Summary of the invention
In order to solve the above technical problems, the present invention provides a kind of harassing call prevention side based on biological identification technology
Case, the scheme apply biological identification technology to effectively guard against harassing call.
An embodiment according to the present invention provides a kind of harassing call prevention method based on biological identification technology, comprising:
Receive dial request;Receive the biological information of dialing people;Judge that the biological information whether there is in being dialed people
Blacklist in;If YES, then refuse the dial request;If NO, then dialing is connected.
In an embodiment of the present invention, which is iris information.
In another embodiment of the invention, which is finger print information.
In another embodiment of the present invention, which is face information.
In one more embodiment of the present invention, which is human ear information.
In another embodiment of the invention, which is palm print information.
In another embodiment of the present invention, which is acoustic information.
In one more embodiment of the present invention, which is venous information.
In another embodiment of the invention, which is handwriting information.
In another embodiment of the present invention, which is gene information.
In an embodiment of the present invention, if finding that the phone is harassing call after being dialed people's call, by the dialing
Blacklist is added in the telephone number of people and the map information of its biological information.
It in another embodiment of the invention, will if be dialed people's request deletes a dialing people from the blacklist
The telephone number of dialing people and the map information of its biological information remove blacklist.
An embodiment according to the present invention provides a kind of harassing call crime prevention system based on biological identification technology, comprising:
Receiving module, for receiving dial request;Receive the biological information of dialing people;And message processing module, it is used for: judgement
The biological information whether there is in the blacklist for being dialed people;If YES, then refuse the dial request;If it is
It is no, then connect dialing.
In an embodiment of the present invention, which is iris information.
In another embodiment of the invention, which is finger print information.
In another embodiment of the present invention, which is face information.
In one more embodiment of the present invention, which is human ear information.
In another embodiment of the invention, which is palm print information.
In another embodiment of the present invention, which is acoustic information.
In one more embodiment of the present invention, which is venous information.
In another embodiment of the invention, which is handwriting information.
In another embodiment of the present invention, which is gene information.
In an embodiment of the present invention, if finding that the phone is harassing call after being dialed people's call, by the dialing
Blacklist is added in the telephone number of people and the map information of its biological information.
It in another embodiment of the invention, will if be dialed people's request deletes a dialing people from the blacklist
The telephone number of dialing people and the map information of its biological information remove blacklist.
An embodiment according to the present invention provides a kind of computer readable storage medium for being stored with instruction, when the finger
Order is performed so that machine executes method as described above.
An embodiment according to the present invention provides a kind of computer system, including for executing method as described above
Device.
The harassing call prevention method based on biological identification technology and system of the application can effectively guard against harassing and wrecking electricity
Words, the harassing and wrecking for especially taking precautions against same people or mechanism change telephone number progress.
This general introduction is provided to introduce some concepts further described in detailed description below in simplified form.This
The key features or essential features for being not intended to mark claimed subject are summarized, are intended to be used to limit claimed
The range of theme.
Specific embodiment
To enable the above objects, features and advantages of the present invention more obvious and easy to understand, below in conjunction with attached drawing to the present invention
Specific embodiment elaborate.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, but the present invention can be with
It is different from other way described herein using other and implements, therefore the present invention is by the limit of following public specific embodiment
System.
The present invention provides harassing call prevention methods and system based on biological identification technology.
Biological identification technology is a kind of technology that authentication is carried out using human body biological characteristics.Specifically, the technology
It is intimately associated by the high-tech means such as computer and optics, acoustics, biosensor and biostatistics principle, utilizes human body
Intrinsic physiological property (fingerprint, face, iris etc.) and behavioural characteristic (person's handwriting, sound, gait etc.) is a to carry out
The identification of personal part.
Compared to traditional identity identifying method, including identity article (key, certificate, atm card etc.) and identity
It identifies knowledge (such as username and password), biological identification technology is more safe, secrecy and convenience.Biometrics identification technology
Have many advantages, such as to be not easy to forget, anti-counterfeit anti-theft performance is good, carry-on " carrying " and can use whenever and wherever possible.
Had already appeared the biological identification technologies of numerous species now, as fingerprint recognition, palmmprint (palm geometry) identification,
Iris recognition, recognition of face, voice recognition, signature recognition, gene identification etc..
Biological identification technology is used to disturb by the harassing call prevention method based on biological identification technology and system of the application
Phone prevention is disturbed, so that same people is not available different telephone numbers to make nuisance calls.Biological identification technology can be tied
It closes in different hardware devices, such as mobile phone, PC, hand-held device, dedicated Local or Remote acquisition equipment etc..This
Field technical staff is appreciated that the harassing call prevention method based on biological identification technology of the application and system can be combined
Into other hardware devices, as long as the hardware device can combine biological identification technology.The application based on bio-identification
The harassing call prevention method and system of technology can be applied by service organization (such as operator or other third-party institutions).At this
It in the embodiment of application, will be specifically illustrated by taking operator as an example, it will be appreciated by a person skilled in the art that the base of the application
Can be by different institutions or individual application in the harassing call prevention method and system of biological identification technology, and can be applied to difference
Scene.
Harassing call prevention method based on biological identification technology
It is intercepted in software in current harassing call, can only be stopped once to dial or labeled phone number by harassing and wrecking people
Code, and the harassing and wrecking again of dialing people can not be stopped, because different telephone numbers can be used in dialing people.For example, dialing people
It can be harassed by the random telephone signal number that phone number Mass production device generates.The application based on biological identification technology
Harassing call prevention method for this technical problem come based on biological identification technology carry out harassing call prevention.
Fig. 1 shows the process of the harassing call prevention method according to an embodiment of the invention based on biological identification technology
Figure 100.
102, dial request is received.In the scene to dial using mobile phone, dial request is received by operator.?
In other different scenes, dial request can be received by the different third-party institutions.
104, the biological information of dialing people is received.In the scene using mobile phone, it may be in response to receive dialing
It requests and passes through the biological information that mobile phone acquires dialing people, finger print information, face information etc..Using dedicated acquisition
In the scene of equipment, the other biological characteristic information of dialing people can be acquired, such as iris information, palm print information, human ear information, quiet
Arteries and veins information, acoustic information, handwriting information, gene information etc..
106, judge that the biological information whether there is in the blacklist for being dialed people.It is dialed for each
Its corresponding blacklist is preserved in people, operation commercial city.In the blacklist, different dialed numbers and biological information are preserved
Mapping relations.In another embodiment, being dialed people can be reserved for the blacklist for having oneself, and operator has the right to transfer the black name
It is single.Alternatively, other third-party institutions, which can be reserved for, each blacklist for being dialed people, and operator has the right to transfer the black name
It is single.Optionally, which is storable at operator or other third-party institutions, for user sharing.
It will be understood by those skilled in the art that blacklist not necessarily exists with sheet format, it is also possible to mark, and
The label can be shared in many ways.
Equally, it will be understood by those skilled in the art that white list also can be used in the technical solution of the application.Such as: it is counting
In calculation machine system, there are many softwares to be applied to black and white lists rule, operating system, firewall, antivirus software, mail system
System, application software etc..After blacklist enables, it is formulated into user's (or IP address, IP packet, mail, virus etc.) of blacklist no
It can pass through.If setting up white list, user's (or IP address, IP packet, mail etc.) in white list can preferentially pass through, peace
Full property and agility all greatly improve.
The difference of white list and blacklist is: the user that can pass through is arranged in white list, and the user other than white list is not
It can pass through;And blacklist is the intransitable user of setting, the user other than blacklist can be transferred through.White list under normal circumstances
User than blacklist limitation is some more.
If judging that the biological information is present in really in the blacklist for being dialed people 106, dialled in 108 refusals
Number request.Alternatively, standby signal can be sent to the terminal for being dialed people, such as the standby signal can prompt to be dialed terminal
Directly refuse the calling, or chooses whether to refuse for being dialed people by being dialed terminal presentation prompt.
If judging that the biological information is not present in the blacklist for being dialed people 106, it is somebody's turn to do in 108 records
Dial the number of people and the map information of its biological information, and connects dialing.In another embodiment, the dialing recorded
The number of people and the map information of its biological information can be added in the white list for being dialed people.Similarly, the white name
List can be saved by being dialed people, operator or the third-party institution.
Optionally, if finding that the phone, can should for harassing call after being dialed people and strange dialing people call
Blacklist is added in the telephone number and its biological information of dialing people.
It optionally, can be by the phone of dialing people if be dialed people's request deletes a dialing people from blacklist
Number and its biological information remove blacklist.
The process of Fig. 2 shows the according to another embodiment of the present invention harassing call prevention method based on iris recognition technology
Figure 200.Iris recognition technology carries out identification based on the iris in eyes, is to produce in bio-identification related with eyes to people
The raw technology interfered less with.It uses relatively common camera component, and does not need user and be in contact with machine.For
For everyone, iris feature is unique, while also just determining the uniqueness of identification.
201, dialing human hair goes out dial request.
202, the iris of Carrier Requirements scanning dialing people, then by be combined with iris scan ability mobile phone or its
He arrives its iris information at equipment scanning.It is appreciated that with identification technology development, it is anticipated that its be incorporated in mobile device,
A possibility that on hand-held device or other equipment and application scenarios can be more and more and increasingly wider.
203, iris information is returned into operator.
204, judge that this iris information whether there is in the blacklist for being dialed people by operator.If sentenced 204
The iris information of breaking is present in really in the blacklist for being dialed people, then refuses dial request 205.It alternatively, can be to being dialled
Number people pops up dialog box, inquires whether it refuses the dial request.
If judging that the iris information is not present in the blacklist for being dialed people 204, puts through and be dialed 206
The telephone plant of people.208, it is dialed people and dialing people's call.
Optionally, if being dialed people after 208 calls thinks that the phone is harassing call, requesting 209 will
Blacklist is added in the telephone number.210, iris information corresponding to operator's enquiring telephone number, by telephone number and rainbow
Blacklist is added in the corresponding map information of film information.
Optionally, want a certain telephone number removing blacklist if being dialed people, request 211 by the phone
Number removes blacklist.212, iris information corresponding to operator's enquiring telephone number, by telephone number and iris information
Corresponding map information remove blacklist.
Fig. 3 shows the process of the harassing call prevention method based on fingerprint identification technology of another embodiment according to the present invention
Figure 30 0.Fingerprint recognition is a kind of most commonly used biological identification technology of current application, easy to use, high reliablity.Realization refers to
There are many methods for line identification.Some of them is to compare the local detail of fingerprint;Some are directly identified by whole features;Also
There is the more unique method of some uses, such as the edges corrugated mode and ultrasonic wave of fingerprint.It is appreciated that the application based on fingerprint
The harassing call prevention method of identification technology can be realized with any in all fingerprint identification methods.
301, dialing human hair goes out dial request.
302, the fingerprint of Carrier Requirements scanning dialing people, then by be combined with finger scan ability mobile phone or its
He arrives its finger print information at equipment scanning.
303, finger print information is returned into operator.
304, judge that this finger print information whether there is in the blacklist for being dialed people by operator.If sentenced 304
The finger print information that breaks is present in really in the blacklist for being dialed people, then refuses dial requests 305.It alternatively, can be to being dialled
Number people pops up dialog box, inquires whether it refuses the dial request.
If judging that the finger print information is not present in the blacklist for being dialed people 304, puts through and be dialed 306
The telephone plant of people.308, it is dialed people and dialing people's call.
Optionally, if being dialed people after 308 calls thinks that the phone is harassing call, requesting 309 will
Blacklist is added in the telephone number.310, finger print information corresponding to operator's enquiring telephone number by telephone number and refers to
Blacklist is added in the corresponding map information of line information.
Optionally, want a certain telephone number removing blacklist if being dialed people, request 311 by the phone
Number removes blacklist.312, finger print information corresponding to operator's enquiring telephone number, by telephone number and finger print information
Corresponding map information remove blacklist.
Fig. 4 shows the process of the harassing call prevention method based on face recognition technology according to yet another embodiment of the invention
Figure 40 0.Face recognition technology refers to the technology or system that identity validation or identity finder are carried out by face.Face recognition technology
Face feature based on people, i.e., the position of each face, size and each major facial organ location information, pointedly analyze
The facial image inputted perhaps video flowing to identify the identity of each face in image or video flowing.
401, dialing human hair goes out dial request.
402, the face of Carrier Requirements scanning dialing people, then by be combined with human face scanning ability mobile phone or its
He arrives its face information at equipment scanning.It is appreciated that with identification technology development, it is anticipated that its be incorporated in mobile device,
A possibility that on hand-held device or other equipment and application scenarios can be more and more and increasingly wider.
403, face information is returned into operator.
404, judge that this face information whether there is in the blacklist for being dialed people by operator.If sentenced 404
The face information of breaking is present in really in the blacklist for being dialed people, then refuses dial request 405.It alternatively, can be to being dialled
Number people pops up dialog box, inquires whether it refuses the dial request.
If judging that the face information is not present in the blacklist for being dialed people 404, puts through and be dialed 406
The telephone plant of people.408, it is dialed people and dialing people's call.
Optionally, if being dialed people after 408 calls thinks that the phone is harassing call, requesting 409 will
Blacklist is added in the telephone number.410, face information corresponding to operator's enquiring telephone number, by telephone number and people
Blacklist is added in the corresponding map information of face information.
Optionally, want a certain telephone number removing blacklist if being dialed people, request 411 by the phone
Number removes blacklist.412, face information corresponding to operator's enquiring telephone number, by telephone number and face information
Corresponding map information remove blacklist.
Fig. 5 shows the process of the harassing call prevention method according to another embodiment of the present invention based on voice recognition technology
Figure 50 0.Voice recognition is exactly the technology identified by the physical characteristic for analyzing the sound of user.But due to sensing
The limitation of device and the changeability of voice sound itself, the uniqueness of identification is not enough.It will be understood by those skilled in the art that with
The harassing call prevention method based on voice recognition technology of the development of voice recognition technology, the application can be known using various sound
Other technology is realized.
501, dialing human hair goes out dial request.
502, the sound of Carrier Requirements record dialing people, then by mobile phone or be combined with SoundRec ability its
Its acoustic information is recorded in his equipment.
503, acoustic information is returned into operator.
504, judge that this acoustic information whether there is in the blacklist for being dialed people by operator.If sentenced 504
The acoustic information that breaks is present in really in the blacklist for being dialed people, then refuses dial requests 505.It alternatively, can be to being dialled
Number people pops up dialog box, inquires whether it refuses the dial request.
If judging that the acoustic information is not present in the blacklist for being dialed people 504, puts through and be dialed 506
The telephone plant of people.508, it is dialed people and dialing people's call.
Optionally, if being dialed people after 508 calls thinks that the phone is harassing call, requesting 509 will
Blacklist is added in the telephone number.510, acoustic information corresponding to operator's enquiring telephone number, by telephone number and sound
Blacklist is added in the corresponding map information of message breath.
Optionally, want a certain telephone number removing blacklist if being dialed people, request 511 by the phone
Number removes blacklist.512, acoustic information corresponding to operator's enquiring telephone number, by telephone number and acoustic information
Corresponding map information remove blacklist.
The harassing call prevention method based on biological identification technology of the application is also based on other biological identification technology
It realizes, such as ear recognition technology, personal recognition (palm geometry) technology, vein identification technology, person's handwriting identification technology, appearance
State identification technology, gene identification technology etc..
It only gives a few examples herein.Vein identification technology is that personal vein distribution map is read by using near infrared ray, and is deposited
The vein pattern of storage compares, the identification technology of Lai Jinhang person identification.Palm geometry identification technology is used by measurement
The physical features of the palm of person and finger identify, or even can also identify 3-D image.Palm geometry identification technology
Not only performance is good, but also using more convenient.
Various bio-identification skills can be used in the harassing call prevention method based on biological identification technology of the application
Art is realized.It will be understood by those skilled in the art that with the development and diversification of biological identification technology, the application based on life
The application of the harassing call prevention method of object identification technology also can be diversified therewith.
Fig. 6 shows the block diagram of the harassing call crime prevention system according to an embodiment of the invention based on biological identification technology
600。
Receiving module 602 is for receiving dial request.In the scene to be dialled using mobile phone, is received and dialled by operator
Number request.In other different scenes, dial request can be received by the different third-party institutions.
Receiving module 602 is further used for receiving the biological information of dialing people.It is set using mobile phone or other acquisitions
In standby scene, the biological information of dialing people, such as finger print information, face information, iris information, palmmprint letter can be acquired
Breath, human ear information, venous information, acoustic information, handwriting information, gene information etc..
Message processing module 604 is for judging that biological information whether there is in the blacklist for being dialed people.For
Each to be dialed people, its corresponding blacklist is preserved in operation commercial city.In the blacklist, different dialed numbers and biology are preserved
The mapping relations of characteristic information.In another embodiment, being dialed people can be reserved for the blacklist for having oneself, and operator has the right to adjust
Take the blacklist.Alternatively, other third-party institutions, which can be reserved for, each blacklist for being dialed people, and operator has the right to transfer
The blacklist.
Message processing module 604 generates different outputs based on the judgement to the biological information.If information processing mould
Block 604 judges that the biological information is present in really in the blacklist for being dialed people, then operator can be made to refuse the dialing and asked
It asks.Alternatively, can send standby signal to the terminal for being dialed people, for example, the standby signal can prompt to be dialed terminal it is direct
Refuse the calling, or chooses whether to refuse for being dialed people by being dialed terminal presentation prompt
If message processing module 604 judges that the biological information is not present in the blacklist for being dialed people,
Operator is set to dial.
In another embodiment, the number of dialing people recorded can be added with the map information of its biological information
Into the white list for being dialed people.Similarly, which can be saved by being dialed people, operator or the third-party institution.
Optionally, if finding the phone for harassing call, at information after being dialed people and strange dialing people call
Blacklist can be added for the telephone number of dialing people and its biological information by managing module 604.
Optionally, if be dialed people's request deletes a dialing people from blacklist, message processing module 604 should
The telephone number and its biological information of dialing people removes blacklist.
Equally, various biologies can be used to know for the harassing call crime prevention system based on biological identification technology of the application
Other technology is realized.It will be understood by those skilled in the art that with the development and diversification of biological identification technology, the base of the application
It also can be diversified therewith in the application of the harassing call crime prevention system of biological identification technology.
The each step and module of harassing call prevention method and system described above based on biological identification technology can
With with hardware, software, or combinations thereof realize.If realized within hardware, in conjunction with the present invention describe various illustrative steps,
Module and circuit can use general processor, digital signal processor (DSP), specific integrated circuit (ASIC), field-programmable
Gate array (FPGA) or other programmable logic components, hardware component, or any combination thereof realize or execute.General procedure
Device can be processor, microprocessor, controller, microcontroller or state machine etc..If realized in software, in conjunction with this
The various illustrative steps of invention description, module can be used as one or more instruction or code is stored in computer-readable medium
Above or it is transmitted.Realize that the software module of various operations of the invention can reside in storage medium, as RAM, flash memory, ROM,
EPROM, EEPROM, register, hard disk, removable disk, CD-ROM, cloud storage etc..Storage medium can be coupled to processor so that
Obtaining the processor can be from/to the storage medium reading writing information, and executes corresponding program module to realize each step of the invention
Suddenly.Moreover, software-based embodiment can be uploaded, download or remotely be accessed by means of communication appropriate.It is this suitable
When means of communication include for example internet, WWW, Intranet, software application, cable (including fiber optic cables), magnetic communication,
Electromagnetic communication (including RF, microwave and infrared communication), electronic communication or other such means of communication.
It shall yet further be noted that these embodiments are probably as the process for being depicted as flow chart, flow graph, structure chart or block diagram
Come what is described.Although all operations may be described as sequential process by flow chart, many of these operations operation can
It executes parallel or concurrently.In addition, the order of these operations can be rearranged.
Disclosed methods, devices and systems should not be limited in any way.On the contrary, the present invention cover it is various disclosed
Embodiment (individually and various combinations with one another and sub-portfolio) all novel and non-obvious feature and aspects.Institute is public
The methods, devices and systems opened are not limited to any specific aspect or feature or their combination, disclosed any embodiment
It does not require the existence of any one or more specific advantages or solves specific or all technical problems.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Change, these are within the scope of the present invention.