CN106161749A - A kind of malicious call recognition methods, and device - Google Patents
A kind of malicious call recognition methods, and device Download PDFInfo
- Publication number
- CN106161749A CN106161749A CN201510172266.9A CN201510172266A CN106161749A CN 106161749 A CN106161749 A CN 106161749A CN 201510172266 A CN201510172266 A CN 201510172266A CN 106161749 A CN106161749 A CN 106161749A
- Authority
- CN
- China
- Prior art keywords
- identification information
- phone
- call
- voice data
- fallacious message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the invention discloses a kind of malicious call recognition methods, and device, the wherein realization of method includes: when there being phone incoming call, connects described phone and obtains voice data;Extract the identification information of described voice data, use described identification information to mate with fallacious message;If the match is successful with fallacious message for described identification information, it is determined that described phone is malicious call.Connect phone be equipment be automatically performed be not user operation perform process, say, that equipment be automatically performed connection and be extracted voice data, this process can be sightless for a user;Determine malicious call by the identification information of voice data, then malicious call can be avoided to cause the situation of None-identified by hiding its own telephone number, thus accurately identify malicious call.
Description
Technical field
The present invention relates to communication technical field, particularly to a kind of malicious call recognition methods, and device.
Background technology
The phone that malicious call produces during referring mainly to the various non-normal uses such as harassing and wrecking/swindle/advertisement is exhaled
Crying, daily life is caused puzzlement by these callings.Therefore, user has demand to these malice electricity
Words shield, thus reduce normal life and be disturbed.
Harassing and wrecking or fraudulent call Interception Technology at present, the number being typically based on user feedback is marked
Realize.As a example by Cloud Server realizes, idiographic flow is: a certain telephone number of user feedback is malice electricity
Words number, to Cloud Server, is then recorded this telephone number by Cloud Server;At above-mentioned telephone number again
Secondary when dialing other subscriber phones, first to the telephone number of server lookup incoming call whether other phones can
For malicious call number, in the case that this incoming call telephone number of acquisition has been labeled as malice, determine
The telephone number of this incoming call is malicious call number, and intercepts the phone of incoming call.
But the application telephone number that user can be allowed random due to existing virtual operator makes malicious call
Proud hiding, cause the mode recording malicious call number cannot accurately identify malicious call.
Content of the invention
Embodiments provide a kind of malicious call recognition methods, and device, be used for accurately identifying evil
Meaning phone.
A kind of malicious call recognition methods, comprising:
When there being phone incoming call, connect described phone and obtain voice data;
Extract the identification information of described voice data, use described identification information to mate with fallacious message;
If the match is successful with fallacious message for described identification information, it is determined that described phone is malicious call.
A kind of malicious call identification device, comprising:
Audio frequency acquiring unit, for when there being phone incoming call, connects described phone and obtains voice data;
Information extraction unit, for extracting the identification information of described voice data;
Information matching unit, is used for using described identification information to mate with fallacious message;
Phone confirmation unit, if the match is successful with fallacious message for described identification information, it is determined that described
Phone is malicious call.
As can be seen from the above technical solutions, the embodiment of the present invention has the advantage that connection phone is to set
It is not the process that user operation performs for be automatically performed, say, that equipment is automatically performed connection and carries
Having taken voice data, this process can be sightless for a user;By the identification of voice data
Information determines malicious call, then malicious call can be avoided to cause knowing by hiding its own telephone number
Other situation, thus accurately identify malicious call.
Brief description
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, in embodiment being described below
The required accompanying drawing using is briefly introduced, it should be apparent that, the accompanying drawing in describing below is only this
Some bright embodiments, from the point of view of those of ordinary skill in the art, are not paying creative work
On the premise of, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is embodiment of the present invention method flow schematic diagram;
Fig. 2 is embodiment of the present invention method flow schematic diagram;
Fig. 3 is embodiment of the present invention apparatus structure schematic diagram;
Fig. 4 is embodiment of the present invention apparatus structure schematic diagram;
Fig. 5 is embodiment of the present invention apparatus structure schematic diagram;
Fig. 6 is embodiment of the present invention apparatus structure schematic diagram;
Fig. 7 is embodiment of the present invention apparatus structure schematic diagram.
Detailed description of the invention
In order to make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to this
Invention is described in further detail, it is clear that described embodiment is only that the present invention is a part of to be implemented
Example, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art exist
The all other embodiment being obtained under the premise of not making creative work, broadly falls into present invention protection
Scope.
Embodiments provide a kind of malicious call recognition methods, as shown in Figure 1, comprising:
101: when there being phone incoming call, connect above-mentioned phone and obtain voice data;
The executive agent of the embodiment of the present invention can be telephone plant, can be generally mobile phone, it is also possible to be
There is the panel computer of call function or its executive agent is not made uniqueness limit by other equipment the present embodiment
Fixed.In embodiments of the present invention, connect phone be equipment be automatically performed be not user operation perform
Process, say, that equipment is automatically performed connection and is extracted voice data, and this process is for a user
Can be sightless.The malicious call recognition methods of the embodiment of the present invention is owing to being equipment turn on automatically electricity
Words, therefore whether this function is opened and can be turned on and off by user's configuration.
In addition, for the embodiment of the present invention, have some phones to be to can confirm that not need to perform this
The operation such as the identification information of bright embodiment subsequent extracted voice data and coupling, so can save not
Necessary data handling procedure, reduces the interference to call flow process for the equipment, specific as follows: above-mentioned connect
Leading to above-mentioned phone to obtain before voice data, whether said method also comprises determining that the source of phone incoming call
For white list user, if so, then continue above-mentioned call, wait user to answer;If it is not, then perform
The above-mentioned phone of above-mentioned connection obtains voice data.
In the present embodiment, white list user refer to may determine that be not malice incoming call situation, for example:
Present in the address list of mobile phone, telephone number is as incoming call source, or, it is known that public telephone incoming call,
Such as: bank, official's phone such as emergent.Concrete white list, can be to should have according to different information types
This is repeated no more by the different acquisition mode embodiment of the present invention.
102: extract the identification information of above-mentioned voice data, use above-mentioned identification information and fallacious message to carry out
Coupling;
In the present embodiment, identification information is the information of difference voice data, comprises the feature of voice data,
Can be voiceprint also can be to process later characteristic information based on other data, as long as can distinguish respectively
Plant and be all possible in the information theory of audio frequency.Following example will give two of which and preferably illustrate:
Above-mentioned identification information includes: voiceprint and/or text message, and above-mentioned text message is known by voice
Not above-mentioned voice data obtains.
Voiceprint is by the characteristic information of Application on Voiceprint Recognition, Application on Voiceprint Recognition: refer to can only identify someone or
The sound characteristic of something.Text message is that the text message obtaining based on speech recognition can realize text phase
Identify like degree.Speech recognition: by user's word is passed through speech analysis method by the literary composition described in user
Word extracts.Text similarity identification: refer to by carrying out participle to substantial amounts of text, word frequency analysis or
The meaning or the same or like text of content are found out in text in person's semantic analysis.
The embodiment of the present invention additionally provides the implementation of coupling, specific as follows: the above-mentioned identification of above-mentioned use
Information is mated with fallacious message, comprising:
Send above-mentioned identification information to server, receive server and use above-mentioned identification information and fallacious message
The matching result returning after mating.
Need database support owing to being identified information with mating of fallacious message, in order to ensure to identify
Database can be placed on the server in high in the clouds, therefore mate by upgrading in time of accuracy rate and database
Process can be the interaction of terminal and server.The server in high in the clouds can utilize intrinsic advantage timely
Update the database of fallacious message.
103: if the match is successful with fallacious message for above-mentioned identification information, it is determined that above-mentioned phone is malicious call.
It is understood that without the match is successful, then can be considered as non-malicious phone, then can
To continue above-mentioned call, user can hear calling the tinkle of bells.Owing to now phone has turned on, can
With up after switching to calling party's playing RBT, it is to avoid mourning in silence of calling party's stand-by period.In addition, continue
After the continuous call scheduled time, if user does not answer, then need that equipment is disconnected call and connect.
Furthermore it is also possible to inform that callee does not receives calls to calling party.It is defined as malice electricity if the match is successful
Words, then can directly hang up, thus realize the shielding of malicious call.Can also further display screen
Cover the result of phone.Process after malicious call identification, the embodiment of the present invention is not defined.
The embodiment of the present invention, connect phone be equipment be automatically performed be not user operation perform process,
That is equipment is automatically performed connection and is extracted voice data, and this process can be for a user
Sightless;Determine malicious call by the identification information of voice data, then malicious call can be avoided to lead to
Cross and hide the situation that its own telephone number causes None-identified, thus accurately identify malicious call.
The embodiment of the present invention additionally provides the side of implementing using identification information to mate with fallacious message
Formula is as follows: above-mentioned use above-mentioned identification information carries out mating including with fallacious message: calculate above-mentioned identification
Information and the similarity of fallacious message;The match is successful includes for above-mentioned identification information and fallacious message: calculates
To above-mentioned similarity exceed predetermined threshold.
The process that the present embodiment calculates similarity can realize at server-side, it is also possible in terminal side
Realize, can determine, with the principle of the database close to fallacious message, the equipment of realization.
The embodiment of the present invention additionally provides the update scheme of the database of fallacious message, specific as follows: above-mentioned
Method also includes: if it fails to match with fallacious message for above-mentioned identification information, then continue above-mentioned call,
User is waited to answer;After user answers, if receiving the label information that above-mentioned phone is malicious call,
Then above-mentioned identification information is stored in fallacious message.
If there is this locality in the database of fallacious message, then is stored in fallacious message and can be stored in this locality
Database, if database presence server one end of fallacious message, then being stored in fallacious message could be
It is sent to server, be stored in the database of server-side by server.The process of implementing can foundation
Needs are set, and the present embodiment is not made uniqueness and limited.
The embodiment of the present invention, by providing a concrete example, is illustrated by following example.
The basic thought of the embodiment of the present invention and principle: marked by user and network analysis, find out every day
Calling the bad person in user, the identification information such as voiceprint extracting bad person sets up the number of fallacious message
According to storehouse.User is when receiving a phone, and cell phone software first allows phone acquiescence connect some seconds, extracts
Acoustic information in phone and existing bad person's vocal print are compared or extract in text after acoustic information
Hold to identify and compare with fallacious message, thus identify the harassing and wrecking that current incoming call user is bad person
Or fraudulent call.
The embodiment of the present invention realizes that process is broadly divided into five parts:
First, bad person's initial seed obtains:
Feedback after being answered the call by user and mark, and system voice is identified laggard style of writing this
Analyze, find out the voice data playing harassing and wrecking or fraudulent call.
2nd, voiceprint extraction:
After obtaining the voice data of bad person, extract its voiceprint, generate malice vocal print storehouse.
3rd, speech recognition:
After obtaining the voice data of bad person, carry out speech recognition, dialog context is extracted, generate and dislike
Meaning text library.
4th, bad person's Real time identification:
Answering the call in module user, inserting and listen before module in advance, user is receiving coming of a number
During electricity, before user receives calls, then closing of the circuit is first extracted the voice of above some seconds by system
Voice data: extracting the process after voice data can have a following two kinds:
1st, the voiceprint extracting voice data compares with the fallacious message in system.If voiceprint and
Voice print matching in fallacious message is then considered malicious call, directly hangs.
2nd, carry out speech recognition to voice data by the Text Feature Extraction that relates in voice out, then use and dislike
It is mated by meaning information, and determination is the content of malice, is if it is judged as malicious call,
Directly hang.
5th, bad person's seed enriches:
If the user while after receiving calls, determination is malicious call, but before system, there is no seed,
Then user can be marked as malice after receiving calls, and then its vocal print is believed by system by after examination & verification
Breath extracts the database adding fallacious message, completes to enrich seed bank.
Concrete grammar realizes flow process, can be refering to shown in Fig. 2, comprising:
201: phone incoming call;
202: the system control sytsem of terminal is answered, the audio-frequency information of some seconds of extraction phone, extracts sound
Frequently the identification information of information;Specifically may include that voiceprint and/or the text message extracting audio-frequency information.
203: use identification information to mate with the fallacious message in the database of fallacious message, it is thus achieved that
Join result;The difference of corresponding identification information, the database of fallacious message can be different, for example, include: sound
The malicious data storehouse of line information, and/or, the malicious data storehouse of text message.
204: determine it is malicious call according to matching result, entrance 207 is hung up in control;
205: if determining non-malicious according to matching result, then control starts jingle bell, wait user to answer;
206: user receives calls, however, it is determined that malice so will identify the more capable data to fallacious message of information
Storehouse;If non-malicious, after completing to answer, enter 207;
207: this time phone on-hook terminates call.
The embodiment of the present invention, is not based on calling number and is identified, and therefore can effectively identify malice
Phone, can effectively prevent bad person's number of changing from walking around.
The embodiment of the present invention additionally provides a kind of malicious call identification device, as shown in Figure 3, comprising:
Audio frequency acquiring unit 301, for when there being phone incoming call, connects above-mentioned phone and obtains voice data;
Information extraction unit 302, for extracting the identification information of above-mentioned voice data;
Information matching unit 303, is used for using above-mentioned identification information to mate with fallacious message;
Phone confirmation unit 304, if the match is successful with fallacious message for above-mentioned identification information, it is determined that on
Stating phone is malicious call.
The executive agent of the embodiment of the present invention can be telephone plant, can be generally mobile phone, it is also possible to be
There is the panel computer of call function or its executive agent is not made uniqueness limit by other equipment the present embodiment
Fixed.In embodiments of the present invention, connect phone be equipment be automatically performed be not user operation perform
Process, say, that equipment is automatically performed connection and is extracted voice data, and this process is for a user
Can be sightless.The malicious call recognition methods of the embodiment of the present invention is owing to being equipment turn on automatically electricity
Words, therefore whether this function is opened and can be turned on and off by user's configuration.
It is understood that without the match is successful, then can be considered as non-malicious phone, then can
To continue above-mentioned call, user can hear calling the tinkle of bells.Owing to now phone has turned on, can
With up after switching to calling party's playing RBT, it is to avoid mourning in silence of calling party's stand-by period.In addition, continue
After the continuous call scheduled time, if user does not answer, then need that equipment is disconnected call and connect.
Furthermore it is also possible to inform that callee does not receives calls to calling party.It is defined as malice electricity if the match is successful
Words, then can directly hang up, thus realize the shielding of malicious call.Can also further display screen
Cover the result of phone.Process after malicious call identification, the embodiment of the present invention is not defined.
The embodiment of the present invention, connect phone be equipment be automatically performed be not user operation perform process,
That is equipment is automatically performed connection and is extracted voice data, and this process can be for a user
Sightless;Determine malicious call by the identification information of voice data, then malicious call can be avoided to lead to
Cross and hide the situation that its own telephone number causes None-identified, thus accurately identify malicious call.
In the present embodiment, identification information is the information of difference voice data, comprises the feature of voice data,
Can be voiceprint also can be to process later characteristic information based on other data, as long as can distinguish respectively
Plant and be all possible in the information theory of audio frequency.Following example will give two of which and preferably illustrate:
Alternatively, above-mentioned identification information includes:
Voiceprint and/or text message, above-mentioned text message is obtained by the above-mentioned voice data of speech recognition.
Voiceprint is by the characteristic information of Application on Voiceprint Recognition, Application on Voiceprint Recognition: refer to can only identify someone or
The sound characteristic of something.Text message is that the text message obtaining based on speech recognition can realize text phase
Identify like degree.Speech recognition: by user's word is passed through speech analysis method by the literary composition described in user
Word extracts.Text similarity identification: refer to by carrying out participle to substantial amounts of text, word frequency analysis or
The meaning or the same or like text of content are found out in text in person's semantic analysis.
The embodiment of the present invention additionally provides the side of implementing using identification information to mate with fallacious message
Formula, as follows: alternatively, above-mentioned information matching unit 303, it is used for calculating above-mentioned identification information and malice letter
The similarity of breath;
Above-mentioned phone confirmation unit 304, if being used for the calculated above-mentioned phase of above-mentioned information matching unit 303
Exceed predetermined threshold like degree, it is determined that above-mentioned phone is malicious call.
The process that the present embodiment calculates similarity can realize at server-side, it is also possible in terminal side
Realize, can determine, with the principle of the database close to fallacious message, the equipment of realization.
In addition, for the embodiment of the present invention, have some phones to be to can confirm that not need to perform this
The operation such as the identification information of bright embodiment subsequent extracted voice data and coupling, so can save not
Necessary data handling procedure, reduces the interference to call flow process for the equipment, specific as follows: further
Ground, as shown in Figure 4, said apparatus also includes:
Logic control element 401, obtains audio frequency for connecting above-mentioned phone in above-mentioned audio frequency acquiring unit 301
Before data, determine whether the source of phone incoming call is white list user, if so, then continue above-mentioned phone
Calling, waits user to answer;
Above-mentioned audio frequency acquiring unit 301, is used for after above-mentioned logic control element 401 determines that result is no,
Connect above-mentioned phone and obtain voice data.
In the present embodiment, white list user refer to may determine that be not malice incoming call situation, for example:
Present in the address list of mobile phone, telephone number is as incoming call source, or, it is known that public telephone incoming call,
Such as: bank, official's phone such as emergent.Concrete white list, can be to should have according to different information types
This is repeated no more by the different acquisition mode embodiment of the present invention.
The embodiment of the present invention additionally provides the update scheme of the database of fallacious message, specific as follows: to enter one
Step ground, as it is shown in figure 5, said apparatus also includes:
Answer control unit 501, if it fails to match with fallacious message for above-mentioned identification information, then in continuation
State call, wait user to answer;
Information maintenance unit 502, for after user answers, if receiving above-mentioned phone is malicious call
Label information, then be stored in fallacious message by above-mentioned identification information.
If there is this locality in the database of fallacious message, then is stored in fallacious message and can be stored in this locality
Database, if database presence server one end of fallacious message, then being stored in fallacious message could be
It is sent to server, be stored in the database of server-side by server.The process of implementing can foundation
Needs are set, and the present embodiment is not made uniqueness and limited.
The embodiment of the present invention additionally provides the implementation of coupling, specific as follows: alternatively, above-mentioned information
Matching unit 303, for sending above-mentioned identification information to server, receives server and uses above-mentioned identification letter
The matching result that breath returns after mating with fallacious message.
Need database support owing to being identified information with mating of fallacious message, in order to ensure to identify
Database can be placed on the server in high in the clouds, therefore mate by upgrading in time of accuracy rate and database
Process can be the interaction of terminal and server.The server in high in the clouds can utilize intrinsic advantage timely
Update the database of fallacious message.
The embodiment of the present invention additionally provides another kind of malicious call identification device, as shown in Figure 6, comprising:
Receiver the 601st, transmitter the 602nd, processor 603 and memory 604;
Wherein, processor 603, for when there being phone incoming call, connect above-mentioned phone and obtain voice data;
Extract the identification information of above-mentioned voice data, use above-mentioned identification information to mate with fallacious message;If
The match is successful with fallacious message for above-mentioned identification information, it is determined that above-mentioned phone is malicious call.
The executive agent of the embodiment of the present invention can be telephone plant, can be generally mobile phone, it is also possible to be
There is the panel computer of call function or its executive agent is not made uniqueness limit by other equipment the present embodiment
Fixed.In embodiments of the present invention, connect phone be equipment be automatically performed be not user operation perform
Process, say, that equipment is automatically performed connection and is extracted voice data, and this process is for a user
Can be sightless.The malicious call recognition methods of the embodiment of the present invention is owing to being equipment turn on automatically electricity
Words, therefore whether this function is opened and can be turned on and off by user's configuration.
It is understood that without the match is successful, then can be considered as non-malicious phone, then can
To continue above-mentioned call, user can hear calling the tinkle of bells.Owing to now phone has turned on, can
With up after switching to calling party's playing RBT, it is to avoid mourning in silence of calling party's stand-by period.In addition, continue
After the continuous call scheduled time, if user does not answer, then need that equipment is disconnected call and connect.
Furthermore it is also possible to inform that callee does not receives calls to calling party.It is defined as malice electricity if the match is successful
Words, then can directly hang up, thus realize the shielding of malicious call.Can also further display screen
Cover the result of phone.Process after malicious call identification, the embodiment of the present invention is not defined.
The embodiment of the present invention, connect phone be equipment be automatically performed be not user operation perform process,
That is equipment is automatically performed connection and is extracted voice data, and this process can be for a user
Sightless;Determine malicious call by the identification information of voice data, then malicious call can be avoided to lead to
Cross and hide the situation that its own telephone number causes None-identified, thus accurately identify malicious call.
In addition, for the embodiment of the present invention, have some phones to be to can confirm that not need to perform this
The operation such as the identification information of bright embodiment subsequent extracted voice data and coupling, so can save not
Necessary data handling procedure, reduces the interference to call flow process for the equipment, specific as follows: above-mentioned place
Reason device 603, is additionally operable to, before connecting above-mentioned phone acquisition voice data, determine that the source of phone incoming call is
No for white list user, if so, then continue above-mentioned call, wait user to answer;If it is not, then hold
The above-mentioned phone of the above-mentioned connection of row obtains voice data.
In the present embodiment, white list user refer to may determine that be not malice incoming call situation, for example:
Present in the address list of mobile phone, telephone number is as incoming call source, or, it is known that public telephone incoming call,
Such as: bank, official's phone such as emergent.Concrete white list, can be to should have according to different information types
This is repeated no more by the different acquisition mode embodiment of the present invention.
In the present embodiment, identification information is the information of difference voice data, comprises the feature of voice data,
Can be voiceprint also can be to process later characteristic information based on other data, as long as can distinguish respectively
Plant and be all possible in the information theory of audio frequency.Following example will give two of which and preferably illustrate:
Above-mentioned identification information includes: voiceprint and/or text message, and above-mentioned text message is known by voice
Not above-mentioned voice data obtains.
Voiceprint is by the characteristic information of Application on Voiceprint Recognition, Application on Voiceprint Recognition: refer to can only identify someone or
The sound characteristic of something.Text message is that the text message obtaining based on speech recognition can realize text phase
Identify like degree.Speech recognition: by user's word is passed through speech analysis method by the literary composition described in user
Word extracts.Text similarity identification: refer to by carrying out participle to substantial amounts of text, word frequency analysis or
The meaning or the same or like text of content are found out in text in person's semantic analysis.
The embodiment of the present invention additionally provides the implementation of coupling, specific as follows: above-mentioned processor 603, uses
Mate with fallacious message in using above-mentioned identification information, comprising:
Send above-mentioned identification information to server, receive server and use above-mentioned identification information and fallacious message
The matching result returning after mating.
Need database support owing to being identified information with mating of fallacious message, in order to ensure to identify
Database can be placed on the server in high in the clouds, therefore mate by upgrading in time of accuracy rate and database
Process can be the interaction of terminal and server.The server in high in the clouds can utilize intrinsic advantage timely
Update the database of fallacious message.
The embodiment of the present invention additionally provides the side of implementing using identification information to mate with fallacious message
Formula, as follows: above-mentioned processor 603, it is used for using above-mentioned identification information to carry out mating including with fallacious message:
Calculate the similarity of above-mentioned identification information and fallacious message;Above-mentioned processor 603, is used for identifying information and evil
Meaning information matches successfully includes: calculated above-mentioned similarity exceedes predetermined threshold.
The process that the present embodiment calculates similarity can realize at server-side, it is also possible in terminal side
Realize, can determine, with the principle of the database close to fallacious message, the equipment of realization.
The embodiment of the present invention additionally provides the update scheme of the database of fallacious message, specific as follows: above-mentioned
Processor 603, if being additionally operable to above-mentioned identification information, it fails to match with fallacious message, then continue above-mentioned phone and exhale
Cry, wait user to answer;After user answers, if receiving the mark letter that above-mentioned phone is malicious call
Breath, then be stored in fallacious message by above-mentioned identification information.
If there is this locality in the database of fallacious message, then is stored in fallacious message and can be stored in this locality
Database, if database presence server one end of fallacious message, then being stored in fallacious message could be
It is sent to server, be stored in the database of server-side by server.The process of implementing can foundation
Needs are set, and the present embodiment is not made uniqueness and limited.
The embodiment of the present invention additionally provides another kind of malicious call identification device, as it is shown in fig. 7, in order to just
In explanation, illustrate only the part related to the embodiment of the present invention, concrete ins and outs do not disclose, please
With reference to embodiment of the present invention method part.This device as a example by terminal, this terminal can for include mobile phone,
Panel computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales,
Point-of-sale terminal), any terminal device such as vehicle-mounted computer, as a example by terminal is as mobile phone:
Fig. 7 is illustrated that the block diagram of the part-structure of the mobile phone related to the terminal of embodiment of the present invention offer.
With reference to Fig. 7, mobile phone includes: radio frequency (Radio Frequency, RF) circuit the 710th, memory is the 720th,
Input block the 730th, display unit the 740th, sensor the 750th, voicefrequency circuit the 760th, Wireless Fidelity (wireless
Fidelity, WiFi) module the 770th, the parts such as processor 780 and power supply 790.People in the art
Member is appreciated that the handset structure shown in Fig. 7 is not intended that the restriction to mobile phone, can include than figure
Show more or less of parts, or combine some parts, or different parts are arranged.
Carry out concrete introduction below in conjunction with Fig. 7 each component parts to mobile phone:
RF circuit 710 can be used for receiving and sending messages or in communication process, the reception of signal and transmission, especially,
After receiving the downlink information of base station, process to processor 780;In addition, send out designing up data
Give base station.Generally, RF circuit 710 including but not limited to antenna, at least one amplifier, transmitting-receiving letter
Machine, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..Additionally,
RF circuit 710 can also be communicated with network and other equipment by radio communication.Above-mentioned radio communication is permissible
Use arbitrary communication standard or agreement, including but not limited to global system for mobile communications (Global System
Of Mobile communication, GSM), general packet radio service (General Packet Radio
Service, GPRS), CDMA (Code Division Multiple Access, CDMA), broadband
CDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution
(Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service,
SMS) etc..
Memory 720 can be used for storage software program and module, and processor 780 is stored in by running
The software program of memory 720 and module, thus perform at the application of various function and the data of mobile phone
Reason.Memory 720 can mainly include storage program area and storage data field, and wherein, storage program area can
Application program needed for storage operating system, at least one function (broadcast by such as sound-playing function, image
Playing function etc.) etc.;Storage data field can store data (the such as audio frequency being created according to the use of mobile phone
Data, phone directory etc.) etc..Additionally, memory 720 can include high-speed random access memory, also
Can include nonvolatile memory, for example, at least one disk memory, flush memory device or other
Volatile solid-state part.
Input block 730 can be used for receiving numeral or the character information of input, and produces the use with mobile phone
The key signals input that family is arranged and function control is relevant.Specifically, input block 730 can include touch-control
Panel 731 and other input equipments 732.Contact panel 731, also referred to as touch-screen, can collect user
(such as user uses any applicable object or attached such as finger, stylus in touch operation on or near it
Operation on contact panel 731 or near contact panel 731 for the part), and according to formula set in advance
Drive corresponding attachment means.Optionally, contact panel 731 can include touch detecting apparatus and touch control
Two parts of device processed.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation
The signal bringing, transmits a signal to touch controller;Touch controller receives from touch detecting apparatus
Touch information, and it is converted into contact coordinate, then give processor 780, and can reception processing device 780
The order sent simultaneously is performed.Furthermore, it is possible to use resistance-type, condenser type, infrared ray and surface
The polytypes such as sound wave realize contact panel 731.Except contact panel 731, input block 730 is all right
Including other input equipments 732.Specifically, other input equipments 732 can include but is not limited to secondary or physical bond
In dish, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
One or more.
Display unit 740 can be used for showing the information being inputted by user or the information being supplied to user and hand
The various menus of machine.Display unit 740 can include display floater 741, optionally, can use liquid crystal
Show device (Liquid Crystal Display, LCD), Organic Light Emitting Diode (Organic Light-Emitting
Diode, OLED) etc. form configure display floater 741.Further, contact panel 731 can cover
Display floater 741, after contact panel 731 detects the touch operation on or near it, sends place to
Reason device 780, to determine the type of touch event, is showing according to the type of touch event with preprocessor 780
Show and corresponding visual output is provided on panel 741.Although in the figure 7, contact panel 731 and display surface
Plate 741 is input and the input function realizing mobile phone as two independent parts, but real at some
Execute in example, can be by integrated to contact panel 731 and display floater 741 and that realize mobile phone input and output
Function.
Mobile phone may also include at least one sensor 750, such as optical sensor, motion sensor and other
Sensor.Specifically, optical sensor can include ambient light sensor and proximity transducer, wherein, environment
Optical sensor can regulate the brightness of display floater 741 according to the light and shade of ambient light, and proximity transducer can
When mobile phone moves in one's ear, close display floater 741 and/or backlight.As the one of motion sensor,
Accelerometer sensor can detect the size of (generally three axles) acceleration in all directions, can examine when static
Measure size and the direction of gravity, can be used for identifying application (such as horizontal/vertical screen switching, the phase of mobile phone attitude
Close game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Extremely
The gyroscope that can also configure in mobile phone, barometer, hygrometer, thermometer, infrared ray sensor etc. other
Sensor, does not repeats them here.
Voicefrequency circuit the 760th, loudspeaker 761, microphone 762 can provide the audio frequency between user and mobile phone to connect
Mouthful.The signal of telecommunication after the voice data conversion that voicefrequency circuit 760 can will receive, is transferred to loudspeaker 761,
Loudspeaker 761 is converted to voice signal output;On the other hand, the sound letter that microphone 762 will be collected
Number be converted to the signal of telecommunication, after being received by voicefrequency circuit 760, be converted to voice data, then voice data is defeated
Go out after processor 780 processes, through RF circuit 710 being sent to such as another mobile phone, or by audio frequency number
According to output to memory 720 to process further.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user to receive by WiFi module 770
Sending e-mails, browsing webpage and access streaming video etc., it has provided the user wireless broadband interconnection
Net accesses.Although Fig. 7 shows WiFi module 770, but it is understood that, it is simultaneously not belonging to hand
Must be configured into of machine, can omit completely as required in not changing the scope of essence of invention.
Processor 780 is the control centre of mobile phone, utilizes each of various interface and the whole mobile phone of connection
Individual part, the software program being stored in memory 720 by operation or execution and/or module, and adjust
By the data being stored in memory 720, perform the various function of mobile phone and process data, thus opponent
Machine carries out integral monitoring.Optionally, processor 780 can include one or more processing unit;Preferably,
Processor 780 can integrated application processor and modem processor, wherein, application processor is mainly located
Reason operating system, user interface and application program etc., modem processor mainly processes radio communication.
It is understood that above-mentioned modem processor also can not be integrated in processor 780.
Mobile phone also includes the power supply 790 (such as battery) powered to all parts, it is preferred that power supply is permissible
Logically contiguous with processor 780 by power-supply management system, thus realize management by power-supply management system
The functions such as charging, electric discharge and power managed.
Although not shown, mobile phone can also include camera, bluetooth module etc., does not repeats them here.
In embodiments of the present invention, the processor 780 included by this terminal also has execution previous embodiment
The function of middle method flow.
It should be noted that in said apparatus embodiment, included unit is simply patrolled according to function
Volume divide, but be not limited to above-mentioned division, as long as being capable of corresponding function;
It in addition, the specific name of each functional unit is also only to facilitate mutually distinguish, is not limited to this
Bright protection domain.
In addition, one of ordinary skill in the art will appreciate that realize whole in above-mentioned each method embodiment or
Part steps can be by program and completes to instruct related hardware, and corresponding program can be stored in one
In kind of computer-readable recording medium, storage medium mentioned above can be read-only storage, disk or
CD etc..
These are only the present invention preferably detailed description of the invention, but protection scope of the present invention is not limited to
This, any those familiar with the art, can in the technical scope that the embodiment of the present invention discloses
The change readily occurring in or replacement, all should cover within protection scope of the present invention.Therefore, the present invention
Protection domain should be as the criterion with scope of the claims.
Claims (12)
1. a malicious call recognition methods, it is characterised in that include:
When there being phone incoming call, connect described phone and obtain voice data;
Extract the identification information of described voice data, use described identification information to mate with fallacious message;
If the match is successful with fallacious message for described identification information, it is determined that described phone is malicious call.
2. method according to claim 1, it is characterised in that described identification information includes:
Voiceprint and/or text message, described text message is obtained by voice data described in speech recognition.
3. method according to claim 1 or claim 2, it is characterised in that described use described identification information
Carry out mating including with fallacious message: calculate the similarity of described identification information and fallacious message;
The match is successful includes for described identification information and fallacious message: calculated described similarity exceedes pre-
Determine threshold value.
4. method according to claim 1 or claim 2, it is characterised in that the described phone of described connection obtains
Before voice data, described method also includes:
Whether the source determining phone incoming call is white list user, if so, then continues described call,
User is waited to answer;If it is not, then perform the described phone of described connection to obtain voice data.
5. method according to claim 1 or claim 2, it is characterised in that described method also includes:
If it fails to match with fallacious message for described identification information, then continue described call, wait user
Answer;
After user answers, if receiving the label information that described phone is malicious call, then by described knowledge
Other information is stored in fallacious message.
6. method according to claim 1 or claim 2, it is characterised in that described use described identification information
Mate with fallacious message, comprising:
Send described identification information to server, receive server and use described identification information and fallacious message
The matching result returning after mating.
7. a malicious call identification device, it is characterised in that include:
Audio frequency acquiring unit, for when there being phone incoming call, connects described phone and obtains voice data;
Information extraction unit, for extracting the identification information of described voice data;
Information matching unit, is used for using described identification information to mate with fallacious message;
Phone confirmation unit, if the match is successful with fallacious message for described identification information, it is determined that described
Phone is malicious call.
8. device according to claim 7, it is characterised in that described identification information includes:
Voiceprint and/or text message, described text message is obtained by voice data described in speech recognition.
9. device according to claim 7 or 8, it is characterised in that
Described information matching unit, for calculating the similarity of described identification information and fallacious message;
Described phone confirmation unit, if surpassing for the calculated described similarity of described information matching unit
Cross predetermined threshold, it is determined that described phone is malicious call.
10. device according to claim 7 or 8, it is characterised in that described device also includes:
Logic control element, for described audio frequency acquiring unit connect described phone obtain voice data it
Before, determine whether the source of phone incoming call is white list user, if so, then continue described call,
User is waited to answer;
Described audio frequency acquiring unit, for after described logic control element determines that result is no, connects institute
State phone and obtain voice data.
11. according to claim 7 or 8 device, it is characterised in that described device also includes:
Answer control unit, if it fails to match with fallacious message for described identification information, then continue described
Call, waits user to answer;
Information maintenance unit, for after user answers, if receiving the mark that described phone is malicious call
Note information, then be stored in fallacious message by described identification information.
12. according to claim 7 or 8 device, it is characterised in that
Described information matching unit, for sending described identification information to server, receives server and uses
The matching result that described identification information returns after mating with fallacious message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510172266.9A CN106161749B (en) | 2015-04-13 | 2015-04-13 | Malicious telephone identification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510172266.9A CN106161749B (en) | 2015-04-13 | 2015-04-13 | Malicious telephone identification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106161749A true CN106161749A (en) | 2016-11-23 |
CN106161749B CN106161749B (en) | 2020-09-08 |
Family
ID=57336834
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510172266.9A Active CN106161749B (en) | 2015-04-13 | 2015-04-13 | Malicious telephone identification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106161749B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106470260A (en) * | 2015-08-18 | 2017-03-01 | 东莞酷派软件技术有限公司 | A kind of call blocking method and device |
CN107154996A (en) * | 2017-06-30 | 2017-09-12 | 广东欧珀移动通信有限公司 | Call blocking method, device, storage medium and terminal |
CN107197463A (en) * | 2017-07-10 | 2017-09-22 | 北京亿赛通网络安全技术有限公司 | A kind of detection method of telephone fraud, storage medium and electronic equipment |
CN107231494A (en) * | 2017-07-10 | 2017-10-03 | 北京亿赛通网络安全技术有限公司 | A kind of acquisition methods of user communication characteristic, storage medium and electronic equipment |
CN110062097A (en) * | 2019-05-08 | 2019-07-26 | 深圳市锐尔觅移动通信有限公司 | Harassing call processing method, device, mobile terminal and storage medium |
CN110351415A (en) * | 2019-06-26 | 2019-10-18 | 厦门快商通信息咨询有限公司 | Determination method, apparatus, equipment and the storage medium of harassing call number |
CN110602303A (en) * | 2019-08-30 | 2019-12-20 | 厦门快商通科技股份有限公司 | Method and system for preventing telecommunication fraud based on audio fingerprint technology |
CN112784038A (en) * | 2019-10-23 | 2021-05-11 | 阿里巴巴集团控股有限公司 | Information identification method, system, computing device and storage medium |
CN113099040A (en) * | 2021-04-02 | 2021-07-09 | 刘远 | Memory, abnormal calling prevention and control method, device and equipment |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010109619A (en) * | 2008-10-29 | 2010-05-13 | Ntt Communications Kk | Authentication device, authentication method, and program |
CN102223431A (en) * | 2011-06-27 | 2011-10-19 | 杨子江 | Method and system for preventing harassment call |
CN103458412A (en) * | 2012-06-04 | 2013-12-18 | 百度在线网络技术(北京)有限公司 | System and method for preventing phone fraud, mobile terminal and cloud terminal analysis server |
CN103685613A (en) * | 2013-12-05 | 2014-03-26 | 江苏大学 | Telephone-fraud-resistant system based on voice recognition and method thereof |
CN103700371A (en) * | 2013-12-13 | 2014-04-02 | 江苏大学 | Voiceprint identification-based incoming call identity identification system and identification method |
CN103929523A (en) * | 2014-03-26 | 2014-07-16 | 广东明创软件科技有限公司 | Method and mobile terminal for intelligently processing incoming call |
CN104065836A (en) * | 2014-05-30 | 2014-09-24 | 小米科技有限责任公司 | Method and device for monitoring calls |
CN104104771A (en) * | 2014-07-25 | 2014-10-15 | 小米科技有限责任公司 | Conversation processing method and device |
CN104184872A (en) * | 2014-09-14 | 2014-12-03 | 陈桂芳 | Crank call preventing mobile phone achieving method based on conversation content |
-
2015
- 2015-04-13 CN CN201510172266.9A patent/CN106161749B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2010109619A (en) * | 2008-10-29 | 2010-05-13 | Ntt Communications Kk | Authentication device, authentication method, and program |
CN102223431A (en) * | 2011-06-27 | 2011-10-19 | 杨子江 | Method and system for preventing harassment call |
CN103458412A (en) * | 2012-06-04 | 2013-12-18 | 百度在线网络技术(北京)有限公司 | System and method for preventing phone fraud, mobile terminal and cloud terminal analysis server |
CN103685613A (en) * | 2013-12-05 | 2014-03-26 | 江苏大学 | Telephone-fraud-resistant system based on voice recognition and method thereof |
CN103700371A (en) * | 2013-12-13 | 2014-04-02 | 江苏大学 | Voiceprint identification-based incoming call identity identification system and identification method |
CN103929523A (en) * | 2014-03-26 | 2014-07-16 | 广东明创软件科技有限公司 | Method and mobile terminal for intelligently processing incoming call |
CN104065836A (en) * | 2014-05-30 | 2014-09-24 | 小米科技有限责任公司 | Method and device for monitoring calls |
CN104104771A (en) * | 2014-07-25 | 2014-10-15 | 小米科技有限责任公司 | Conversation processing method and device |
CN104184872A (en) * | 2014-09-14 | 2014-12-03 | 陈桂芳 | Crank call preventing mobile phone achieving method based on conversation content |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106470260A (en) * | 2015-08-18 | 2017-03-01 | 东莞酷派软件技术有限公司 | A kind of call blocking method and device |
CN107154996A (en) * | 2017-06-30 | 2017-09-12 | 广东欧珀移动通信有限公司 | Call blocking method, device, storage medium and terminal |
CN107197463A (en) * | 2017-07-10 | 2017-09-22 | 北京亿赛通网络安全技术有限公司 | A kind of detection method of telephone fraud, storage medium and electronic equipment |
CN107231494A (en) * | 2017-07-10 | 2017-10-03 | 北京亿赛通网络安全技术有限公司 | A kind of acquisition methods of user communication characteristic, storage medium and electronic equipment |
CN110062097A (en) * | 2019-05-08 | 2019-07-26 | 深圳市锐尔觅移动通信有限公司 | Harassing call processing method, device, mobile terminal and storage medium |
CN110062097B (en) * | 2019-05-08 | 2021-01-05 | 深圳市锐尔觅移动通信有限公司 | Crank call processing method and device, mobile terminal and storage medium |
CN110351415A (en) * | 2019-06-26 | 2019-10-18 | 厦门快商通信息咨询有限公司 | Determination method, apparatus, equipment and the storage medium of harassing call number |
CN110602303A (en) * | 2019-08-30 | 2019-12-20 | 厦门快商通科技股份有限公司 | Method and system for preventing telecommunication fraud based on audio fingerprint technology |
CN112784038A (en) * | 2019-10-23 | 2021-05-11 | 阿里巴巴集团控股有限公司 | Information identification method, system, computing device and storage medium |
CN113099040A (en) * | 2021-04-02 | 2021-07-09 | 刘远 | Memory, abnormal calling prevention and control method, device and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN106161749B (en) | 2020-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106161749A (en) | A kind of malicious call recognition methods, and device | |
CN104735671B (en) | A kind of method and apparatus of identification malicious call | |
CN109067986A (en) | Synchronous display method, mobile terminal and the readable storage medium storing program for executing of intelligent wearable device | |
CN106657690A (en) | Method and device for preventing phone scam, and mobile terminal | |
CN108920235A (en) | Non- read flag control method, mobile terminal and computer readable storage medium | |
CN108574940A (en) | A kind for the treatment of method and apparatus of incoming call | |
CN106101410A (en) | A kind of call handling method, device and equipment | |
CN104378488A (en) | Harassing call processing method and device | |
CN108418948A (en) | A kind of based reminding method, mobile terminal and computer storage media | |
CN109450949A (en) | Mostly application releases the method for number binding, mobile terminal, readable storage medium storing program for executing | |
CN108307043A (en) | Speech message conversion method, mobile terminal and computer readable storage medium | |
CN106341315A (en) | Text message cleaning method, apparatus and mobile terminal | |
CN109219004A (en) | Short message unsubscription method, device, mobile terminal and readable storage medium storing program for executing | |
CN106911840A (en) | Mobile terminal and its voice service method and device | |
CN109375894A (en) | Earpiece volume based reminding method, device, mobile terminal and readable storage medium storing program for executing | |
CN104917905B (en) | Processing method, terminal and the server of Stranger Calls | |
CN108241808A (en) | identification code display control method, terminal and computer readable storage medium | |
CN110045830A (en) | Application operating method, apparatus and computer readable storage medium | |
CN106385482A (en) | Contact information processing method and device, and mobile terminal | |
CN109309762A (en) | Message treatment method, device, mobile terminal and storage medium | |
CN109067979A (en) | A kind of reminding method and mobile terminal | |
CN108845821A (en) | Application program update method, terminal and computer readable storage medium | |
CN105554325A (en) | Blacklist number processing method and mobile terminal | |
CN109257746A (en) | Communication establishing method, communication means, terminal and computer readable storage medium | |
CN106657542A (en) | Call treatment method, device and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |