CN104639770A - Telephone reporting method, device and system based on mobile terminal - Google Patents

Telephone reporting method, device and system based on mobile terminal Download PDF

Info

Publication number
CN104639770A
CN104639770A CN201410828561.0A CN201410828561A CN104639770A CN 104639770 A CN104639770 A CN 104639770A CN 201410828561 A CN201410828561 A CN 201410828561A CN 104639770 A CN104639770 A CN 104639770A
Authority
CN
China
Prior art keywords
telephone
recording
server
mobile terminal
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410828561.0A
Other languages
Chinese (zh)
Inventor
镡云宇
范国峰
谢冉
米晓彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201410828561.0A priority Critical patent/CN104639770A/en
Publication of CN104639770A publication Critical patent/CN104639770A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a telephone reporting method, a telephone reporting device and a telephone reporting system based on a mobile terminal. The method comprises the following steps: acquiring a telephone number ciphertext of the mobile terminal where an incoming client is positioned, and sending the telephone number ciphertext to a server for identification; receiving an identification result which is fed back by the server and represents that the telephone number is a suspicious number, and when the mobile terminal is connected to the telephone number, starting to record telephone audios of the mobile terminal; when the communication between the mobile terminal and the telephone number is ended, sending a recorded telephone audio ciphertext to the server. According to the method, the problem of report dispute caused by a fact that a report evidence cannot be provided in an existing telephone report method based on the mobile terminal is solved, and telephone real evidence reporting is realized.

Description

Telephone reporting method, device and system based on mobile terminal
Technical Field
The invention relates to the technical field of computers and communication, in particular to a telephone reporting method, device and system based on a mobile terminal.
Background
With the development of science and technology and the increasing living standard of people, the telecommunication business of China is developed very rapidly. However, while the telecommunications industry has been rapidly developing, various criminal activities that are facilitated by modern communication technologies and settlement methods have become rampant.
At present, telephone fraud measures are more and more, and many people are disadvantaged, and fraud activities are mainly disclosed through media and social propaganda aiming at the telephone fraud at present, so that people are enabled to be alert to achieve the prevention effect, and the mode is excessively dependent on subjective judgment of people, so that the telephone fraud is not particularly easy to distinguish.
The existing telephone reporting method based on the mobile terminal reports telephone numbers such as harassing calls, fraud calls and the like which are self-thought by users, and the reporting process only simply sends the telephone numbers to a reporting center and other server terminals, so that reporting evidence cannot be provided. The reporting result is greatly influenced by the subjectivity of the user, the situation of unrealistic reporting is easily caused, and a reporting dispute is easily generated.
Disclosure of Invention
In view of the above-mentioned problem that the existing telephone reporting method based on mobile terminal cannot provide reporting evidence when performing telephone reporting, so as to generate reporting disputes, the present invention is proposed to provide a telephone reporting method, apparatus and system based on mobile terminal, which overcome the above-mentioned problem or at least partially solve the above-mentioned problem.
According to another aspect of the present invention, there is provided a telephone reporting method based on a mobile terminal, including:
acquiring a telephone number ciphertext of a mobile terminal where an incoming call client is located, and sending the ciphertext to a server for identification;
receiving an identification result which is fed back by the server and indicates that the telephone number is a suspicious number, and starting to record the telephone audio of the mobile terminal when the mobile terminal is connected with the telephone number;
and when the call between the mobile terminal and the telephone number is finished, sending the recorded telephone audio cipher text to the server.
Optionally, the starting to record the phone audio of the mobile terminal includes:
if the time length of the telephone audio of the mobile terminal is greater than or equal to a preset recording time period, recording the telephone audio of the mobile terminal according to the preset time period;
and if the time length of the telephone audio of the mobile terminal is less than the preset recording time period, recording the telephone audio of the whole time length.
Optionally, the sending the recorded telephone audio ciphertext to the server includes:
cutting the recorded telephone recording according to a preset segment time period to obtain at least one telephone recording segment;
extracting at least one telephone recording segment from the at least one telephone recording segment according to a preset extraction interval;
and encrypting the extracted telephone recording fragments and sending the encrypted telephone recording fragments to the server.
Optionally, after the sending the recorded telephone audio ciphertext to the server, the method further includes:
and receiving an identification confirmation result which is fed back and identifies the telephone number as a suspicious number after the encrypted telephone recording segment is decrypted by the server and is compared with a preset voiceprint sample of the suspicious number.
Optionally, the receiving, after the server decrypts the encrypted telephone recording segment, the decrypted telephone recording segment is compared with a preset voiceprint sample of the suspicious number, and a fed-back identification confirmation result that the telephone number is identified as the suspicious number includes:
and receiving safety prompt information of the server for classifying the telephone numbers, further comparing the telephone numbers with a plurality of preset voiceprints under the classification corresponding to the telephone numbers, and giving a feedback to prompt that the telephone numbers are suspicious numbers, the classification of the suspicious numbers corresponding to the telephone numbers and the classification of the suspicious numbers corresponding to the telephone numbers.
Optionally, when the recorded telephone audio ciphertext is sent to the server, the method further includes:
and sending the identification information of the mobile terminal and the version information of the client to the server so that the server analyzes and counts the received telephone audio according to the identification information of the mobile terminal and the version information of the client.
Optionally, before sending the recorded telephone audio ciphertext to the server, the method further includes:
and the switch is used for displaying the related information of the recorded telephone audio and uploading the ciphertext of the recorded telephone audio, wherein the related information comprises the duration and/or the file size of the recorded telephone audio.
Optionally, a storage space allowing a preset number of the recorded telephone audios to be stored is arranged on the client;
when the storage space is insufficient, the method further comprises:
deleting the telephone audio in the storage space according to a preset rule;
the preset rules comprise a recording time sequence rule and an emptying rule of the telephone audio.
Optionally, the receiving, by the server, an identification result indicating that the phone number is a suspicious number includes:
and receiving an identification result which is generated after the server searches the telephone number in a preset identification database and indicates that the telephone number is a suspicious number.
Optionally, the receiving, by the server, an identification result indicating that the phone number is a suspicious number includes:
and receiving an identification result which is generated after the server judges that the marking quantity of the telephone number is greater than or equal to a preset threshold value and indicates that the telephone number is a suspicious number.
Optionally, if the identification result indicates that the phone number is a suspicious number, the method further includes:
and displaying the recognition result indicating that the telephone number is a suspicious number, and determining that the recording permission of the client to the telephone audio of the mobile terminal is set or receiving a trigger instruction for starting recording the telephone audio when the telephone number is connected.
According to another aspect of the invention, a method for intercepting crank calls based on recording is further provided, and the method comprises the following steps:
the receiving server decrypts the telephone recording ciphertext, and compares the decrypted telephone recording ciphertext with a crank call voiceprint sample in a preset voiceprint database to obtain a comparison result;
and if the comparison result shows that the decrypted telephone recording ciphertext comes from a crank call, intercepting the crank call according to a crank call interception prompt sent by the server and used for intercepting the crank call corresponding to the decrypted telephone recording ciphertext.
According to another aspect of the present invention, there is also provided a mobile terminal-based telephone reporting apparatus, including:
the number acquisition module is used for acquiring a telephone number ciphertext of the mobile terminal where the incoming call client is located and sending the telephone number ciphertext to the server for identification;
the telephone recording module is used for receiving an identification result which is fed back by the server and indicates that the telephone number is a suspicious number, and when the mobile terminal is connected with the telephone number, the telephone recording module starts to record the telephone audio of the mobile terminal;
and the recording sending module is used for ending the call between the mobile terminal and the telephone number and sending the recorded telephone audio ciphertext to the server.
Optionally, if the time length of the telephone audio of the mobile terminal is greater than or equal to a preset recording time period, the telephone recording module records the telephone audio of the mobile terminal according to the preset time period;
and if the time length of the telephone audio of the mobile terminal is less than the preset recording time period, recording the telephone audio of the whole time length by the telephone recording module.
Optionally, the recording sending module includes:
the recording cutting submodule is used for cutting the recorded telephone recording according to a preset segment time period to obtain at least one telephone recording segment;
the recording extraction submodule is used for extracting at least one telephone recording fragment from the at least one telephone recording fragment according to a preset extraction interval;
and the recording encryption submodule is used for encrypting the extracted telephone recording fragments and then sending the encrypted telephone recording fragments to the server.
Optionally, the apparatus further comprises: and the recognition confirmation result receiving module is used for receiving a recognition confirmation result which is fed back and identifies the telephone number as a suspicious number after the encrypted telephone recording segment is decrypted by the server and compared with a preset voiceprint sample of the suspicious number after the recorded telephone audio ciphertext is sent to the server by the recording sending module.
Optionally, the identification confirmation result receiving module receives a security prompt message for the server to decrypt the encrypted telephone recording segment, compares the decrypted telephone recording segment with a preset voiceprint sample of a suspicious number, and receives a feedback identification confirmation result identifying the telephone number as the suspicious number, the server classifies the telephone number, and further compares the telephone number with a plurality of voiceprints preset under a classification corresponding to the telephone number, and then feeds back a prompt that the telephone number is the suspicious number, a classification of the suspicious number corresponding to the telephone number, and a classification of the suspicious number corresponding to the telephone number.
Optionally, the apparatus further comprises:
and the analysis and statistical information sending module is used for sending the identification information of the mobile terminal and the version information of the client to the server when the recording sending module sends the recorded telephone audio ciphertext to the server, so that the server analyzes and counts the received telephone audio according to the identification information of the mobile terminal and the version information of the client.
Optionally, the apparatus further comprises:
and the related information display module is used for displaying the related information of the recorded telephone audio and uploading the switch of the recorded telephone audio ciphertext before the recording sending module sends the recorded telephone audio ciphertext to the server, and the related information comprises the time length and/or the file size of the recorded telephone audio.
Optionally, a storage space allowing a preset number of the recorded telephone audios to be stored is arranged on the client;
the device further comprises:
the deleting module is used for deleting the telephone audio in the storage space according to a preset rule when the storage space is insufficient;
the preset rules comprise a recording time sequence rule and an emptying rule of the telephone audio.
Optionally, the telephone recording module receives an identification result indicating that the telephone number is a suspicious number, which is generated after the server searches the telephone number in a preset identification database.
Optionally, the telephone recording module receives an identification result indicating that the telephone number is a suspicious number, which is generated after the server judges that the marking quantity of the telephone number is greater than or equal to a preset threshold value.
Optionally, the apparatus further comprises:
and the identification result display module is used for displaying the identification result which indicates that the telephone number is the suspicious number if the identification result indicates that the telephone number is the suspicious number, and determining that the recording authority of the client to the telephone audio of the mobile terminal is set or receiving a trigger instruction for starting recording the telephone audio when the telephone number is connected.
According to another aspect of the present invention, there is provided a mobile terminal based telephone reporting system, comprising: a client and a server; wherein,
the client comprises: the system comprises a number acquisition module, a telephone recording module and a recording sending module;
the server includes: a number identification module; wherein,
the number acquisition module is used for acquiring a telephone number ciphertext of the mobile terminal where the incoming call is located, and sending the telephone number ciphertext to the server for identification;
the telephone recording module is used for receiving an identification result which is fed back by the server and indicates that the telephone number is a suspicious number, and when the mobile terminal is connected with the telephone number, the telephone recording module starts to record the telephone audio of the mobile terminal;
the recording sending module is used for ending the call between the mobile terminal and the telephone number and sending the recorded telephone audio ciphertext to the server;
and the number identification module is used for identifying the received telephone number ciphertext from the client and feeding back an identification result to the client.
According to another aspect of the present invention, there is provided a fraud phone interception system based on a mobile terminal, including: the system comprises a server and a client positioned at the mobile terminal;
wherein the client comprises:
the comparison result receiving module is used for receiving the telephone recording ciphertext decrypted by the server, and comparing the decrypted telephone recording ciphertext with a fraudulent telephone voiceprint sample in a preset voiceprint database to obtain a comparison result;
the fraudulent call intercepting module is used for intercepting the fraudulent call according to an interception prompt of the fraudulent call corresponding to the decrypted telephone record ciphertext, which is sent by the server, if the comparison result shows that the decrypted telephone record ciphertext is from the fraudulent call;
the server includes:
the recording receiving and decrypting module is used for receiving and decrypting the telephone recording ciphertext sent by the client;
the recording comparison module is used for comparing the decrypted telephone recording ciphertext with a fraudulent telephone voiceprint sample in a preset voiceprint database;
the fraud telephone determining module is used for determining that the decrypted telephone recording ciphertext comes from a fraud telephone if the comparison result shows that the decrypted telephone recording ciphertext is the same as or the similarity of the fraud telephone voiceprint sample meets the comparison requirement;
and the interception prompt sending module is used for sending an interception prompt for intercepting the fraudulent call corresponding to the decrypted telephone recording ciphertext to the client.
In the existing telephone reporting scheme based on the mobile terminal, the telephone number which is subjectively identified as a suspicious number by a user is reported to a reporting center through the subjective identification of the telephone number by the user, so that the condition of unreal reporting is easily caused, and the problem of reporting disputes is caused. According to the mobile terminal-based telephone reporting scheme, the telephone number ciphertext of the mobile terminal where the incoming call client is located is obtained and sent to the server for identification; receiving an identification result which is fed back by the server and indicates that the telephone number is a suspicious number, and starting to record the telephone audio of the mobile terminal when the mobile terminal calls the telephone number; and when the call between the mobile terminal and the telephone number is finished, sending the recorded telephone audio ciphertext to the server to report the suspicious number. The invention sends the suspicious number to the server for reporting, and simultaneously sends the telephone recording of the suspicious number to the server as the reported evidence. The problem that the existing telephone reporting method based on the mobile terminal cannot provide reporting evidence so as to generate reporting disputes is solved, and the telephone 'demonstration' reporting is realized.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a flowchart illustrating steps of a mobile terminal-based telephone reporting method according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating steps of a mobile terminal-based telephone reporting method according to a second embodiment of the present invention;
fig. 3 is a schematic diagram of a client initiating a harassment interception and recording reporting function according to a second embodiment of the present invention;
FIGS. 4a and 4b are schematic diagrams illustrating the recognition result and the recording status according to the second embodiment of the invention;
FIG. 5 is a diagram illustrating information related to a recording of a telephone call provided by a server according to a second embodiment of the present invention;
fig. 6 is a diagram illustrating details of a phone number provided by a server according to a second embodiment of the present invention;
FIGS. 7a and 7b are schematic diagrams of a token window of a suspect telephone number in accordance with a second embodiment of the present invention;
FIGS. 8a and 8b are detailed schematic diagrams of suspicious telephone numbers according to a second embodiment of the present invention;
fig. 9 is a block diagram of a mobile terminal-based telephone reporting apparatus according to a third embodiment of the present invention;
fig. 10 is a block diagram of a mobile terminal-based telephone reporting apparatus according to a fourth embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Example one
The embodiment of the invention provides a telephone reporting method based on a mobile terminal.
Referring to fig. 1, a flowchart illustrating steps of a mobile terminal based telephone reporting method in an embodiment of the present invention is shown.
And step 100, acquiring a telephone number ciphertext of the mobile terminal where the incoming call client is located, and sending the telephone number ciphertext to a server for identification.
In the embodiment of the invention, when receiving an incoming call, the operating system of the terminal broadcasts the incoming call message and carries the incoming call number, so that the application program can monitor the event and acquire the telephone number of the incoming call from the event, and further, the application program can read the data in the address book stored in the terminal by the user through the interface provided by the operating system of the terminal. When the user is used as a calling party to make a call, the calling-out event can be monitored in a similar mode, and information such as the telephone number of the called party can be acquired from the local place.
In the embodiment of the invention, the types of the strange telephone numbers needing to be sent to the server for identification can comprise house agency, express meal delivery, education and training, harassing calls, fraudulent calls or public service classes and the like. The present embodiment does not limit the classification information to which the strange number belongs, and the classification information may be a classification of a large class or a detailed classification information of a certain large class.
In the embodiment of the invention, the mobile terminal can determine the type of the strange number according to the mark library used for indicating the type of the number. The tag library may be a tag library local to the mobile terminal or a tag library on the server side. The mark library comprises: the server may transmit the correspondence in the tag library to the mobile terminal. Where numbers may be classified into many security classes from white to black, marked with different colors, e.g. red for fraud calls, orange for advertising nuisance and premises agents, and green for normal numbers. In this embodiment, a range may be set for the security level of the mark, for example, the security level of express food delivery is 100, the security level of advertising is 200, and fraud is higher. The types of strange numbers may include: white numbers, unlabeled numbers, advertisement nuisance numbers, house property intermediary numbers, fraud numbers, express numbers, meal delivery numbers, etc. Each number in the label library corresponds to a number type, and the correspondence may be determined by the network side, or may be recorded by notifying a server on the network side after the mobile terminal labels the number. For example, in the tag library, the classification information to which the strange number belongs may include: number attribution information and number attribution domain information; or the type of the number can be determined according to the classification information, wherein the number belongs to the information, the number belongs to the field information and the number belongs to the information of the user. For example, there is classification information "15210 ×, i love my home", and through the pre-trained classifier and information matching, it can be known that the type of this number belongs to is the house property broker. The embodiment of the present invention is not limited to this, and before the phone number is sent to the server, the phone number may be encrypted by using an Algorithm such as md5(Message Digest Algorithm 5, fifth version of Message Digest Algorithm) or sha1(Secure Hash Algorithm), and a dedicated transmission channel may be selected to send the phone number to the server.
And 102, receiving an identification result which is fed back by the server and indicates that the telephone number is a suspicious number, and starting to record the telephone audio of the mobile terminal when the mobile terminal is connected with the telephone number.
The server identifies the received telephone number, and can obtain several types of identification results, such as a security number, a suspicious number and the like, and when the telephone number is identified as the suspicious number by the server, the server can start to record telephone audio.
Wherein the suspect number may be a nuisance number, an advertisement number, an intermediary number, a fraud number, and the like.
In the embodiment of the invention, the number corresponding to the mark in the mark library consists of a number which takes the location of the server as a home location and a number without the home location. In this embodiment, the local phone corresponding to the tag is mainly issued to the mobile terminal in a regional manner, and meanwhile, some national phone corresponding tags (for example, some 400 phone corresponding tags) are issued to the mobile terminal, so that the hit rate for determining the type of the incoming call number can be improved.
In this embodiment, the tag library in the mobile terminal may be acquired from the server, and when there are many tags in the tag library, the server may send only N data of the header (for example, 15 ten thousand data of the header) to the mobile terminal, where the N data of the header represents the first N data with a large tag amount. By the embodiment, the data transmitted by the network is limited, and the network overhead can be effectively saved.
The tag library may include a header database, which may include: information of strange numbers corresponding to public service classes; and the information corresponding to the unfamiliar number is provided by the user of the unfamiliar number. For example: the header data may be "95588 china industrial and commercial bank service telephone", "10086 china mobile customer service telephone", and the like. That is, the header database may be unambiguous numbers and classification information of the numbers determined by the cloud server.
In specific implementation, the type corresponding to the unfamiliar number may be sent to the monitoring device, so that the type is displayed on a current incoming call or outgoing call interface of the terminal. When the user calls the interface display "15210 x, the property broker", the user can easily identify the user information of this number. According to the method, the classifier is trained in advance to search the type corresponding to the unfamiliar number, so that the type of the unfamiliar number displayed in the terminal is accurate, and a user can judge the classification of the incoming call or the outgoing call number by acquiring the related information of the incoming call or the outgoing call number, so that great convenience is brought to the user.
In another preferred example of the embodiment of the present invention, when the mobile terminal does not inquire the type of the unfamiliar number in a local tag library, the mobile terminal inquires the type of the unfamiliar number from a server, and then the server determines the type of the unfamiliar number according to the tag library in the server; and the mobile terminal receives the type of the strange number sent by the server. In the embodiment, the mobile terminal determines the type of the unfamiliar number through the server-side tag library, and the server-side tag library is updated more timely than the mobile terminal-side tag library, so that the accuracy of the unfamiliar number type determined by the embodiment is higher.
In this embodiment, the server may determine the classification information of the number according to a domain dictionary, where the domain dictionary may be a multi-dimensional vector forming dictionary, and each dimension of the domain dictionary corresponds to one or more domain feature words in a domain, and a probability distribution of the domain feature words in the domain. For example, one dimension in the domain dictionary corresponds to the domain serving the mobile client, and the domain feature words are: china mobile customer service class phone, the probability distribution of the China mobile customer service class phone in the mobile customer service field is 100%.
Or, the domain corresponding to one dimension in the domain dictionary is a real estate agency, and the domain feature words are: "i love my home", "rent house", "sell house", "chain property", "house renting agent", etc., the probability distribution of "i love my home" in the property agent field is 100%.
For example: the cloud server receives the same unfamiliar number reported by the 6 monitoring devices and the category to which the unfamiliar number belongs within a week, but the category to which the unfamiliar number reported by each monitoring device belongs is different, for example, the categories are 'house agency', 'advertising promotion', 'express delivery', and the like.
At this time, the unfamiliar number needs to be searched in a search to obtain the feature words in the yellow page of the unfamiliar number. It should be noted that the yellow page at this point may be understood as the closest one of the related web pages of the unfamiliar number, and the web page appearing second in the search may be the yellow page of the unfamiliar number 10086, so that the feature word may be: china mobile customer service telephone. By comparing the feature word 'Chinese mobile customer service telephone' with the field feature words in the field dictionary, the field feature word with the largest similarity is 'Chinese mobile customer service type telephone', so that the field 'mobile customer service' corresponding to the field feature word is used as the classification information of the unfamiliar number 10086, and the type of the number can be determined.
In addition, the strange numbers reported by the monitoring device and received by the cloud server are as follows: 010 + 821, inputting the number into a search engine, selecting the feature words "love my home", "rent room", and "sell room" from a related webpage related to 010 + 821, comparing each feature word with the feature words in the domain dictionary, and selecting the domain "house agency" corresponding to the domain feature words "love my home", "rent room", and "sell room" with the highest similarity as the classification information of 010 + 821.
In the embodiment of the present invention, the process of recording the telephone audio may be started when the identification result indicating that the telephone number is a suspicious number is received (at this time, the mobile terminal does not access the telephone number), or may be started when the mobile terminal accesses the telephone number.
And 104, when the call between the mobile terminal and the telephone number is finished, sending the recorded telephone audio cipher text to the server.
And when the call between the mobile terminal and the telephone number is finished, the telephone number can be actively hung up for the mobile terminal, and the mobile terminal can also be passively hung up by the telephone number.
The recorded telephone audio can be encrypted, and the encrypted telephone audio ciphertext is sent to the server. The dedicated transmission channel may also be selected when transmitting the telephone audio ciphertext, and may be implemented based on a local Private Network (VPN client) service created inside the client, for example. In this context, the client may be a mobile terminal device with a mobile networking service, such as a smart phone, a tablet computer, or the like. The client's operating system opens multiple system interfaces (APIs) to facilitate use of the VPN service, which can obtain the authority to control and manage other applications upon user confirmation. Specifically, by calling an API provided by an operating system, a VPN service inside the client may be opened, and when other applications of the client want to access the network, query requests sent by the client to the server are all processed by the local VPN service, and a local service process provided by creating the local VPN service inside the client is used for processing the voice recording call, that is: and acquiring an initiating query request by querying the system file, acquiring a corresponding processing strategy by querying the configuration file, and processing the network connection request according to the processing strategy.
In summary, in the technical scheme of the embodiment of the present invention, a phone number ciphertext of a mobile terminal where an incoming call client is located is obtained and sent to a server for identification; receiving an identification result which is fed back by the server and indicates that the telephone number is a suspicious number, and starting to record the telephone audio of the mobile terminal when the mobile terminal calls the telephone number; and when the call between the mobile terminal and the telephone number is finished, sending the recorded telephone audio ciphertext to the server to report the suspicious number. The embodiment of the invention sends the suspicious number to the server for reporting, and simultaneously sends the telephone recording of the suspicious number to the server as the reported evidence. The problem that the existing telephone reporting method based on the mobile terminal cannot provide reporting evidence so as to generate reporting disputes is solved, and the telephone 'demonstration' reporting is realized.
Example two
The embodiment of the invention provides a telephone reporting method based on a mobile terminal.
Referring to fig. 2, a flowchart illustrating steps of a mobile terminal based telephone reporting method in an embodiment of the present invention is shown.
And 200, acquiring a telephone number ciphertext of the mobile terminal where the incoming call client is located, and sending the telephone number ciphertext to a server for identification.
The technical means for acquiring the telephone number may adopt technical means commonly used in the art, which is not limited in the embodiment of the present invention, and meanwhile, before the telephone number is sent to the server, the telephone number may be encrypted, and a dedicated transmission channel may be selected to send the telephone number to the server.
If a telephone number is to be acquired and sent to the server for identification, a harassment interception function of the client needs to be started, as shown in fig. 3, if call recording is to be subsequently performed, a function of recording and reporting harassment calls needs to be started.
Step 202, receiving an identification result which is fed back by the server and indicates that the telephone number is a suspicious number, and starting to record the telephone audio of the mobile terminal when the mobile terminal is connected with the telephone number.
The server identifies the received telephone number, and can obtain several types of identification results, such as a security number, a suspicious number and the like, and when the telephone number is identified as the suspicious number by the server, the server can start to record telephone audio.
Wherein the suspect number may be a nuisance number, an advertisement number, an intermediary number, a fraud number, and the like.
The process of recording the telephone audio may be started when the recognition result indicating that the telephone number is a suspicious number is received (at which time the mobile terminal does not connect the telephone number), or may be started when the mobile terminal connects the telephone number.
Preferably, in step 200, the process of receiving the identification result indicating that the phone number is a suspicious number and fed back by the server may be:
and receiving an identification result which is generated after the server searches the telephone number in a preset identification database and indicates that the telephone number is a suspicious number.
The suspicious numbers reported and confirmed or the suspicious numbers actively collected by the server are stored in an identification database preset in the server.
Preferably, in step 200, the process of receiving the identification result indicating that the phone number is a suspicious number and fed back by the server may further include:
and receiving an identification result which is generated after the server judges that the marking quantity of the telephone number is greater than or equal to a preset threshold value and indicates that the telephone number is a suspicious number.
If the telephone number is reported and the number marked as the suspicious number is greater than or equal to a preset threshold value in the server, preliminarily determining that the telephone number is the suspicious number, and generating a preliminary identification result indicating that the telephone number is the suspicious number; if the telephone number is reported and the number marked as the suspicious number is smaller than the preset threshold value, the telephone number can be preliminarily determined not to be the suspicious number, and a preliminary identification result showing that the telephone number is not the suspicious number is generated.
If the identification result indicates that the telephone number is a suspicious number, the identification result indicating that the telephone number is the suspicious number can be displayed, and the recording permission of the client to the telephone audio of the mobile terminal is determined to be set or a trigger instruction for starting recording the telephone audio when the telephone number is connected is received.
In the embodiment of the present invention, the server may determine the difference between the updated tag library and the tag library before the update, that is, the increment of the tag library update at certain time intervals. For example, the server may send the full amount of the token library (e.g., including the top 15 thousands of records) to the mobile terminal on the first day, and determine the difference between the token library sent the first day and the current token library on the second day, i.e., the increment between the current token library and the token library sent the first day.
If the identification result indicates that the phone number is a suspicious number, the identification result that the phone number is a suspicious number, such as 'fraud phone', can be displayed, and when the phone is not connected, the recording authority is set, such as 'recording complaint is opened', as shown in fig. 4 a. The "recording in progress" and the time recorded may be displayed in the call on state, and the number of times the telephone number is marked may also be prompted, as shown in fig. 4 b.
Preferably, in step 202, the process of starting recording the phone audio of the mobile terminal may be:
(1) and if the time length of the telephone audio of the mobile terminal is greater than or equal to a preset recording time period, recording the telephone audio of the mobile terminal according to the preset time period.
For example, if the time length of the telephone audio is 3 minutes and the preset recording time period is 15 seconds, the telephone audio with the time of 15 seconds is recorded.
(2) And if the time length of the telephone audio of the mobile terminal is less than the preset recording time period, recording the telephone audio of the whole time length.
For example, if the time length of the telephone audio is 10 minutes and the preset recording time period is 15 seconds, the telephone audio of 10 seconds is recorded.
Preferably, in step 202, from the beginning of recording the telephone audio of the mobile terminal to the end of recording the telephone recording, displaying the relevant information of the recorded telephone audio and a switch for uploading the ciphertext of the recorded telephone audio, where the relevant information includes the duration and/or file size of the recorded telephone audio.
For example, the time length of the recorded telephone audio and the space capacity occupied by the telephone audio file, etc. may be displayed, and a switch button for uploading the telephone recording may also be displayed.
The client is provided with a storage space allowing a preset number of recorded telephone audios to be stored; when the storage space is insufficient, the telephone audio in the storage space can be deleted according to a preset rule.
For example, a storage space capable of storing 5 to 10 telephone recordings is set on the client, when the storage space is not enough to store one telephone recording, all the telephone recordings in the storage space may be deleted, or the telephone audio may be deleted according to a preset rule, where the preset rule may be according to the sequence of the recording time of the telephone recording, or directly clearing the storage space, and the like.
And step 204, when the call between the mobile terminal and the telephone number is finished, sending the recorded telephone audio cipher text to the server.
And when the call between the mobile terminal and the telephone number is finished, the telephone number can be actively hung up for the mobile terminal, and the mobile terminal can also be passively hung up by the telephone number.
The recorded telephone audio can be encrypted, and the encrypted telephone audio ciphertext is sent to the server. When the telephone audio cipher text is sent, a special transmission channel can be selected, and the safety of telephone recording transmission is ensured.
And sending the recorded telephone audio ciphertext to the server, displaying that the user is recommended to send the telephone audio ciphertext in a WIFI environment, and displaying about the required cost if the telephone audio ciphertext is sent to the server in a 2G or 3G environment.
Preferably, the step 204 may include:
substep 2041, cutting the recorded telephone recording according to a preset segment time period to obtain at least one telephone recording segment.
If the time length of the recorded telephone recording is 15 seconds and the preset segment time period is 15 milliseconds, cutting the recorded telephone recording into a plurality of 15 millisecond recording segments.
Substep 2042, extracting at least one recording segment from the at least one recording segment according to a preset extraction interval.
If the preset extraction interval is 45 milliseconds, a 15-millisecond recording segment is extracted from a plurality of 15-millisecond recording segments at an interval of 45 milliseconds.
And a substep 2043 of encrypting the extracted telephone recording segment and sending the encrypted telephone recording segment to the server.
In order to ensure the privacy of the user, the extracted recording segments can be sent to the server through encryption.
Preferably, in step 204, when the recorded telephone audio ciphertext is sent to the server, the identification information of the mobile terminal and the version information of the client may also be sent to the server, so that the server analyzes and counts the received telephone audio according to the identification information of the mobile terminal and the version information of the client.
The identification information of the Mobile terminal may be an IMSI (International Mobile Subscriber Identity) of the Mobile terminal, and the like.
Preferably, the server may provide information related to the telephone recording, such as the recording amount, etc., and provide a recording list entry, which may analyze and interpret the recording, as shown in fig. 5, and may present information such as the time stamp of a certain telephone number, the IMSI of the recording source, the new stamp type, the old stamp type, the incoming and outgoing calls, the client version, etc. It is also possible to display detailed information of the telephone number as shown in fig. 6.
Preferably, after the call between the mobile terminal and the phone number is ended, a mark window in which the phone number is marked as a suspicious number may be displayed on the client, as shown in fig. 7a, several common suspicious number classifications, such as a harassing call, a fraudulent call, a property intermediary, a courier, an advertising promotion, etc., may be provided in the mark window, and a mark customization function may be provided, so that the user may add a label by himself. Meanwhile, the mark window can also display the related information of the telephone recording, such as time length, file size and the like, and a switch for determining to upload the telephone recording (the uploading is allowed by default). Preferably, as shown in fig. 7b, in addition to displaying the classification of the suspect numbers in fig. 7a, the time length of the call recording may be displayed and the upload report is selected by default.
Preferably, a details page of the telephone number may also be displayed on the client, as shown in fig. 8a, including details of the telephone number, such as telephone number, tag class, tag number, attribution, call record, etc., and as shown in fig. 8b, in addition to the details of the telephone number in fig. 8a, information such as the number of telephone recordings provided and the details entry path of the telephone recording may also be displayed.
Step 206, receiving the identification confirmation result that the server decrypts the encrypted telephone recording segment, compares the decrypted telephone recording segment with a preset voiceprint sample of the suspicious number, and identifies the telephone number as the suspicious number.
And presetting some voiceprint samples of suspicious numbers in the server, decrypting the telephone recording fragment by the server, comparing the decrypted telephone recording fragment with the voiceprint samples of the suspicious numbers, determining the telephone number as the suspicious number if the similarity degree of the telephone recording fragment and the voiceprint samples meets the requirement, and feeding back the identification confirmation result that the telephone number is the suspicious number.
Preferably, the step 206 may specifically be: and receiving safety prompt information of the server for classifying the telephone numbers, further comparing the telephone numbers with a plurality of preset voiceprints under the classification corresponding to the telephone numbers, and giving a feedback to prompt that the telephone numbers are suspicious numbers, the classification of the suspicious numbers corresponding to the telephone numbers and the classification of the suspicious numbers corresponding to the telephone numbers.
After the server confirms that the telephone number is a suspicious number, specific classification information of the telephone number is also confirmed. Presetting a plurality of voiceprint samples under specific classification, continuously comparing the recording fragment of the telephone number with the voiceprint samples under the classification, further determining which classified suspicious number the telephone number is, and extracting safety prompt information aiming at the classified suspicious number, such as suggestion of forbidding callback and the like.
In summary, in the technical scheme of the embodiment of the present invention, a phone number ciphertext of a mobile terminal where an incoming call client is located is obtained and sent to a server for identification; receiving an identification result which is fed back by the server and indicates that the telephone number is a suspicious number, and starting to record the telephone audio of the mobile terminal when the mobile terminal calls the telephone number; and when the call between the mobile terminal and the telephone number is finished, sending the recorded telephone audio ciphertext to the server to report the suspicious number. The embodiment of the invention sends the suspicious number to the server for reporting, and simultaneously sends the telephone recording of the suspicious number to the server as the reported evidence. The problem that the existing telephone reporting method based on the mobile terminal cannot provide reporting evidence so as to generate reporting disputes is solved, and the telephone 'demonstration' reporting is realized.
It should be noted that the foregoing method embodiments are described as a series of acts or combinations for simplicity in explanation, but it should be understood by those skilled in the art that the present invention is not limited by the order of acts or acts described, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
EXAMPLE III
The embodiment of the invention provides a telephone reporting device based on a mobile terminal.
Referring to fig. 9, a block diagram of a mobile terminal based telephone reporting apparatus according to an embodiment of the present invention is shown.
The apparatus may include: the system comprises a number acquisition module 300, a telephone recording module 302 and a recording sending module 304.
The functions of the modules and the relationships between the modules are described in detail below.
The number obtaining module 300 is configured to obtain a phone number ciphertext of the mobile terminal where the incoming call client is located, and send the phone number ciphertext to the server for identification.
And the telephone recording module 302 is configured to receive an identification result indicating that the telephone number is a suspicious number, which is fed back by the server, and start to record a telephone audio of the mobile terminal when the mobile terminal connects the telephone number.
And a recording sending module 304, configured to send the recorded telephone audio ciphertext to the server when the call between the mobile terminal and the telephone number is ended.
In summary, in the technical scheme of the embodiment of the present invention, a phone number ciphertext of a mobile terminal where an incoming call client is located is obtained and sent to a server for identification; receiving an identification result which is fed back by the server and indicates that the telephone number is a suspicious number, and starting to record the telephone audio of the mobile terminal when the mobile terminal calls the telephone number; and when the call between the mobile terminal and the telephone number is finished, sending the recorded telephone audio ciphertext to the server to report the suspicious number. The embodiment of the invention sends the suspicious number to the server for reporting, and simultaneously sends the telephone recording of the suspicious number to the server as the reported evidence. The problem that the existing telephone reporting method based on the mobile terminal cannot provide reporting evidence so as to generate reporting disputes is solved, and the telephone 'demonstration' reporting is realized.
Example four
The embodiment of the invention provides a telephone reporting device based on a mobile terminal.
Referring to fig. 10, a block diagram of a mobile terminal based telephone reporting apparatus according to an embodiment of the present invention is shown.
The apparatus may include: the system comprises a number acquisition module 400, a telephone recording module 402, a recording sending module 404, an identification confirmation result receiving module 406, an analysis and statistical information sending module 408, a related information display module 410, a deletion module 412 and an identification result display module 414.
The sound recording sending module 404 may include a sound recording cutting sub-module 4041, a sound recording extracting sub-module 4042, and a sound recording encrypting sub-module 4043.
The functions of each module and each sub-module and the relationship between each module and each sub-module are described in detail below.
The number obtaining module 400 is configured to obtain a phone number ciphertext of the mobile terminal where the incoming call client is located, and send the phone number ciphertext to the server for identification.
And a telephone recording module 402, configured to receive an identification result indicating that the telephone number is a suspicious number, which is fed back by the server, and start to record a telephone audio of the mobile terminal when the mobile terminal connects the telephone number.
Preferably, if the time length of the telephone audio of the mobile terminal is greater than or equal to a preset recording time period, the telephone recording module 402 records the telephone audio of the mobile terminal according to the preset time period.
Preferably, if the time length of the telephone audio of the mobile terminal is less than the preset recording time period, the telephone recording module 402 records the telephone audio of the whole time length.
Preferably, the telephone recording module 402 receives an identification result indicating that the telephone number is a suspicious number, which is generated after the server searches the telephone number in a preset identification database.
Preferably, the telephone recording module 402 receives an identification result indicating that the telephone number is a suspicious number, which is generated after the server determines that the marking amount of the telephone number is greater than or equal to a preset threshold.
And a recording sending module 404, configured to end a call between the mobile terminal and the phone number, and send the recorded phone audio ciphertext to the server.
Preferably, the recording sending module 404 may include:
and the recording cutting submodule 4041 is configured to cut the recorded telephone recording according to a preset segment time period to obtain at least one telephone recording segment.
The recording extraction sub-module 4042 is configured to extract at least one telephone recording segment from the at least one telephone recording segment according to a preset extraction interval.
And the recording encryption submodule 4043 is used for encrypting the extracted telephone recording fragments and then sending the encrypted telephone recording fragments to the server.
Preferably, the recognition confirmation result receiving module 406 is configured to, after the recording sending module 404 sends the recorded telephone audio ciphertext to the server, receive a recognition confirmation result that the server decrypts the encrypted telephone recording segment, compares the decrypted telephone recording segment with a preset voiceprint sample of the suspicious number, and feeds back the recognition confirmation result that the telephone number is identified as the suspicious number.
Preferably, the identification confirmation result receiving module 406 is specifically configured to receive safety prompt information that the server classifies the phone numbers, and after further comparing the telephone numbers with a plurality of preset voiceprints under classification corresponding to the phone numbers, the server prompts that the phone numbers are suspicious numbers, the classification of the suspicious numbers corresponding to the phone numbers, and the classification of the suspicious numbers corresponding to the phone numbers.
Preferably, the analysis and statistics information sending module 408 is configured to send the identification information of the mobile terminal and the version information of the client to the server when the recording sending module 404 sends the recorded telephone audio ciphertext to the server, so that the server analyzes and counts the received telephone audio according to the identification information of the mobile terminal and the version information of the client.
Preferably, the related information display module 410 is configured to display the related information of the recorded telephone audio and a switch for uploading the recorded telephone audio ciphertext before the recording sending module 404 sends the recorded telephone audio ciphertext to the server, where the related information includes a duration and/or a file size of the recorded telephone audio.
Preferably, a storage space allowing a preset number of the recorded telephone audios to be stored is arranged on the client; a deleting module 412, configured to delete the telephone audio in the storage space according to a preset rule when the storage space is insufficient; the preset rules comprise a recording time sequence rule and an emptying rule of the telephone audio.
Preferably, the identification result displaying module 414 is configured to display the identification result indicating that the phone number is a suspicious number if the identification result indicates that the phone number is a suspicious number, and determine that the recording permission of the client for the phone audio of the mobile terminal has been set or receive a trigger instruction for starting recording the phone audio when the phone number is connected.
In summary, in the technical scheme of the embodiment of the present invention, a phone number ciphertext of a mobile terminal where an incoming call client is located is obtained and sent to a server for identification; receiving an identification result which is fed back by the server and indicates that the telephone number is a suspicious number, and starting to record the telephone audio of the mobile terminal when the mobile terminal calls the telephone number; and when the call between the mobile terminal and the telephone number is finished, sending the recorded telephone audio ciphertext to the server to report the suspicious number. The embodiment of the invention sends the suspicious number to the server for reporting, and simultaneously sends the telephone recording of the suspicious number to the server as the reported evidence. The problem that the existing telephone reporting method based on the mobile terminal cannot provide reporting evidence so as to generate reporting disputes is solved, and the telephone 'demonstration' reporting is realized.
Correspondingly, the embodiment of the invention also provides a method for intercepting crank calls based on the recording, which comprises the following steps:
the receiving server decrypts the telephone recording ciphertext, and compares the decrypted telephone recording ciphertext with a crank call voiceprint sample in a preset voiceprint database to obtain a comparison result;
and if the comparison result shows that the decrypted telephone recording ciphertext comes from a crank call, intercepting the crank call according to a crank call interception prompt sent by the server and used for intercepting the crank call corresponding to the decrypted telephone recording ciphertext.
Correspondingly, the embodiment of the invention also provides a telephone reporting system based on the mobile terminal, which comprises: a client and a server; wherein,
the client comprises: the device comprises a number acquisition module, a telephone recording module and a recording sending module.
The server includes: and a number identification module.
And the number acquisition module is used for acquiring the telephone number of the mobile terminal where the incoming call is located at the client and sending the telephone number to the server for identification.
And the telephone recording module is used for receiving an identification result which is fed back by the server and indicates that the telephone number is a suspicious number, and starting to record the telephone audio of the mobile terminal when the mobile terminal is connected with the telephone number.
And the recording sending module is used for ending the call between the mobile terminal and the telephone number and sending the recorded telephone audio to the server.
And the number identification module is used for identifying the received telephone number from the client and feeding back an identification result to the client.
Correspondingly, the embodiment of the invention also provides a fraud telephone interception system based on the mobile terminal, which comprises the following steps: the system comprises a server and a client located at the mobile terminal.
Wherein the client comprises:
and the comparison result receiving module is used for receiving the telephone recording ciphertext decrypted by the server, and comparing the decrypted telephone recording ciphertext with a fraudulent telephone voiceprint sample in a preset voiceprint database to obtain a comparison result.
And the fraudulent call interception module is used for intercepting the fraudulent call according to an interception prompt of the fraudulent call corresponding to the decrypted telephone record ciphertext, which is sent by the server, if the comparison result shows that the decrypted telephone record ciphertext is from the fraudulent call.
The server includes:
and the recording receiving and decrypting module is used for receiving and decrypting the telephone recording ciphertext sent by the client.
And the recording comparison module is used for comparing the decrypted telephone recording ciphertext with a fraudulent telephone voiceprint sample in a preset voiceprint database.
And the fraudulent call determination module is used for determining that the decrypted telephone recording ciphertext comes from the fraudulent call if the comparison result shows that the decrypted telephone recording ciphertext is the same as or the similarity of the fraudulent call voiceprint sample meets the comparison requirement.
And the interception prompt sending module is used for sending an interception prompt for intercepting the fraudulent call corresponding to the decrypted telephone recording ciphertext to the client.
The method of the embodiment can be applied to mobile phone safety products such as incoming call shows, harassing call reminding and the like. For example, for a single user, besides uploading some head portraits, nicknames and other related information to the telephone number of the user, the user may be allowed to report the relevant recorded information to the telephone number of a suspected fraudulent telephone user, and such reporting of the relevant information to the telephone numbers of other users is generally performed to some telephone numbers used for performing malicious operations, for example, some telephone numbers are used for performing "one-sound-only" harassment, which may cause economic loss once the user dials back, and some owners of the telephone numbers may be some house property brokers, insurance brokers and the like, and some users may not want to receive the telephones of such people, so that the user may be allowed to perform reporting operations to these types of telephone numbers. Correspondingly, the related information obtained by reporting of the user can be recorded at the server side, so that when the user receives the incoming call, the information can be displayed to the current user, and the current user can select whether to answer the call, whether to report the call and the like.
For the above-mentioned telephone reporting device and system embodiment based on the mobile terminal, since it is basically similar to the method embodiment, the description is relatively simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As is readily imaginable to the person skilled in the art: any combination of the above embodiments is possible, and thus any combination between the above embodiments is an embodiment of the present invention, but the present disclosure is not necessarily detailed herein for reasons of space.
The mobile terminal-based telepresence scheme provided herein is not inherently related to any particular computer, virtual system, or other apparatus. Various general purpose systems may also be used with the teachings herein. The structure required to construct a system incorporating aspects of the present invention will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. It will be appreciated by those skilled in the art that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components of a mobile terminal-based telephone reporting scheme in accordance with embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
The embodiment of the invention discloses A1 and a telephone reporting method based on a mobile terminal, which comprises the following steps:
acquiring a telephone number ciphertext of a mobile terminal where an incoming call client is located, and sending the ciphertext to a server for identification;
receiving an identification result which is fed back by the server and indicates that the telephone number is a suspicious number, and starting to record the telephone audio of the mobile terminal when the mobile terminal is connected with the telephone number;
and when the call between the mobile terminal and the telephone number is finished, sending the recorded telephone audio cipher text to the server.
A2, the method according to A1, wherein the starting to record the phone audio of the mobile terminal includes:
if the time length of the telephone audio of the mobile terminal is greater than or equal to a preset recording time period, recording the telephone audio of the mobile terminal according to the preset time period;
and if the time length of the telephone audio of the mobile terminal is less than the preset recording time period, recording the telephone audio of the whole time length.
A3, the method according to A1, wherein the sending the recorded telephone audio ciphertext to the server comprises:
cutting the recorded telephone recording according to a preset segment time period to obtain at least one telephone recording segment;
extracting at least one telephone recording segment from the at least one telephone recording segment according to a preset extraction interval;
and encrypting the extracted telephone recording fragments and sending the encrypted telephone recording fragments to the server.
A4, the method according to A3, wherein after the sending the recorded telephone audio ciphertext to the server, the method further comprises:
and receiving an identification confirmation result which is fed back and identifies the telephone number as a suspicious number after the encrypted telephone recording segment is decrypted by the server and is compared with a preset voiceprint sample of the suspicious number.
A5, the method according to a4, wherein the receiving the identification confirmation result that the telephone number is identified as the suspicious number after the server decrypts the encrypted telephone recording segment, compares the decrypted telephone recording segment with a preset voiceprint sample of the suspicious number, and feeds back the identification confirmation result that the telephone number is identified as the suspicious number includes:
and receiving safety prompt information of the server for classifying the telephone numbers, further comparing the telephone numbers with a plurality of preset voiceprints under the classification corresponding to the telephone numbers, and giving a feedback to prompt that the telephone numbers are suspicious numbers, the classification of the suspicious numbers corresponding to the telephone numbers and the classification of the suspicious numbers corresponding to the telephone numbers.
A6, the method according to a1, wherein when the telephone audio ciphertext that has been recorded is transmitted to the server, the method further comprises:
and sending the identification information of the mobile terminal and the version information of the client to the server so that the server analyzes and counts the received telephone audio according to the identification information of the mobile terminal and the version information of the client.
A7, the method according to A1, wherein before sending the recorded telephone audio ciphertext to the server, the method further comprises:
and the switch is used for displaying the related information of the recorded telephone audio and uploading the ciphertext of the recorded telephone audio, wherein the related information comprises the duration and/or the file size of the recorded telephone audio.
A8, the method according to A1, wherein a storage space allowing a preset number of the recorded telephone audios to be stored is provided on the client;
when the storage space is insufficient, the method further comprises:
deleting the telephone audio in the storage space according to a preset rule;
the preset rules comprise a recording time sequence rule and an emptying rule of the telephone audio.
A9, the method according to A1, wherein the receiving the identification result fed back by the server and indicating that the phone number is a suspicious number includes:
and receiving an identification result which is generated after the server searches the telephone number in a preset identification database and indicates that the telephone number is a suspicious number.
A10, the method according to A1, wherein the receiving the identification result fed back by the server and indicating that the phone number is a suspicious number includes:
and receiving an identification result which is generated after the server judges that the marking quantity of the telephone number is greater than or equal to a preset threshold value and indicates that the telephone number is a suspicious number.
A11, the method according to A1, wherein if the recognition result indicates that the phone number is a suspicious number, the method further comprises:
and displaying the recognition result indicating that the telephone number is a suspicious number, and determining that the recording permission of the client to the telephone audio of the mobile terminal is set or receiving a trigger instruction for starting recording the telephone audio when the telephone number is connected.
The embodiment of the invention also discloses B12 and a method for intercepting crank calls based on recording, which comprises the following steps:
the receiving server decrypts the telephone recording ciphertext, and compares the decrypted telephone recording ciphertext with a crank call voiceprint sample in a preset voiceprint database to obtain a comparison result;
and if the comparison result shows that the decrypted telephone recording ciphertext comes from a crank call, intercepting the crank call according to a crank call interception prompt sent by the server and used for intercepting the crank call corresponding to the decrypted telephone recording ciphertext.
The embodiment of the invention also discloses C13, a telephone reporting device based on the mobile terminal, which comprises:
the number acquisition module is used for acquiring a telephone number ciphertext of the mobile terminal where the incoming call client is located and sending the telephone number ciphertext to the server for identification;
the telephone recording module is used for receiving an identification result which is fed back by the server and indicates that the telephone number is a suspicious number, and when the mobile terminal is connected with the telephone number, the telephone recording module starts to record the telephone audio of the mobile terminal;
and the recording sending module is used for ending the call between the mobile terminal and the telephone number and sending the recorded telephone audio ciphertext to the server.
C14, recording the telephone audio of the mobile terminal according to a preset time period by the telephone recording module if the time length of the telephone audio of the mobile terminal is greater than or equal to the preset recording time period;
and if the time length of the telephone audio of the mobile terminal is less than the preset recording time period, recording the telephone audio of the whole time length by the telephone recording module.
C15, the apparatus according to C13, wherein the recorded sound sending module includes:
the recording cutting submodule is used for cutting the recorded telephone recording according to a preset segment time period to obtain at least one telephone recording segment;
the recording extraction submodule is used for extracting at least one telephone recording fragment from the at least one telephone recording fragment according to a preset extraction interval;
and the recording encryption submodule is used for encrypting the extracted telephone recording fragments and then sending the encrypted telephone recording fragments to the server.
C16, the apparatus of C15, wherein the apparatus further comprises: and the recognition confirmation result receiving module is used for receiving a recognition confirmation result which is fed back and identifies the telephone number as a suspicious number after the encrypted telephone recording segment is decrypted by the server and compared with a preset voiceprint sample of the suspicious number after the recorded telephone audio ciphertext is sent to the server by the recording sending module.
C17, the device according to C16, wherein the recognition confirmation result receiving module receives the recognition confirmation result that the server decrypts the encrypted voice recording segment, compares the decrypted voice recording segment with a preset voiceprint sample of a suspicious number, and identifies the telephone number as the suspicious number, receives the telephone number classified by the server, compares the telephone number with a plurality of preset voiceprints under classification corresponding to the telephone number, and feeds back a prompt that the telephone number is the suspicious number, the classification of the suspicious number corresponding to the telephone number, and safety prompt information for the classification of the suspicious number corresponding to the telephone number.
C18, the apparatus of C13, wherein the apparatus further comprises:
and the analysis and statistical information sending module is used for sending the identification information of the mobile terminal and the version information of the client to the server when the recording sending module sends the recorded telephone audio ciphertext to the server, so that the server analyzes and counts the received telephone audio according to the identification information of the mobile terminal and the version information of the client.
C19, the apparatus of C13, wherein the apparatus further comprises:
and the related information display module is used for displaying the related information of the recorded telephone audio and uploading the switch of the recorded telephone audio ciphertext before the recording sending module sends the recorded telephone audio ciphertext to the server, and the related information comprises the time length and/or the file size of the recorded telephone audio.
C20, the device according to C13, wherein a storage space allowing a preset number of the recorded telephone audios to be stored is arranged on the client;
the device further comprises:
the deleting module is used for deleting the telephone audio in the storage space according to a preset rule when the storage space is insufficient;
the preset rules comprise a recording time sequence rule and an emptying rule of the telephone audio.
And C21, the device according to C13, wherein the telephone recording module receives an identification result which is generated after the server searches the telephone number in a preset identification database and indicates that the telephone number is a suspicious number.
And C22, the device according to C13, wherein the telephone recording module receives an identification result which is generated after the server judges that the marking quantity of the telephone number is greater than or equal to a preset threshold value and indicates that the telephone number is a suspicious number.
C23, the apparatus of C13, wherein the apparatus further comprises:
and the identification result display module is used for displaying the identification result which indicates that the telephone number is the suspicious number if the identification result indicates that the telephone number is the suspicious number, and determining that the recording authority of the client to the telephone audio of the mobile terminal is set or receiving a trigger instruction for starting recording the telephone audio when the telephone number is connected.
The embodiment of the invention also discloses D24 and a telephone reporting system based on the mobile terminal, which comprises: a client and a server; wherein,
the client comprises: the system comprises a number acquisition module, a telephone recording module and a recording sending module;
the server includes: a number identification module; wherein,
the number acquisition module is used for acquiring a telephone number ciphertext of the mobile terminal where the incoming call is located, and sending the telephone number ciphertext to the server for identification;
the telephone recording module is used for receiving an identification result which is fed back by the server and indicates that the telephone number is a suspicious number, and when the mobile terminal is connected with the telephone number, the telephone recording module starts to record the telephone audio of the mobile terminal;
the recording sending module is used for ending the call between the mobile terminal and the telephone number and sending the recorded telephone audio ciphertext to the server;
and the number identification module is used for identifying the received telephone number ciphertext from the client and feeding back an identification result to the client.
The embodiment of the invention also discloses E25, a fraud telephone interception system based on the mobile terminal, which comprises: the system comprises a server and a client positioned at the mobile terminal;
wherein the client comprises:
the comparison result receiving module is used for receiving the telephone recording ciphertext decrypted by the server, and comparing the decrypted telephone recording ciphertext with a fraudulent telephone voiceprint sample in a preset voiceprint database to obtain a comparison result;
the fraudulent call intercepting module is used for intercepting the fraudulent call according to an interception prompt of the fraudulent call corresponding to the decrypted telephone record ciphertext, which is sent by the server, if the comparison result shows that the decrypted telephone record ciphertext is from the fraudulent call;
the server includes:
the recording receiving and decrypting module is used for receiving and decrypting the telephone recording ciphertext sent by the client;
the recording comparison module is used for comparing the decrypted telephone recording ciphertext with a fraudulent telephone voiceprint sample in a preset voiceprint database;
the fraud telephone determining module is used for determining that the decrypted telephone recording ciphertext comes from a fraud telephone if the comparison result shows that the decrypted telephone recording ciphertext is the same as or the similarity of the fraud telephone voiceprint sample meets the comparison requirement;
and the interception prompt sending module is used for sending an interception prompt for intercepting the fraudulent call corresponding to the decrypted telephone recording ciphertext to the client.

Claims (10)

1. A telephone reporting method based on a mobile terminal comprises the following steps:
acquiring a telephone number ciphertext of a mobile terminal where an incoming call client is located, and sending the ciphertext to a server for identification;
receiving an identification result which is fed back by the server and indicates that the telephone number is a suspicious number, and starting to record the telephone audio of the mobile terminal when the mobile terminal is connected with the telephone number;
and when the call between the mobile terminal and the telephone number is finished, sending the recorded telephone audio cipher text to the server.
2. The method of claim 1, wherein the initiating recording of the telephone audio of the mobile terminal comprises:
if the time length of the telephone audio of the mobile terminal is greater than or equal to a preset recording time period, recording the telephone audio of the mobile terminal according to the preset time period;
and if the time length of the telephone audio of the mobile terminal is less than the preset recording time period, recording the telephone audio of the whole time length.
3. The method of claim 1, wherein the sending the recorded telephony audio ciphertext to the server comprises:
cutting the recorded telephone recording according to a preset segment time period to obtain at least one telephone recording segment;
extracting at least one telephone recording segment from the at least one telephone recording segment according to a preset extraction interval;
and encrypting the extracted telephone recording fragments and sending the encrypted telephone recording fragments to the server.
4. The method of claim 3, wherein after sending the recorded telephony audio ciphertext to the server, the method further comprises:
and receiving an identification confirmation result which is fed back and identifies the telephone number as a suspicious number after the encrypted telephone recording segment is decrypted by the server and is compared with a preset voiceprint sample of the suspicious number.
5. The method of claim 4, wherein the receiving, by the server, the encrypted voice recording segment being decrypted and compared with a preset voiceprint sample of a suspicious number, and the fed back identification confirmation result identifying the telephone number as the suspicious number comprises:
and receiving safety prompt information of the server for classifying the telephone numbers, further comparing the telephone numbers with a plurality of preset voiceprints under the classification corresponding to the telephone numbers, and giving a feedback to prompt that the telephone numbers are suspicious numbers, the classification of the suspicious numbers corresponding to the telephone numbers and the classification of the suspicious numbers corresponding to the telephone numbers.
6. The method of claim 1, wherein when sending the recorded telephony audio ciphertext to the server, the method further comprises:
and sending the identification information of the mobile terminal and the version information of the client to the server so that the server analyzes and counts the received telephone audio according to the identification information of the mobile terminal and the version information of the client.
7. A method for intercepting crank calls based on recording comprises the following steps:
the receiving server decrypts the telephone recording ciphertext, and compares the decrypted telephone recording ciphertext with a crank call voiceprint sample in a preset voiceprint database to obtain a comparison result;
and if the comparison result shows that the decrypted telephone recording ciphertext comes from a crank call, intercepting the crank call according to a crank call interception prompt sent by the server and used for intercepting the crank call corresponding to the decrypted telephone recording ciphertext.
8. A telephone reporting device based on a mobile terminal comprises:
the number acquisition module is used for acquiring a telephone number ciphertext of the mobile terminal where the incoming call client is located and sending the telephone number ciphertext to the server for identification;
the telephone recording module is used for receiving an identification result which is fed back by the server and indicates that the telephone number is a suspicious number, and when the mobile terminal is connected with the telephone number, the telephone recording module starts to record the telephone audio of the mobile terminal;
and the recording sending module is used for ending the call between the mobile terminal and the telephone number and sending the recorded telephone audio ciphertext to the server.
9. A telephone reporting system based on a mobile terminal, comprising: a client and a server; wherein,
the client comprises: the system comprises a number acquisition module, a telephone recording module and a recording sending module;
the server includes: a number identification module; wherein,
the number acquisition module is used for acquiring a telephone number ciphertext of the mobile terminal where the incoming call is located, and sending the telephone number ciphertext to the server for identification;
the telephone recording module is used for receiving an identification result which is fed back by the server and indicates that the telephone number is a suspicious number, and when the mobile terminal is connected with the telephone number, the telephone recording module starts to record the telephone audio of the mobile terminal;
the recording sending module is used for ending the call between the mobile terminal and the telephone number and sending the recorded telephone audio ciphertext to the server;
and the number identification module is used for identifying the received telephone number ciphertext from the client and feeding back an identification result to the client.
10. A fraud telephone interception system based on a mobile terminal, comprising: the system comprises a server and a client positioned at the mobile terminal;
wherein the client comprises:
the comparison result receiving module is used for receiving the telephone recording ciphertext decrypted by the server, and comparing the decrypted telephone recording ciphertext with a fraudulent telephone voiceprint sample in a preset voiceprint database to obtain a comparison result;
the fraudulent call intercepting module is used for intercepting the fraudulent call according to an interception prompt of the fraudulent call corresponding to the decrypted telephone record ciphertext, which is sent by the server, if the comparison result shows that the decrypted telephone record ciphertext is from the fraudulent call;
the server includes:
the recording receiving and decrypting module is used for receiving and decrypting the telephone recording ciphertext sent by the client;
the recording comparison module is used for comparing the decrypted telephone recording ciphertext with a fraudulent telephone voiceprint sample in a preset voiceprint database;
the fraud telephone determining module is used for determining that the decrypted telephone recording ciphertext comes from a fraud telephone if the comparison result shows that the decrypted telephone recording ciphertext is the same as or the similarity of the fraud telephone voiceprint sample meets the comparison requirement;
and the interception prompt sending module is used for sending an interception prompt for intercepting the fraudulent call corresponding to the decrypted telephone recording ciphertext to the client.
CN201410828561.0A 2014-12-25 2014-12-25 Telephone reporting method, device and system based on mobile terminal Pending CN104639770A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410828561.0A CN104639770A (en) 2014-12-25 2014-12-25 Telephone reporting method, device and system based on mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410828561.0A CN104639770A (en) 2014-12-25 2014-12-25 Telephone reporting method, device and system based on mobile terminal

Publications (1)

Publication Number Publication Date
CN104639770A true CN104639770A (en) 2015-05-20

Family

ID=53218056

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410828561.0A Pending CN104639770A (en) 2014-12-25 2014-12-25 Telephone reporting method, device and system based on mobile terminal

Country Status (1)

Country Link
CN (1) CN104639770A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105679323A (en) * 2015-12-24 2016-06-15 讯飞智元信息科技有限公司 Number finding method and system
CN106304044A (en) * 2015-05-28 2017-01-04 宇龙计算机通信科技(深圳)有限公司 A kind of strengthen the call method of safety, device and communication terminal
WO2017035945A1 (en) * 2015-08-28 2017-03-09 宇龙计算机通信科技(深圳)有限公司 Method, device and system for marking conversation caller
CN106899682A (en) * 2017-03-13 2017-06-27 车智互联(北京)科技有限公司 A kind of method and platform based on call center's treatment complaints and denunciation
CN108270931A (en) * 2016-12-30 2018-07-10 联芯科技有限公司 The anti-anti-harassment method of swindle of mobile phone based on IMEI labels
CN109698884A (en) * 2017-10-24 2019-04-30 中国电信股份有限公司 Fraudulent call recognition methods and system
CN109920447A (en) * 2019-01-29 2019-06-21 天津大学 Recording fraud detection method based on sef-adapting filter Amplitude & Phase feature extraction
CN110300232A (en) * 2018-03-23 2019-10-01 中国电信股份有限公司 Information collecting method and system, operation exchange and control device, evidence obtaining platform
CN113948092A (en) * 2021-09-01 2022-01-18 联通(广东)产业互联网有限公司 Target person identification method, system and device based on voiceprint and storage medium
WO2023011024A1 (en) * 2021-08-05 2023-02-09 中兴通讯股份有限公司 Method for reporting malicious call, terminal, electronic device, and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102724355A (en) * 2012-05-04 2012-10-10 北京百纳威尔科技有限公司 Garbage information processing method and mobile phone termina
CN103731832A (en) * 2013-12-26 2014-04-16 黄伟 System and method for preventing phone and short message frauds
CN103795834A (en) * 2012-10-29 2014-05-14 李丽 Recording method capable of uploading conversation recording file of smart phone and dedicated recording apparatus
CN104184871A (en) * 2013-05-27 2014-12-03 腾讯科技(深圳)有限公司 Method and device for prompting crank call number

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102724355A (en) * 2012-05-04 2012-10-10 北京百纳威尔科技有限公司 Garbage information processing method and mobile phone termina
CN103795834A (en) * 2012-10-29 2014-05-14 李丽 Recording method capable of uploading conversation recording file of smart phone and dedicated recording apparatus
CN104184871A (en) * 2013-05-27 2014-12-03 腾讯科技(深圳)有限公司 Method and device for prompting crank call number
CN103731832A (en) * 2013-12-26 2014-04-16 黄伟 System and method for preventing phone and short message frauds

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106304044A (en) * 2015-05-28 2017-01-04 宇龙计算机通信科技(深圳)有限公司 A kind of strengthen the call method of safety, device and communication terminal
WO2017035945A1 (en) * 2015-08-28 2017-03-09 宇龙计算机通信科技(深圳)有限公司 Method, device and system for marking conversation caller
CN105679323B (en) * 2015-12-24 2019-09-03 讯飞智元信息科技有限公司 A kind of number discovery method and system
CN105679323A (en) * 2015-12-24 2016-06-15 讯飞智元信息科技有限公司 Number finding method and system
CN108270931A (en) * 2016-12-30 2018-07-10 联芯科技有限公司 The anti-anti-harassment method of swindle of mobile phone based on IMEI labels
CN108270931B (en) * 2016-12-30 2020-02-07 联芯科技有限公司 Mobile phone fraud and disturbance prevention method based on IMEI mark
CN106899682A (en) * 2017-03-13 2017-06-27 车智互联(北京)科技有限公司 A kind of method and platform based on call center's treatment complaints and denunciation
CN106899682B (en) * 2017-03-13 2020-04-10 车智互联(北京)科技有限公司 Method and platform for processing complaint reports based on call center
CN109698884A (en) * 2017-10-24 2019-04-30 中国电信股份有限公司 Fraudulent call recognition methods and system
CN109698884B (en) * 2017-10-24 2021-04-23 中国电信股份有限公司 Fraud call identification method and system
CN110300232A (en) * 2018-03-23 2019-10-01 中国电信股份有限公司 Information collecting method and system, operation exchange and control device, evidence obtaining platform
CN109920447A (en) * 2019-01-29 2019-06-21 天津大学 Recording fraud detection method based on sef-adapting filter Amplitude & Phase feature extraction
CN109920447B (en) * 2019-01-29 2021-07-13 天津大学 Recording fraud detection method based on adaptive filter amplitude phase characteristic extraction
WO2023011024A1 (en) * 2021-08-05 2023-02-09 中兴通讯股份有限公司 Method for reporting malicious call, terminal, electronic device, and storage medium
CN113948092A (en) * 2021-09-01 2022-01-18 联通(广东)产业互联网有限公司 Target person identification method, system and device based on voiceprint and storage medium

Similar Documents

Publication Publication Date Title
CN104639770A (en) Telephone reporting method, device and system based on mobile terminal
CN106791220B (en) Method and system for preventing telephone fraud
JP6559668B2 (en) Mobile terminal number intelligent protection system and method
US9740940B2 (en) Event triggered location based participatory surveillance
US9769688B2 (en) Device and method for prompting information about Wi-Fi signal
CN105144767B (en) For checking the device and method and user terminal of message
CA2524226C (en) Speaker recognition in a multi-speaker environment and comparison of several voice prints to many
US9762462B2 (en) Method and apparatus for providing an anti-bullying service
CN105704005B (en) Malicious user reporting method and device, and reported information processing method and device
CN109660823A (en) Video distribution method, apparatus, electronic equipment and storage medium
CN110706030B (en) Advertisement putting method, device, system and storage medium
CN104168560A (en) Method for displaying related information of unfamiliar number, monitoring device and cloud server
CN112416730A (en) User internet behavior analysis method and device, electronic equipment and storage medium
US10033850B2 (en) Method for real time displaying information and mobile communication terminal
EP2993607A1 (en) Privacy compliant event analysis
CN110716973A (en) Big data based security event reporting platform and method
CN114598671B (en) Session message processing method, device, storage medium and electronic equipment
CN112445870A (en) Knowledge graph string parallel case analysis method based on mobile phone evidence obtaining electronic data
CN110163013B (en) Method and equipment for detecting sensitive information
CN114338617A (en) Audio and video auditing method and illegal number identification method based on video call
CN114338915A (en) Caller ID risk identification method, caller ID risk identification device, caller ID risk identification equipment and storage medium
CN104394258B (en) The method and apparatus that contact method change to communication object is handled
CN117097571A (en) Method, system, device and medium for detecting network transmission sensitive data
CN111489276B (en) Personnel management method and related device
Bordjiba et al. Data-driven approach for automatic telephony threat analysis and campaign detection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150520

RJ01 Rejection of invention patent application after publication