CN106161749A - A kind of malicious call recognition methods, and device - Google Patents

A kind of malicious call recognition methods, and device Download PDF

Info

Publication number
CN106161749A
CN106161749A CN201510172266.9A CN201510172266A CN106161749A CN 106161749 A CN106161749 A CN 106161749A CN 201510172266 A CN201510172266 A CN 201510172266A CN 106161749 A CN106161749 A CN 106161749A
Authority
CN
China
Prior art keywords
identification information
phone
call
voice data
fallacious message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510172266.9A
Other languages
Chinese (zh)
Other versions
CN106161749B (en
Inventor
刘杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Shenzhen Tencent Computer Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Computer Systems Co Ltd filed Critical Shenzhen Tencent Computer Systems Co Ltd
Priority to CN201510172266.9A priority Critical patent/CN106161749B/en
Publication of CN106161749A publication Critical patent/CN106161749A/en
Application granted granted Critical
Publication of CN106161749B publication Critical patent/CN106161749B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention discloses a kind of malicious call recognition methods, and device, the wherein realization of method includes: when there being phone incoming call, connects described phone and obtains voice data;Extract the identification information of described voice data, use described identification information to mate with fallacious message;If the match is successful with fallacious message for described identification information, it is determined that described phone is malicious call.Connect phone be equipment be automatically performed be not user operation perform process, say, that equipment be automatically performed connection and be extracted voice data, this process can be sightless for a user;Determine malicious call by the identification information of voice data, then malicious call can be avoided to cause the situation of None-identified by hiding its own telephone number, thus accurately identify malicious call.

Description

A kind of malicious call recognition methods, and device
Technical field
The present invention relates to communication technical field, particularly to a kind of malicious call recognition methods, and device.
Background technology
The phone that malicious call produces during referring mainly to the various non-normal uses such as harassing and wrecking/swindle/advertisement is exhaled Crying, daily life is caused puzzlement by these callings.Therefore, user has demand to these malice electricity Words shield, thus reduce normal life and be disturbed.
Harassing and wrecking or fraudulent call Interception Technology at present, the number being typically based on user feedback is marked Realize.As a example by Cloud Server realizes, idiographic flow is: a certain telephone number of user feedback is malice electricity Words number, to Cloud Server, is then recorded this telephone number by Cloud Server;At above-mentioned telephone number again Secondary when dialing other subscriber phones, first to the telephone number of server lookup incoming call whether other phones can For malicious call number, in the case that this incoming call telephone number of acquisition has been labeled as malice, determine The telephone number of this incoming call is malicious call number, and intercepts the phone of incoming call.
But the application telephone number that user can be allowed random due to existing virtual operator makes malicious call Proud hiding, cause the mode recording malicious call number cannot accurately identify malicious call.
Content of the invention
Embodiments provide a kind of malicious call recognition methods, and device, be used for accurately identifying evil Meaning phone.
A kind of malicious call recognition methods, comprising:
When there being phone incoming call, connect described phone and obtain voice data;
Extract the identification information of described voice data, use described identification information to mate with fallacious message;
If the match is successful with fallacious message for described identification information, it is determined that described phone is malicious call.
A kind of malicious call identification device, comprising:
Audio frequency acquiring unit, for when there being phone incoming call, connects described phone and obtains voice data;
Information extraction unit, for extracting the identification information of described voice data;
Information matching unit, is used for using described identification information to mate with fallacious message;
Phone confirmation unit, if the match is successful with fallacious message for described identification information, it is determined that described Phone is malicious call.
As can be seen from the above technical solutions, the embodiment of the present invention has the advantage that connection phone is to set It is not the process that user operation performs for be automatically performed, say, that equipment is automatically performed connection and carries Having taken voice data, this process can be sightless for a user;By the identification of voice data Information determines malicious call, then malicious call can be avoided to cause knowing by hiding its own telephone number Other situation, thus accurately identify malicious call.
Brief description
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, in embodiment being described below The required accompanying drawing using is briefly introduced, it should be apparent that, the accompanying drawing in describing below is only this Some bright embodiments, from the point of view of those of ordinary skill in the art, are not paying creative work On the premise of, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is embodiment of the present invention method flow schematic diagram;
Fig. 2 is embodiment of the present invention method flow schematic diagram;
Fig. 3 is embodiment of the present invention apparatus structure schematic diagram;
Fig. 4 is embodiment of the present invention apparatus structure schematic diagram;
Fig. 5 is embodiment of the present invention apparatus structure schematic diagram;
Fig. 6 is embodiment of the present invention apparatus structure schematic diagram;
Fig. 7 is embodiment of the present invention apparatus structure schematic diagram.
Detailed description of the invention
In order to make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to this Invention is described in further detail, it is clear that described embodiment is only that the present invention is a part of to be implemented Example, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art exist The all other embodiment being obtained under the premise of not making creative work, broadly falls into present invention protection Scope.
Embodiments provide a kind of malicious call recognition methods, as shown in Figure 1, comprising:
101: when there being phone incoming call, connect above-mentioned phone and obtain voice data;
The executive agent of the embodiment of the present invention can be telephone plant, can be generally mobile phone, it is also possible to be There is the panel computer of call function or its executive agent is not made uniqueness limit by other equipment the present embodiment Fixed.In embodiments of the present invention, connect phone be equipment be automatically performed be not user operation perform Process, say, that equipment is automatically performed connection and is extracted voice data, and this process is for a user Can be sightless.The malicious call recognition methods of the embodiment of the present invention is owing to being equipment turn on automatically electricity Words, therefore whether this function is opened and can be turned on and off by user's configuration.
In addition, for the embodiment of the present invention, have some phones to be to can confirm that not need to perform this The operation such as the identification information of bright embodiment subsequent extracted voice data and coupling, so can save not Necessary data handling procedure, reduces the interference to call flow process for the equipment, specific as follows: above-mentioned connect Leading to above-mentioned phone to obtain before voice data, whether said method also comprises determining that the source of phone incoming call For white list user, if so, then continue above-mentioned call, wait user to answer;If it is not, then perform The above-mentioned phone of above-mentioned connection obtains voice data.
In the present embodiment, white list user refer to may determine that be not malice incoming call situation, for example: Present in the address list of mobile phone, telephone number is as incoming call source, or, it is known that public telephone incoming call, Such as: bank, official's phone such as emergent.Concrete white list, can be to should have according to different information types This is repeated no more by the different acquisition mode embodiment of the present invention.
102: extract the identification information of above-mentioned voice data, use above-mentioned identification information and fallacious message to carry out Coupling;
In the present embodiment, identification information is the information of difference voice data, comprises the feature of voice data, Can be voiceprint also can be to process later characteristic information based on other data, as long as can distinguish respectively Plant and be all possible in the information theory of audio frequency.Following example will give two of which and preferably illustrate:
Above-mentioned identification information includes: voiceprint and/or text message, and above-mentioned text message is known by voice Not above-mentioned voice data obtains.
Voiceprint is by the characteristic information of Application on Voiceprint Recognition, Application on Voiceprint Recognition: refer to can only identify someone or The sound characteristic of something.Text message is that the text message obtaining based on speech recognition can realize text phase Identify like degree.Speech recognition: by user's word is passed through speech analysis method by the literary composition described in user Word extracts.Text similarity identification: refer to by carrying out participle to substantial amounts of text, word frequency analysis or The meaning or the same or like text of content are found out in text in person's semantic analysis.
The embodiment of the present invention additionally provides the implementation of coupling, specific as follows: the above-mentioned identification of above-mentioned use Information is mated with fallacious message, comprising:
Send above-mentioned identification information to server, receive server and use above-mentioned identification information and fallacious message The matching result returning after mating.
Need database support owing to being identified information with mating of fallacious message, in order to ensure to identify Database can be placed on the server in high in the clouds, therefore mate by upgrading in time of accuracy rate and database Process can be the interaction of terminal and server.The server in high in the clouds can utilize intrinsic advantage timely Update the database of fallacious message.
103: if the match is successful with fallacious message for above-mentioned identification information, it is determined that above-mentioned phone is malicious call.
It is understood that without the match is successful, then can be considered as non-malicious phone, then can To continue above-mentioned call, user can hear calling the tinkle of bells.Owing to now phone has turned on, can With up after switching to calling party's playing RBT, it is to avoid mourning in silence of calling party's stand-by period.In addition, continue After the continuous call scheduled time, if user does not answer, then need that equipment is disconnected call and connect. Furthermore it is also possible to inform that callee does not receives calls to calling party.It is defined as malice electricity if the match is successful Words, then can directly hang up, thus realize the shielding of malicious call.Can also further display screen Cover the result of phone.Process after malicious call identification, the embodiment of the present invention is not defined.
The embodiment of the present invention, connect phone be equipment be automatically performed be not user operation perform process, That is equipment is automatically performed connection and is extracted voice data, and this process can be for a user Sightless;Determine malicious call by the identification information of voice data, then malicious call can be avoided to lead to Cross and hide the situation that its own telephone number causes None-identified, thus accurately identify malicious call.
The embodiment of the present invention additionally provides the side of implementing using identification information to mate with fallacious message Formula is as follows: above-mentioned use above-mentioned identification information carries out mating including with fallacious message: calculate above-mentioned identification Information and the similarity of fallacious message;The match is successful includes for above-mentioned identification information and fallacious message: calculates To above-mentioned similarity exceed predetermined threshold.
The process that the present embodiment calculates similarity can realize at server-side, it is also possible in terminal side Realize, can determine, with the principle of the database close to fallacious message, the equipment of realization.
The embodiment of the present invention additionally provides the update scheme of the database of fallacious message, specific as follows: above-mentioned Method also includes: if it fails to match with fallacious message for above-mentioned identification information, then continue above-mentioned call, User is waited to answer;After user answers, if receiving the label information that above-mentioned phone is malicious call, Then above-mentioned identification information is stored in fallacious message.
If there is this locality in the database of fallacious message, then is stored in fallacious message and can be stored in this locality Database, if database presence server one end of fallacious message, then being stored in fallacious message could be It is sent to server, be stored in the database of server-side by server.The process of implementing can foundation Needs are set, and the present embodiment is not made uniqueness and limited.
The embodiment of the present invention, by providing a concrete example, is illustrated by following example.
The basic thought of the embodiment of the present invention and principle: marked by user and network analysis, find out every day Calling the bad person in user, the identification information such as voiceprint extracting bad person sets up the number of fallacious message According to storehouse.User is when receiving a phone, and cell phone software first allows phone acquiescence connect some seconds, extracts Acoustic information in phone and existing bad person's vocal print are compared or extract in text after acoustic information Hold to identify and compare with fallacious message, thus identify the harassing and wrecking that current incoming call user is bad person Or fraudulent call.
The embodiment of the present invention realizes that process is broadly divided into five parts:
First, bad person's initial seed obtains:
Feedback after being answered the call by user and mark, and system voice is identified laggard style of writing this Analyze, find out the voice data playing harassing and wrecking or fraudulent call.
2nd, voiceprint extraction:
After obtaining the voice data of bad person, extract its voiceprint, generate malice vocal print storehouse.
3rd, speech recognition:
After obtaining the voice data of bad person, carry out speech recognition, dialog context is extracted, generate and dislike Meaning text library.
4th, bad person's Real time identification:
Answering the call in module user, inserting and listen before module in advance, user is receiving coming of a number During electricity, before user receives calls, then closing of the circuit is first extracted the voice of above some seconds by system Voice data: extracting the process after voice data can have a following two kinds:
1st, the voiceprint extracting voice data compares with the fallacious message in system.If voiceprint and Voice print matching in fallacious message is then considered malicious call, directly hangs.
2nd, carry out speech recognition to voice data by the Text Feature Extraction that relates in voice out, then use and dislike It is mated by meaning information, and determination is the content of malice, is if it is judged as malicious call, Directly hang.
5th, bad person's seed enriches:
If the user while after receiving calls, determination is malicious call, but before system, there is no seed, Then user can be marked as malice after receiving calls, and then its vocal print is believed by system by after examination & verification Breath extracts the database adding fallacious message, completes to enrich seed bank.
Concrete grammar realizes flow process, can be refering to shown in Fig. 2, comprising:
201: phone incoming call;
202: the system control sytsem of terminal is answered, the audio-frequency information of some seconds of extraction phone, extracts sound Frequently the identification information of information;Specifically may include that voiceprint and/or the text message extracting audio-frequency information.
203: use identification information to mate with the fallacious message in the database of fallacious message, it is thus achieved that Join result;The difference of corresponding identification information, the database of fallacious message can be different, for example, include: sound The malicious data storehouse of line information, and/or, the malicious data storehouse of text message.
204: determine it is malicious call according to matching result, entrance 207 is hung up in control;
205: if determining non-malicious according to matching result, then control starts jingle bell, wait user to answer;
206: user receives calls, however, it is determined that malice so will identify the more capable data to fallacious message of information Storehouse;If non-malicious, after completing to answer, enter 207;
207: this time phone on-hook terminates call.
The embodiment of the present invention, is not based on calling number and is identified, and therefore can effectively identify malice Phone, can effectively prevent bad person's number of changing from walking around.
The embodiment of the present invention additionally provides a kind of malicious call identification device, as shown in Figure 3, comprising:
Audio frequency acquiring unit 301, for when there being phone incoming call, connects above-mentioned phone and obtains voice data;
Information extraction unit 302, for extracting the identification information of above-mentioned voice data;
Information matching unit 303, is used for using above-mentioned identification information to mate with fallacious message;
Phone confirmation unit 304, if the match is successful with fallacious message for above-mentioned identification information, it is determined that on Stating phone is malicious call.
The executive agent of the embodiment of the present invention can be telephone plant, can be generally mobile phone, it is also possible to be There is the panel computer of call function or its executive agent is not made uniqueness limit by other equipment the present embodiment Fixed.In embodiments of the present invention, connect phone be equipment be automatically performed be not user operation perform Process, say, that equipment is automatically performed connection and is extracted voice data, and this process is for a user Can be sightless.The malicious call recognition methods of the embodiment of the present invention is owing to being equipment turn on automatically electricity Words, therefore whether this function is opened and can be turned on and off by user's configuration.
It is understood that without the match is successful, then can be considered as non-malicious phone, then can To continue above-mentioned call, user can hear calling the tinkle of bells.Owing to now phone has turned on, can With up after switching to calling party's playing RBT, it is to avoid mourning in silence of calling party's stand-by period.In addition, continue After the continuous call scheduled time, if user does not answer, then need that equipment is disconnected call and connect. Furthermore it is also possible to inform that callee does not receives calls to calling party.It is defined as malice electricity if the match is successful Words, then can directly hang up, thus realize the shielding of malicious call.Can also further display screen Cover the result of phone.Process after malicious call identification, the embodiment of the present invention is not defined.
The embodiment of the present invention, connect phone be equipment be automatically performed be not user operation perform process, That is equipment is automatically performed connection and is extracted voice data, and this process can be for a user Sightless;Determine malicious call by the identification information of voice data, then malicious call can be avoided to lead to Cross and hide the situation that its own telephone number causes None-identified, thus accurately identify malicious call.
In the present embodiment, identification information is the information of difference voice data, comprises the feature of voice data, Can be voiceprint also can be to process later characteristic information based on other data, as long as can distinguish respectively Plant and be all possible in the information theory of audio frequency.Following example will give two of which and preferably illustrate:
Alternatively, above-mentioned identification information includes:
Voiceprint and/or text message, above-mentioned text message is obtained by the above-mentioned voice data of speech recognition.
Voiceprint is by the characteristic information of Application on Voiceprint Recognition, Application on Voiceprint Recognition: refer to can only identify someone or The sound characteristic of something.Text message is that the text message obtaining based on speech recognition can realize text phase Identify like degree.Speech recognition: by user's word is passed through speech analysis method by the literary composition described in user Word extracts.Text similarity identification: refer to by carrying out participle to substantial amounts of text, word frequency analysis or The meaning or the same or like text of content are found out in text in person's semantic analysis.
The embodiment of the present invention additionally provides the side of implementing using identification information to mate with fallacious message Formula, as follows: alternatively, above-mentioned information matching unit 303, it is used for calculating above-mentioned identification information and malice letter The similarity of breath;
Above-mentioned phone confirmation unit 304, if being used for the calculated above-mentioned phase of above-mentioned information matching unit 303 Exceed predetermined threshold like degree, it is determined that above-mentioned phone is malicious call.
The process that the present embodiment calculates similarity can realize at server-side, it is also possible in terminal side Realize, can determine, with the principle of the database close to fallacious message, the equipment of realization.
In addition, for the embodiment of the present invention, have some phones to be to can confirm that not need to perform this The operation such as the identification information of bright embodiment subsequent extracted voice data and coupling, so can save not Necessary data handling procedure, reduces the interference to call flow process for the equipment, specific as follows: further Ground, as shown in Figure 4, said apparatus also includes:
Logic control element 401, obtains audio frequency for connecting above-mentioned phone in above-mentioned audio frequency acquiring unit 301 Before data, determine whether the source of phone incoming call is white list user, if so, then continue above-mentioned phone Calling, waits user to answer;
Above-mentioned audio frequency acquiring unit 301, is used for after above-mentioned logic control element 401 determines that result is no, Connect above-mentioned phone and obtain voice data.
In the present embodiment, white list user refer to may determine that be not malice incoming call situation, for example: Present in the address list of mobile phone, telephone number is as incoming call source, or, it is known that public telephone incoming call, Such as: bank, official's phone such as emergent.Concrete white list, can be to should have according to different information types This is repeated no more by the different acquisition mode embodiment of the present invention.
The embodiment of the present invention additionally provides the update scheme of the database of fallacious message, specific as follows: to enter one Step ground, as it is shown in figure 5, said apparatus also includes:
Answer control unit 501, if it fails to match with fallacious message for above-mentioned identification information, then in continuation State call, wait user to answer;
Information maintenance unit 502, for after user answers, if receiving above-mentioned phone is malicious call Label information, then be stored in fallacious message by above-mentioned identification information.
If there is this locality in the database of fallacious message, then is stored in fallacious message and can be stored in this locality Database, if database presence server one end of fallacious message, then being stored in fallacious message could be It is sent to server, be stored in the database of server-side by server.The process of implementing can foundation Needs are set, and the present embodiment is not made uniqueness and limited.
The embodiment of the present invention additionally provides the implementation of coupling, specific as follows: alternatively, above-mentioned information Matching unit 303, for sending above-mentioned identification information to server, receives server and uses above-mentioned identification letter The matching result that breath returns after mating with fallacious message.
Need database support owing to being identified information with mating of fallacious message, in order to ensure to identify Database can be placed on the server in high in the clouds, therefore mate by upgrading in time of accuracy rate and database Process can be the interaction of terminal and server.The server in high in the clouds can utilize intrinsic advantage timely Update the database of fallacious message.
The embodiment of the present invention additionally provides another kind of malicious call identification device, as shown in Figure 6, comprising: Receiver the 601st, transmitter the 602nd, processor 603 and memory 604;
Wherein, processor 603, for when there being phone incoming call, connect above-mentioned phone and obtain voice data; Extract the identification information of above-mentioned voice data, use above-mentioned identification information to mate with fallacious message;If The match is successful with fallacious message for above-mentioned identification information, it is determined that above-mentioned phone is malicious call.
The executive agent of the embodiment of the present invention can be telephone plant, can be generally mobile phone, it is also possible to be There is the panel computer of call function or its executive agent is not made uniqueness limit by other equipment the present embodiment Fixed.In embodiments of the present invention, connect phone be equipment be automatically performed be not user operation perform Process, say, that equipment is automatically performed connection and is extracted voice data, and this process is for a user Can be sightless.The malicious call recognition methods of the embodiment of the present invention is owing to being equipment turn on automatically electricity Words, therefore whether this function is opened and can be turned on and off by user's configuration.
It is understood that without the match is successful, then can be considered as non-malicious phone, then can To continue above-mentioned call, user can hear calling the tinkle of bells.Owing to now phone has turned on, can With up after switching to calling party's playing RBT, it is to avoid mourning in silence of calling party's stand-by period.In addition, continue After the continuous call scheduled time, if user does not answer, then need that equipment is disconnected call and connect. Furthermore it is also possible to inform that callee does not receives calls to calling party.It is defined as malice electricity if the match is successful Words, then can directly hang up, thus realize the shielding of malicious call.Can also further display screen Cover the result of phone.Process after malicious call identification, the embodiment of the present invention is not defined.
The embodiment of the present invention, connect phone be equipment be automatically performed be not user operation perform process, That is equipment is automatically performed connection and is extracted voice data, and this process can be for a user Sightless;Determine malicious call by the identification information of voice data, then malicious call can be avoided to lead to Cross and hide the situation that its own telephone number causes None-identified, thus accurately identify malicious call.
In addition, for the embodiment of the present invention, have some phones to be to can confirm that not need to perform this The operation such as the identification information of bright embodiment subsequent extracted voice data and coupling, so can save not Necessary data handling procedure, reduces the interference to call flow process for the equipment, specific as follows: above-mentioned place Reason device 603, is additionally operable to, before connecting above-mentioned phone acquisition voice data, determine that the source of phone incoming call is No for white list user, if so, then continue above-mentioned call, wait user to answer;If it is not, then hold The above-mentioned phone of the above-mentioned connection of row obtains voice data.
In the present embodiment, white list user refer to may determine that be not malice incoming call situation, for example: Present in the address list of mobile phone, telephone number is as incoming call source, or, it is known that public telephone incoming call, Such as: bank, official's phone such as emergent.Concrete white list, can be to should have according to different information types This is repeated no more by the different acquisition mode embodiment of the present invention.
In the present embodiment, identification information is the information of difference voice data, comprises the feature of voice data, Can be voiceprint also can be to process later characteristic information based on other data, as long as can distinguish respectively Plant and be all possible in the information theory of audio frequency.Following example will give two of which and preferably illustrate:
Above-mentioned identification information includes: voiceprint and/or text message, and above-mentioned text message is known by voice Not above-mentioned voice data obtains.
Voiceprint is by the characteristic information of Application on Voiceprint Recognition, Application on Voiceprint Recognition: refer to can only identify someone or The sound characteristic of something.Text message is that the text message obtaining based on speech recognition can realize text phase Identify like degree.Speech recognition: by user's word is passed through speech analysis method by the literary composition described in user Word extracts.Text similarity identification: refer to by carrying out participle to substantial amounts of text, word frequency analysis or The meaning or the same or like text of content are found out in text in person's semantic analysis.
The embodiment of the present invention additionally provides the implementation of coupling, specific as follows: above-mentioned processor 603, uses Mate with fallacious message in using above-mentioned identification information, comprising:
Send above-mentioned identification information to server, receive server and use above-mentioned identification information and fallacious message The matching result returning after mating.
Need database support owing to being identified information with mating of fallacious message, in order to ensure to identify Database can be placed on the server in high in the clouds, therefore mate by upgrading in time of accuracy rate and database Process can be the interaction of terminal and server.The server in high in the clouds can utilize intrinsic advantage timely Update the database of fallacious message.
The embodiment of the present invention additionally provides the side of implementing using identification information to mate with fallacious message Formula, as follows: above-mentioned processor 603, it is used for using above-mentioned identification information to carry out mating including with fallacious message: Calculate the similarity of above-mentioned identification information and fallacious message;Above-mentioned processor 603, is used for identifying information and evil Meaning information matches successfully includes: calculated above-mentioned similarity exceedes predetermined threshold.
The process that the present embodiment calculates similarity can realize at server-side, it is also possible in terminal side Realize, can determine, with the principle of the database close to fallacious message, the equipment of realization.
The embodiment of the present invention additionally provides the update scheme of the database of fallacious message, specific as follows: above-mentioned Processor 603, if being additionally operable to above-mentioned identification information, it fails to match with fallacious message, then continue above-mentioned phone and exhale Cry, wait user to answer;After user answers, if receiving the mark letter that above-mentioned phone is malicious call Breath, then be stored in fallacious message by above-mentioned identification information.
If there is this locality in the database of fallacious message, then is stored in fallacious message and can be stored in this locality Database, if database presence server one end of fallacious message, then being stored in fallacious message could be It is sent to server, be stored in the database of server-side by server.The process of implementing can foundation Needs are set, and the present embodiment is not made uniqueness and limited.
The embodiment of the present invention additionally provides another kind of malicious call identification device, as it is shown in fig. 7, in order to just In explanation, illustrate only the part related to the embodiment of the present invention, concrete ins and outs do not disclose, please With reference to embodiment of the present invention method part.This device as a example by terminal, this terminal can for include mobile phone, Panel computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, Point-of-sale terminal), any terminal device such as vehicle-mounted computer, as a example by terminal is as mobile phone:
Fig. 7 is illustrated that the block diagram of the part-structure of the mobile phone related to the terminal of embodiment of the present invention offer. With reference to Fig. 7, mobile phone includes: radio frequency (Radio Frequency, RF) circuit the 710th, memory is the 720th, Input block the 730th, display unit the 740th, sensor the 750th, voicefrequency circuit the 760th, Wireless Fidelity (wireless Fidelity, WiFi) module the 770th, the parts such as processor 780 and power supply 790.People in the art Member is appreciated that the handset structure shown in Fig. 7 is not intended that the restriction to mobile phone, can include than figure Show more or less of parts, or combine some parts, or different parts are arranged.
Carry out concrete introduction below in conjunction with Fig. 7 each component parts to mobile phone:
RF circuit 710 can be used for receiving and sending messages or in communication process, the reception of signal and transmission, especially, After receiving the downlink information of base station, process to processor 780;In addition, send out designing up data Give base station.Generally, RF circuit 710 including but not limited to antenna, at least one amplifier, transmitting-receiving letter Machine, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..Additionally, RF circuit 710 can also be communicated with network and other equipment by radio communication.Above-mentioned radio communication is permissible Use arbitrary communication standard or agreement, including but not limited to global system for mobile communications (Global System Of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), broadband CDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 720 can be used for storage software program and module, and processor 780 is stored in by running The software program of memory 720 and module, thus perform at the application of various function and the data of mobile phone Reason.Memory 720 can mainly include storage program area and storage data field, and wherein, storage program area can Application program needed for storage operating system, at least one function (broadcast by such as sound-playing function, image Playing function etc.) etc.;Storage data field can store data (the such as audio frequency being created according to the use of mobile phone Data, phone directory etc.) etc..Additionally, memory 720 can include high-speed random access memory, also Can include nonvolatile memory, for example, at least one disk memory, flush memory device or other Volatile solid-state part.
Input block 730 can be used for receiving numeral or the character information of input, and produces the use with mobile phone The key signals input that family is arranged and function control is relevant.Specifically, input block 730 can include touch-control Panel 731 and other input equipments 732.Contact panel 731, also referred to as touch-screen, can collect user (such as user uses any applicable object or attached such as finger, stylus in touch operation on or near it Operation on contact panel 731 or near contact panel 731 for the part), and according to formula set in advance Drive corresponding attachment means.Optionally, contact panel 731 can include touch detecting apparatus and touch control Two parts of device processed.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation The signal bringing, transmits a signal to touch controller;Touch controller receives from touch detecting apparatus Touch information, and it is converted into contact coordinate, then give processor 780, and can reception processing device 780 The order sent simultaneously is performed.Furthermore, it is possible to use resistance-type, condenser type, infrared ray and surface The polytypes such as sound wave realize contact panel 731.Except contact panel 731, input block 730 is all right Including other input equipments 732.Specifically, other input equipments 732 can include but is not limited to secondary or physical bond In dish, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more.
Display unit 740 can be used for showing the information being inputted by user or the information being supplied to user and hand The various menus of machine.Display unit 740 can include display floater 741, optionally, can use liquid crystal Show device (Liquid Crystal Display, LCD), Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) etc. form configure display floater 741.Further, contact panel 731 can cover Display floater 741, after contact panel 731 detects the touch operation on or near it, sends place to Reason device 780, to determine the type of touch event, is showing according to the type of touch event with preprocessor 780 Show and corresponding visual output is provided on panel 741.Although in the figure 7, contact panel 731 and display surface Plate 741 is input and the input function realizing mobile phone as two independent parts, but real at some Execute in example, can be by integrated to contact panel 731 and display floater 741 and that realize mobile phone input and output Function.
Mobile phone may also include at least one sensor 750, such as optical sensor, motion sensor and other Sensor.Specifically, optical sensor can include ambient light sensor and proximity transducer, wherein, environment Optical sensor can regulate the brightness of display floater 741 according to the light and shade of ambient light, and proximity transducer can When mobile phone moves in one's ear, close display floater 741 and/or backlight.As the one of motion sensor, Accelerometer sensor can detect the size of (generally three axles) acceleration in all directions, can examine when static Measure size and the direction of gravity, can be used for identifying application (such as horizontal/vertical screen switching, the phase of mobile phone attitude Close game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Extremely The gyroscope that can also configure in mobile phone, barometer, hygrometer, thermometer, infrared ray sensor etc. other Sensor, does not repeats them here.
Voicefrequency circuit the 760th, loudspeaker 761, microphone 762 can provide the audio frequency between user and mobile phone to connect Mouthful.The signal of telecommunication after the voice data conversion that voicefrequency circuit 760 can will receive, is transferred to loudspeaker 761, Loudspeaker 761 is converted to voice signal output;On the other hand, the sound letter that microphone 762 will be collected Number be converted to the signal of telecommunication, after being received by voicefrequency circuit 760, be converted to voice data, then voice data is defeated Go out after processor 780 processes, through RF circuit 710 being sent to such as another mobile phone, or by audio frequency number According to output to memory 720 to process further.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user to receive by WiFi module 770 Sending e-mails, browsing webpage and access streaming video etc., it has provided the user wireless broadband interconnection Net accesses.Although Fig. 7 shows WiFi module 770, but it is understood that, it is simultaneously not belonging to hand Must be configured into of machine, can omit completely as required in not changing the scope of essence of invention.
Processor 780 is the control centre of mobile phone, utilizes each of various interface and the whole mobile phone of connection Individual part, the software program being stored in memory 720 by operation or execution and/or module, and adjust By the data being stored in memory 720, perform the various function of mobile phone and process data, thus opponent Machine carries out integral monitoring.Optionally, processor 780 can include one or more processing unit;Preferably, Processor 780 can integrated application processor and modem processor, wherein, application processor is mainly located Reason operating system, user interface and application program etc., modem processor mainly processes radio communication. It is understood that above-mentioned modem processor also can not be integrated in processor 780.
Mobile phone also includes the power supply 790 (such as battery) powered to all parts, it is preferred that power supply is permissible Logically contiguous with processor 780 by power-supply management system, thus realize management by power-supply management system The functions such as charging, electric discharge and power managed.
Although not shown, mobile phone can also include camera, bluetooth module etc., does not repeats them here.
In embodiments of the present invention, the processor 780 included by this terminal also has execution previous embodiment The function of middle method flow.
It should be noted that in said apparatus embodiment, included unit is simply patrolled according to function Volume divide, but be not limited to above-mentioned division, as long as being capable of corresponding function; It in addition, the specific name of each functional unit is also only to facilitate mutually distinguish, is not limited to this Bright protection domain.
In addition, one of ordinary skill in the art will appreciate that realize whole in above-mentioned each method embodiment or Part steps can be by program and completes to instruct related hardware, and corresponding program can be stored in one In kind of computer-readable recording medium, storage medium mentioned above can be read-only storage, disk or CD etc..
These are only the present invention preferably detailed description of the invention, but protection scope of the present invention is not limited to This, any those familiar with the art, can in the technical scope that the embodiment of the present invention discloses The change readily occurring in or replacement, all should cover within protection scope of the present invention.Therefore, the present invention Protection domain should be as the criterion with scope of the claims.

Claims (12)

1. a malicious call recognition methods, it is characterised in that include:
When there being phone incoming call, connect described phone and obtain voice data;
Extract the identification information of described voice data, use described identification information to mate with fallacious message;
If the match is successful with fallacious message for described identification information, it is determined that described phone is malicious call.
2. method according to claim 1, it is characterised in that described identification information includes:
Voiceprint and/or text message, described text message is obtained by voice data described in speech recognition.
3. method according to claim 1 or claim 2, it is characterised in that described use described identification information Carry out mating including with fallacious message: calculate the similarity of described identification information and fallacious message;
The match is successful includes for described identification information and fallacious message: calculated described similarity exceedes pre- Determine threshold value.
4. method according to claim 1 or claim 2, it is characterised in that the described phone of described connection obtains Before voice data, described method also includes:
Whether the source determining phone incoming call is white list user, if so, then continues described call, User is waited to answer;If it is not, then perform the described phone of described connection to obtain voice data.
5. method according to claim 1 or claim 2, it is characterised in that described method also includes:
If it fails to match with fallacious message for described identification information, then continue described call, wait user Answer;
After user answers, if receiving the label information that described phone is malicious call, then by described knowledge Other information is stored in fallacious message.
6. method according to claim 1 or claim 2, it is characterised in that described use described identification information Mate with fallacious message, comprising:
Send described identification information to server, receive server and use described identification information and fallacious message The matching result returning after mating.
7. a malicious call identification device, it is characterised in that include:
Audio frequency acquiring unit, for when there being phone incoming call, connects described phone and obtains voice data;
Information extraction unit, for extracting the identification information of described voice data;
Information matching unit, is used for using described identification information to mate with fallacious message;
Phone confirmation unit, if the match is successful with fallacious message for described identification information, it is determined that described Phone is malicious call.
8. device according to claim 7, it is characterised in that described identification information includes:
Voiceprint and/or text message, described text message is obtained by voice data described in speech recognition.
9. device according to claim 7 or 8, it is characterised in that
Described information matching unit, for calculating the similarity of described identification information and fallacious message;
Described phone confirmation unit, if surpassing for the calculated described similarity of described information matching unit Cross predetermined threshold, it is determined that described phone is malicious call.
10. device according to claim 7 or 8, it is characterised in that described device also includes:
Logic control element, for described audio frequency acquiring unit connect described phone obtain voice data it Before, determine whether the source of phone incoming call is white list user, if so, then continue described call, User is waited to answer;
Described audio frequency acquiring unit, for after described logic control element determines that result is no, connects institute State phone and obtain voice data.
11. according to claim 7 or 8 device, it is characterised in that described device also includes:
Answer control unit, if it fails to match with fallacious message for described identification information, then continue described Call, waits user to answer;
Information maintenance unit, for after user answers, if receiving the mark that described phone is malicious call Note information, then be stored in fallacious message by described identification information.
12. according to claim 7 or 8 device, it is characterised in that
Described information matching unit, for sending described identification information to server, receives server and uses The matching result that described identification information returns after mating with fallacious message.
CN201510172266.9A 2015-04-13 2015-04-13 Malicious telephone identification method and device Active CN106161749B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510172266.9A CN106161749B (en) 2015-04-13 2015-04-13 Malicious telephone identification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510172266.9A CN106161749B (en) 2015-04-13 2015-04-13 Malicious telephone identification method and device

Publications (2)

Publication Number Publication Date
CN106161749A true CN106161749A (en) 2016-11-23
CN106161749B CN106161749B (en) 2020-09-08

Family

ID=57336834

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510172266.9A Active CN106161749B (en) 2015-04-13 2015-04-13 Malicious telephone identification method and device

Country Status (1)

Country Link
CN (1) CN106161749B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106470260A (en) * 2015-08-18 2017-03-01 东莞酷派软件技术有限公司 A kind of call blocking method and device
CN107154996A (en) * 2017-06-30 2017-09-12 广东欧珀移动通信有限公司 Call blocking method, device, storage medium and terminal
CN107197463A (en) * 2017-07-10 2017-09-22 北京亿赛通网络安全技术有限公司 A kind of detection method of telephone fraud, storage medium and electronic equipment
CN107231494A (en) * 2017-07-10 2017-10-03 北京亿赛通网络安全技术有限公司 A kind of acquisition methods of user communication characteristic, storage medium and electronic equipment
CN110062097A (en) * 2019-05-08 2019-07-26 深圳市锐尔觅移动通信有限公司 Harassing call processing method, device, mobile terminal and storage medium
CN110351415A (en) * 2019-06-26 2019-10-18 厦门快商通信息咨询有限公司 Determination method, apparatus, equipment and the storage medium of harassing call number
CN110602303A (en) * 2019-08-30 2019-12-20 厦门快商通科技股份有限公司 Method and system for preventing telecommunication fraud based on audio fingerprint technology
CN112784038A (en) * 2019-10-23 2021-05-11 阿里巴巴集团控股有限公司 Information identification method, system, computing device and storage medium
CN113099040A (en) * 2021-04-02 2021-07-09 刘远 Memory, abnormal calling prevention and control method, device and equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010109619A (en) * 2008-10-29 2010-05-13 Ntt Communications Kk Authentication device, authentication method, and program
CN102223431A (en) * 2011-06-27 2011-10-19 杨子江 Method and system for preventing harassment call
CN103458412A (en) * 2012-06-04 2013-12-18 百度在线网络技术(北京)有限公司 System and method for preventing phone fraud, mobile terminal and cloud terminal analysis server
CN103685613A (en) * 2013-12-05 2014-03-26 江苏大学 Telephone-fraud-resistant system based on voice recognition and method thereof
CN103700371A (en) * 2013-12-13 2014-04-02 江苏大学 Voiceprint identification-based incoming call identity identification system and identification method
CN103929523A (en) * 2014-03-26 2014-07-16 广东明创软件科技有限公司 Method and mobile terminal for intelligently processing incoming call
CN104065836A (en) * 2014-05-30 2014-09-24 小米科技有限责任公司 Method and device for monitoring calls
CN104104771A (en) * 2014-07-25 2014-10-15 小米科技有限责任公司 Conversation processing method and device
CN104184872A (en) * 2014-09-14 2014-12-03 陈桂芳 Crank call preventing mobile phone achieving method based on conversation content

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010109619A (en) * 2008-10-29 2010-05-13 Ntt Communications Kk Authentication device, authentication method, and program
CN102223431A (en) * 2011-06-27 2011-10-19 杨子江 Method and system for preventing harassment call
CN103458412A (en) * 2012-06-04 2013-12-18 百度在线网络技术(北京)有限公司 System and method for preventing phone fraud, mobile terminal and cloud terminal analysis server
CN103685613A (en) * 2013-12-05 2014-03-26 江苏大学 Telephone-fraud-resistant system based on voice recognition and method thereof
CN103700371A (en) * 2013-12-13 2014-04-02 江苏大学 Voiceprint identification-based incoming call identity identification system and identification method
CN103929523A (en) * 2014-03-26 2014-07-16 广东明创软件科技有限公司 Method and mobile terminal for intelligently processing incoming call
CN104065836A (en) * 2014-05-30 2014-09-24 小米科技有限责任公司 Method and device for monitoring calls
CN104104771A (en) * 2014-07-25 2014-10-15 小米科技有限责任公司 Conversation processing method and device
CN104184872A (en) * 2014-09-14 2014-12-03 陈桂芳 Crank call preventing mobile phone achieving method based on conversation content

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106470260A (en) * 2015-08-18 2017-03-01 东莞酷派软件技术有限公司 A kind of call blocking method and device
CN107154996A (en) * 2017-06-30 2017-09-12 广东欧珀移动通信有限公司 Call blocking method, device, storage medium and terminal
CN107197463A (en) * 2017-07-10 2017-09-22 北京亿赛通网络安全技术有限公司 A kind of detection method of telephone fraud, storage medium and electronic equipment
CN107231494A (en) * 2017-07-10 2017-10-03 北京亿赛通网络安全技术有限公司 A kind of acquisition methods of user communication characteristic, storage medium and electronic equipment
CN110062097A (en) * 2019-05-08 2019-07-26 深圳市锐尔觅移动通信有限公司 Harassing call processing method, device, mobile terminal and storage medium
CN110062097B (en) * 2019-05-08 2021-01-05 深圳市锐尔觅移动通信有限公司 Crank call processing method and device, mobile terminal and storage medium
CN110351415A (en) * 2019-06-26 2019-10-18 厦门快商通信息咨询有限公司 Determination method, apparatus, equipment and the storage medium of harassing call number
CN110602303A (en) * 2019-08-30 2019-12-20 厦门快商通科技股份有限公司 Method and system for preventing telecommunication fraud based on audio fingerprint technology
CN112784038A (en) * 2019-10-23 2021-05-11 阿里巴巴集团控股有限公司 Information identification method, system, computing device and storage medium
CN113099040A (en) * 2021-04-02 2021-07-09 刘远 Memory, abnormal calling prevention and control method, device and equipment

Also Published As

Publication number Publication date
CN106161749B (en) 2020-09-08

Similar Documents

Publication Publication Date Title
CN106161749A (en) A kind of malicious call recognition methods, and device
CN104735671B (en) A kind of method and apparatus of identification malicious call
CN109067986A (en) Synchronous display method, mobile terminal and the readable storage medium storing program for executing of intelligent wearable device
CN106657690A (en) Method and device for preventing phone scam, and mobile terminal
CN108920235A (en) Non- read flag control method, mobile terminal and computer readable storage medium
CN108574940A (en) A kind for the treatment of method and apparatus of incoming call
CN106101410A (en) A kind of call handling method, device and equipment
CN104378488A (en) Harassing call processing method and device
CN108418948A (en) A kind of based reminding method, mobile terminal and computer storage media
CN109450949A (en) Mostly application releases the method for number binding, mobile terminal, readable storage medium storing program for executing
CN108307043A (en) Speech message conversion method, mobile terminal and computer readable storage medium
CN106341315A (en) Text message cleaning method, apparatus and mobile terminal
CN109219004A (en) Short message unsubscription method, device, mobile terminal and readable storage medium storing program for executing
CN106911840A (en) Mobile terminal and its voice service method and device
CN109375894A (en) Earpiece volume based reminding method, device, mobile terminal and readable storage medium storing program for executing
CN104917905B (en) Processing method, terminal and the server of Stranger Calls
CN108241808A (en) identification code display control method, terminal and computer readable storage medium
CN110045830A (en) Application operating method, apparatus and computer readable storage medium
CN106385482A (en) Contact information processing method and device, and mobile terminal
CN109309762A (en) Message treatment method, device, mobile terminal and storage medium
CN109067979A (en) A kind of reminding method and mobile terminal
CN108845821A (en) Application program update method, terminal and computer readable storage medium
CN105554325A (en) Blacklist number processing method and mobile terminal
CN109257746A (en) Communication establishing method, communication means, terminal and computer readable storage medium
CN106657542A (en) Call treatment method, device and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant