451169A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811459660.0A CN109451169A (en) 2018-11-30 2018-11-30 Harassing call prevention method and system based on biological identification technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811459660.0A CN109451169A (en) 2018-11-30 2018-11-30 Harassing call prevention method and system based on biological identification technology

Publications (1)

Publication Number Publication Date
CN109451169A true CN109451169A (en) 2019-03-08

Family

ID=65556047

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811459660.0A Pending CN109451169A (en) 2018-11-30 2018-11-30 Harassing call prevention method and system based on biological identification technology

Country Status (1)

Country Link
CN (1) CN109451169A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011045604A2 (en) * 2009-10-13 2011-04-21 Arona Limited Call handling
CN204733229U (en) * 2015-06-15 2015-10-28 胡海涛 A kind of communicator by biometrics identification technology display of calling personal information
CN105072296A (en) * 2015-08-28 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Method, device and system for marking conversation caller
CN105338157A (en) * 2014-07-29 2016-02-17 小米科技有限责任公司 Nuisance call processing method, and device and telephone
CN106993080A (en) * 2017-04-20 2017-07-28 努比亚技术有限公司 Call request processing unit and method
CN108347730A (en) * 2017-01-25 2018-07-31 中兴通讯股份有限公司 A kind of wireless communication process method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011045604A2 (en) * 2009-10-13 2011-04-21 Arona Limited Call handling
CN105338157A (en) * 2014-07-29 2016-02-17 小米科技有限责任公司 Nuisance call processing method, and device and telephone
CN204733229U (en) * 2015-06-15 2015-10-28 胡海涛 A kind of communicator by biometrics identification technology display of calling personal information
CN105072296A (en) * 2015-08-28 2015-11-18 宇龙计算机通信科技(深圳)有限公司 Method, device and system for marking conversation caller
CN108347730A (en) * 2017-01-25 2018-07-31 中兴通讯股份有限公司 A kind of wireless communication process method and device
CN106993080A (en) * 2017-04-20 2017-07-28 努比亚技术有限公司 Call request processing unit and method

Similar Documents

Publication Publication Date Title
US11704939B2 (en) Liveness detection
CN108804884B (en) Identity authentication method, identity authentication device and computer storage medium
JP2022532677A (en) Identity verification and management system
CN104376011B (en) Realize method for secret protection and device
CN104540129B (en) The registering and logging method and system of third-party application
CN103295129B (en) The method that circumstantial evidence formula fingerprint pays is realized on mobile phone
US20130290229A1 (en) Gripping-feature learning authentication system and gripping-feature learning authentication method
CN109120605A (en) Authentication and account information variation and device
JP4544026B2 (en) Imaging device, portable terminal
WO2017201874A1 (en) Method and apparatus for prompting loss of terminal
CN106992956A (en) A kind of methods, devices and systems for realizing inter-device authentication
CN108363939B (en) Characteristic image acquisition method and device and user authentication method
CN109522695A (en) Application program login method, computer end, mobile terminal, system and storage medium
CN106161406B (en) The method and apparatus for obtaining user account
US20200019968A1 (en) System and method for authenticating transactions from a mobile device
CN112313661A (en) Method for verifying user identity and electronic equipment
CN108108605A (en) Approaches to IM and device
CN110417710A (en) Attack data capture method, device and storage medium
CN110443740A (en) A kind of identity identifying method and system
Vittori Ultimate password: is voice the best biometric to beat hackers?
WO2021244471A1 (en) Real-name authentication method and device
CN106980836A (en) Auth method and device
CN109451169A (en) Harassing call prevention method and system based on biological identification technology
EP4047866A1 (en) Information processing system, information processing method, program, and user interface
US11983964B2 (en) Liveness detection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40005614

Country of ref document: HK

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190308