CN106161749B - Malicious telephone identification method and device - Google Patents

Malicious telephone identification method and device Download PDF

Info

Publication number
CN106161749B
CN106161749B CN201510172266.9A CN201510172266A CN106161749B CN 106161749 B CN106161749 B CN 106161749B CN 201510172266 A CN201510172266 A CN 201510172266A CN 106161749 B CN106161749 B CN 106161749B
Authority
CN
China
Prior art keywords
malicious
information
telephone
voiceprint
call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510172266.9A
Other languages
Chinese (zh)
Other versions
CN106161749A (en
Inventor
刘杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Shenzhen Tencent Computer Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Computer Systems Co Ltd filed Critical Shenzhen Tencent Computer Systems Co Ltd
Priority to CN201510172266.9A priority Critical patent/CN106161749B/en
Publication of CN106161749A publication Critical patent/CN106161749A/en
Application granted granted Critical
Publication of CN106161749B publication Critical patent/CN106161749B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The embodiment of the invention discloses a method and a device for identifying malicious calls, wherein the method comprises the following steps: when a telephone calls in, the telephone is connected to obtain audio data; extracting identification information of the audio data, and matching the identification information with malicious information; and if the identification information is successfully matched with the malicious information, determining that the telephone is a malicious telephone. The process of switching on the telephone is the process that the equipment automatically completes and is not performed by the operation of the user, namely the equipment automatically completes switching on and extracts the audio data, and the process can not be visible to the user; the malicious telephone is determined through the identification information of the audio data, so that the condition that the malicious telephone cannot be identified due to the fact that the telephone number of the malicious telephone is hidden can be avoided, and the malicious telephone can be accurately identified.

Description

Malicious telephone identification method and device
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for identifying a malicious phone call.
Background
Malicious calls mainly refer to telephone calls generated during various abnormal use processes such as harassment, fraud, advertisement and the like, and the calls cause troubles to daily life of people. Therefore, there is a need for users to mask these malicious phones to reduce the disruption of normal life.
At present, harassment or fraud call interception technology is generally realized by marking based on numbers fed back by users. Taking the cloud server implementation as an example, the specific process is as follows: the user feeds back a certain telephone number as a malicious telephone number to the cloud server, and then the cloud server records the telephone number; when the telephone number dials the other user's telephone again, the other telephone firstly inquires the server whether the incoming telephone number is a malicious telephone number, determines that the incoming telephone number is a malicious telephone number when the incoming telephone number is obtained and marked as malicious, and intercepts the incoming telephone.
However, the existing virtual operator can allow the user to apply for the telephone number at will to hide the malicious telephone, so that the malicious telephone cannot be accurately identified by recording the malicious telephone number.
Disclosure of Invention
The embodiment of the invention provides a method and a device for identifying a malicious telephone, which are used for accurately identifying the malicious telephone.
A malicious phone identification method, comprising:
when a telephone calls in, the telephone is connected to obtain audio data;
extracting identification information of the audio data, and matching the identification information with malicious information;
and if the identification information is successfully matched with the malicious information, determining that the telephone is a malicious telephone.
A malicious phone recognition apparatus comprising:
the audio acquisition unit is used for connecting a telephone to acquire audio data when the telephone calls in;
an information extraction unit for extracting identification information of the audio data;
the information matching unit is used for matching the identification information with malicious information;
and the telephone confirming unit is used for determining that the telephone is a malicious telephone if the identification information is successfully matched with the malicious information.
According to the technical scheme, the embodiment of the invention has the following advantages: the process of switching on the telephone is the process that the equipment automatically completes and is not performed by the operation of the user, namely the equipment automatically completes switching on and extracts the audio data, and the process can not be visible to the user; the malicious telephone is determined through the identification information of the audio data, so that the condition that the malicious telephone cannot be identified due to the fact that the telephone number of the malicious telephone is hidden can be avoided, and the malicious telephone can be accurately identified.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a schematic flow chart of a method according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart of a method according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of an apparatus according to an embodiment of the present invention;
FIG. 4 is a schematic structural diagram of an apparatus according to an embodiment of the present invention;
FIG. 5 is a schematic structural diagram of an apparatus according to an embodiment of the present invention;
FIG. 6 is a schematic structural diagram of an apparatus according to an embodiment of the present invention;
FIG. 7 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
An embodiment of the present invention provides a method for identifying a malicious phone call, as shown in fig. 1, including:
101: when a call comes in, the call is connected to obtain audio data;
the execution main body of the embodiment of the present invention may be a telephone device, and may be a mobile phone, and may also be a tablet computer or other device having a communication function. In the embodiment of the invention, the process of switching on the telephone is the process that the equipment completes automatically and is not performed by the operation of the user, namely the process that the equipment completes switching on and extracts the audio data automatically, and the process can not be visible to the user. According to the malicious call identification method, the equipment automatically connects the call, so that whether the function is started or not can be started or closed through user configuration.
In addition, for the embodiment of the present invention, some phones may confirm that operations such as subsequently extracting identification information of audio data and matching are not required to be performed in the embodiment of the present invention, so that unnecessary data processing procedures may be saved, and interference of the device on a phone call flow may be reduced, which is specifically as follows: before the telephone is connected to obtain the audio data, the method further comprises: determining whether the source end of the incoming call is a white list user, if so, continuing the call and waiting for the user to answer; if not, the above-mentioned call is connected to obtain audio data.
In this embodiment, the white list user refers to a situation that it can be determined that the call is not a malicious call, for example: the telephone number existing in the address book of the mobile phone is used as an incoming call source, or a known public telephone incoming call, such as: bank, emergency, etc. official telephones. The specific white list may correspond to different obtaining modes according to different information types, which is not described herein again.
102: extracting identification information of the audio data, and matching the identification information with malicious information;
in the present embodiment, the identification information is information for distinguishing audio data, and may be voiceprint information, or may be characteristic information based on other data after processing, including characteristics of audio data, as long as the information is theoretically capable of distinguishing various audios. Two preferred examples of which are given in the following examples:
the identification information includes: voiceprint information and/or text information, the text information obtained by speech recognition of the audio data.
The voiceprint information is characteristic information for voiceprint recognition, and the voiceprint recognition comprises the following steps: refers to an acoustic feature that uniquely identifies a person or something. The text information is obtained based on voice recognition, and text similarity recognition can be achieved. And (3) voice recognition: the words spoken by the user are extracted by a speech analysis method from the spoken words of the user. Text similarity recognition: the method refers to that a large amount of texts are subjected to word segmentation, word frequency analysis or semantic analysis to find out texts with the same or similar meanings or contents in the texts.
The embodiment of the invention also provides a matching implementation scheme, which specifically comprises the following steps: the matching using the identification information and the malicious information includes:
and sending the identification information to a server, and receiving a matching result returned after the server uses the identification information to match with the malicious information.
Because the matching of the identification information and the malicious information needs to be supported by a database, the database can be placed in a server at the cloud end in order to ensure the identification accuracy and timely update of the database, and therefore the matching process can be an interaction process of a terminal and the server. The server at the cloud end can update the database of the malicious information in time by using the advantages of the server at the cloud end.
103: and if the identification information is successfully matched with the malicious information, determining that the telephone is a malicious telephone.
It will be appreciated that if the match is not successful and is considered to be a non-malicious phone, the phone call can continue and the user hears the call ring. Since the phone is switched on at this time, the ring back tone can be played to the calling party after switching on, avoiding the silence of the waiting time of the calling party. In addition, after continuing the telephone call for a predetermined time, if the user does not answer, the call connection needs to be disconnected by the device. In addition, the calling party can be informed that the called party does not answer the call. If the matching is successful, the telephone can be directly hung up, so that the shielding of the malicious telephone is realized. The results of masking the phone may be further displayed. The embodiment of the present invention is not limited to the processing after identifying the malicious phone.
In the embodiment of the invention, the call connection is a process which is automatically completed by the equipment and is not executed by the user operation, namely the equipment automatically completes the call connection and extracts the audio data, and the process can not be visible to the user; the malicious telephone is determined through the identification information of the audio data, so that the condition that the malicious telephone cannot be identified due to the fact that the telephone number of the malicious telephone is hidden can be avoided, and the malicious telephone can be accurately identified.
The embodiment of the invention also provides a specific implementation mode for matching the identification information and the malicious information, which comprises the following steps: the matching using the identification information and the malicious information includes: calculating the similarity between the identification information and malicious information; the successful matching of the identification information and the malicious information comprises the following steps: the calculated similarity exceeds a predetermined threshold.
The process of calculating the similarity can be realized on the server side or the terminal side, and the implementation equipment can be determined by the principle of approaching to the database of malicious information.
The embodiment of the invention also provides an updating scheme of the database of the malicious information, which specifically comprises the following steps: the method further comprises the following steps: if the identification information fails to be matched with the malicious information, continuing the telephone call and waiting for the user to answer the call; and after the user answers the phone, if the mark information that the phone is a malicious phone is received, storing the identification information into malicious information.
If the database of the malicious information exists locally, the malicious information can be stored in the local database, and if the database of the malicious information exists at one end of the server, the malicious information can be stored in the server by sending the malicious information to the server, and the server stores the malicious information in the database at one side of the server. The specific implementation process can be set according to the needs, and the embodiment is not limited uniquely.
The following examples will give a specific example illustrating embodiments of the present invention.
The basic idea and principle of the embodiment of the invention are as follows: through user marking and system analysis, a baddie in a user who makes a call every day is found out, and identification information such as voiceprint information of the baddie is extracted to establish a database of malicious information. When a user receives a call, the mobile phone software firstly makes the call be communicated for a plurality of seconds by default, extracts the voice information in the call and the existing voice print of the baddie to compare or extracts the voice information and then compares the text content with the malicious information, thereby identifying whether the current incoming call user is a harassment or a fraud call of the baddie.
The implementation process of the embodiment of the invention is mainly divided into five parts:
firstly, acquiring initial seeds of a bad person:
through feedback and marking after the user answers the call and text analysis after the system identifies the voice, audio data of harassing or fraudulent calls are found out.
Secondly, voiceprint extraction:
and after audio data of the bad person is obtained, voiceprint information of the bad person is extracted, and a malicious voiceprint library is generated.
Thirdly, voice recognition:
and after audio data of the baddie are obtained, voice recognition is carried out, conversation contents are extracted, and a malicious text library is generated.
Fourthly, identifying the badges in real time:
the method comprises the following steps that a pre-answering module is inserted into a telephone answering module of a user, when the user receives a call of a number, before the user answers the call, a system firstly puts through the call and then extracts audio data of the voice of a plurality of seconds in the previous time: the processing after extracting the audio data may be two kinds as follows:
1. voiceprint information of the audio data is extracted and compared with malicious information in the system. If the voiceprint information is matched with the voiceprint in the malicious information, the telephone is regarded as a malicious telephone and is directly hung up.
2. And performing voice recognition on the audio data to extract texts involved in the voice, matching the texts by using malicious information, determining whether the contents are malicious contents, and judging that the contents are malicious calls if the contents are malicious contents, and directly hanging the malicious calls.
Fifthly, the scurfy seeds are abundant:
if the user determines that the phone call is a malicious phone call after answering the phone call, but the system does not have a seed before, the user can mark the phone call as malicious after answering the phone call, and then the system extracts voiceprint information of the user and adds the voiceprint information into a database of malicious information after passing the audit, so that enrichment of the seed database is completed.
The specific method implementation process can be shown in fig. 2, and includes:
201: an incoming telephone call;
202: a system control system of the terminal answers the call, extracts audio information of a plurality of seconds of the call and extracts identification information of the audio information; the method specifically comprises the following steps: voiceprint information and/or text information of the audio information is extracted.
203: matching the identification information with malicious information in a database of the malicious information to obtain a matching result; the database of malicious information may differ for different identification information, including, for example: a malicious database of voiceprint information, and/or a malicious database of text information.
204: determining that the phone is a malicious phone according to the matching result, and controlling to hang up to enter 207;
205: if the user does not have maliciousness according to the matching result, controlling to start ringing and waiting for the user to answer the call;
206: the user answers the call, and if the malicious information is determined, the identification information is updated to the database of the malicious information; if not, entering 207 after answering;
207: the call is ended by hanging up the telephone.
The embodiment of the invention does not carry out identification based on the calling number, so that malicious calls can be effectively identified, and the baddie can be effectively prevented from changing numbers and bypassing.
An embodiment of the present invention further provides a malicious phone identification apparatus, as shown in fig. 3, including:
an audio acquisition unit 301, configured to, when a call is incoming, connect the call to acquire audio data;
an information extraction unit 302 for extracting identification information of the audio data;
an information matching unit 303 configured to match malicious information with the identification information;
a phone confirmation unit 304, configured to determine that the phone is a malicious phone if the identification information is successfully matched with the malicious information.
The execution main body of the embodiment of the present invention may be a telephone device, and may be a mobile phone, and may also be a tablet computer or other device having a communication function. In the embodiment of the invention, the process of switching on the telephone is the process that the equipment completes automatically and is not performed by the operation of the user, namely the process that the equipment completes switching on and extracts the audio data automatically, and the process can not be visible to the user. According to the malicious call identification method, the equipment automatically connects the call, so that whether the function is started or not can be started or closed through user configuration.
It will be appreciated that if the match is not successful and is considered to be a non-malicious phone, the phone call can continue and the user hears the call ring. Since the phone is switched on at this time, the ring back tone can be played to the calling party after switching on, avoiding the silence of the waiting time of the calling party. In addition, after continuing the telephone call for a predetermined time, if the user does not answer, the call connection needs to be disconnected by the device. In addition, the calling party can be informed that the called party does not answer the call. If the matching is successful, the telephone can be directly hung up, so that the shielding of the malicious telephone is realized. The results of masking the phone may be further displayed. The embodiment of the present invention is not limited to the processing after identifying the malicious phone.
In the embodiment of the invention, the call connection is a process which is automatically completed by the equipment and is not executed by the user operation, namely the equipment automatically completes the call connection and extracts the audio data, and the process can not be visible to the user; the malicious telephone is determined through the identification information of the audio data, so that the condition that the malicious telephone cannot be identified due to the fact that the telephone number of the malicious telephone is hidden can be avoided, and the malicious telephone can be accurately identified.
In the present embodiment, the identification information is information for distinguishing audio data, and may be voiceprint information, or may be characteristic information based on other data after processing, including characteristics of audio data, as long as the information is theoretically capable of distinguishing various audios. Two preferred examples of which are given in the following examples:
optionally, the identification information includes:
voiceprint information and/or text information, the text information obtained by speech recognition of the audio data.
The voiceprint information is characteristic information for voiceprint recognition, and the voiceprint recognition comprises the following steps: refers to an acoustic feature that uniquely identifies a person or something. The text information is obtained based on voice recognition, and text similarity recognition can be achieved. And (3) voice recognition: the words spoken by the user are extracted by a speech analysis method from the spoken words of the user. Text similarity recognition: the method refers to that a large amount of texts are subjected to word segmentation, word frequency analysis or semantic analysis to find out texts with the same or similar meanings or contents in the texts.
The embodiment of the invention also provides a specific implementation mode for matching the identification information and the malicious information, which comprises the following steps: optionally, the information matching unit 303 is configured to calculate a similarity between the identification information and malicious information;
the phone confirmation unit 304 is configured to determine that the phone is a malicious phone if the similarity calculated by the information matching unit 303 exceeds a predetermined threshold.
The process of calculating the similarity can be realized on the server side or the terminal side, and the implementation equipment can be determined by the principle of approaching to the database of malicious information.
In addition, for the embodiment of the present invention, some phones may confirm that operations such as subsequently extracting identification information of audio data and matching are not required to be performed in the embodiment of the present invention, so that unnecessary data processing procedures may be saved, and interference of the device on a phone call flow may be reduced, which is specifically as follows: further, as shown in fig. 4, the apparatus further includes:
a logic control unit 401, configured to determine whether a source of an incoming call is a white list user before the audio obtaining unit 301 connects the call to obtain audio data, and if so, continue the call and wait for the user to answer the call;
the audio acquiring unit 301 is configured to, after the logic control unit 401 determines that the result is negative, turn on the telephone to acquire audio data.
In this embodiment, the white list user refers to a situation that it can be determined that the call is not a malicious call, for example: the telephone number existing in the address book of the mobile phone is used as an incoming call source, or a known public telephone incoming call, such as: bank, emergency, etc. official telephones. The specific white list may correspond to different obtaining modes according to different information types, which is not described herein again.
The embodiment of the invention also provides an updating scheme of the database of the malicious information, which specifically comprises the following steps: further, as shown in fig. 5, the apparatus further includes:
an answering control unit 501, configured to continue the phone call and wait for the user to answer if the identification information fails to match the malicious information;
the information maintenance unit 502 is configured to, after the user answers the call, store the identification information into malicious information if the tag information that the call is a malicious call is received.
If the database of the malicious information exists locally, the malicious information can be stored in the local database, and if the database of the malicious information exists at one end of the server, the malicious information can be stored in the server by sending the malicious information to the server, and the server stores the malicious information in the database at one side of the server. The specific implementation process can be set according to the needs, and the embodiment is not limited uniquely.
The embodiment of the invention also provides a matching implementation scheme, which specifically comprises the following steps: optionally, the information matching unit 303 is configured to send the identification information to a server, and receive a matching result returned by the server after matching the identification information with malicious information.
Because the matching of the identification information and the malicious information needs to be supported by a database, the database can be placed in a server at the cloud end in order to ensure the identification accuracy and timely update of the database, and therefore the matching process can be an interaction process of a terminal and the server. The server at the cloud end can update the database of the malicious information in time by using the advantages of the server at the cloud end.
An embodiment of the present invention further provides another malicious phone identification apparatus, as shown in fig. 6, including: a receiver 601, a transmitter 602, a processor 603, and a memory 604;
the processor 603 is configured to, when a call is incoming, connect the call to obtain audio data; extracting identification information of the audio data, and matching the identification information with malicious information; and if the identification information is successfully matched with the malicious information, determining that the telephone is a malicious telephone.
The execution main body of the embodiment of the present invention may be a telephone device, and may be a mobile phone, and may also be a tablet computer or other device having a communication function. In the embodiment of the invention, the process of switching on the telephone is the process that the equipment completes automatically and is not performed by the operation of the user, namely the process that the equipment completes switching on and extracts the audio data automatically, and the process can not be visible to the user. According to the malicious call identification method, the equipment automatically connects the call, so that whether the function is started or not can be started or closed through user configuration.
It will be appreciated that if the match is not successful and is considered to be a non-malicious phone, the phone call can continue and the user hears the call ring. Since the phone is switched on at this time, the ring back tone can be played to the calling party after switching on, avoiding the silence of the waiting time of the calling party. In addition, after continuing the telephone call for a predetermined time, if the user does not answer, the call connection needs to be disconnected by the device. In addition, the calling party can be informed that the called party does not answer the call. If the matching is successful, the telephone can be directly hung up, so that the shielding of the malicious telephone is realized. The results of masking the phone may be further displayed. The embodiment of the present invention is not limited to the processing after identifying the malicious phone.
In the embodiment of the invention, the call connection is a process which is automatically completed by the equipment and is not executed by the user operation, namely the equipment automatically completes the call connection and extracts the audio data, and the process can not be visible to the user; the malicious telephone is determined through the identification information of the audio data, so that the condition that the malicious telephone cannot be identified due to the fact that the telephone number of the malicious telephone is hidden can be avoided, and the malicious telephone can be accurately identified.
In addition, for the embodiment of the present invention, some phones may confirm that operations such as subsequently extracting identification information of audio data and matching are not required to be performed in the embodiment of the present invention, so that unnecessary data processing procedures may be saved, and interference of the device on a phone call flow may be reduced, which is specifically as follows: the processor 603 is further configured to determine whether a source of the incoming call is a white list user before the call is connected to obtain the audio data, and if so, continue the call and wait for the user to answer the call; if not, the above-mentioned call is connected to obtain audio data.
In this embodiment, the white list user refers to a situation that it can be determined that the call is not a malicious call, for example: the telephone number existing in the address book of the mobile phone is used as an incoming call source, or a known public telephone incoming call, such as: bank, emergency, etc. official telephones. The specific white list may correspond to different obtaining modes according to different information types, which is not described herein again.
In the present embodiment, the identification information is information for distinguishing audio data, and may be voiceprint information, or may be characteristic information based on other data after processing, including characteristics of audio data, as long as the information is theoretically capable of distinguishing various audios. Two preferred examples of which are given in the following examples:
the identification information includes: voiceprint information and/or text information, the text information obtained by speech recognition of the audio data.
The voiceprint information is characteristic information for voiceprint recognition, and the voiceprint recognition comprises the following steps: refers to an acoustic feature that uniquely identifies a person or something. The text information is obtained based on voice recognition, and text similarity recognition can be achieved. And (3) voice recognition: the words spoken by the user are extracted by a speech analysis method from the spoken words of the user. Text similarity recognition: the method refers to that a large amount of texts are subjected to word segmentation, word frequency analysis or semantic analysis to find out texts with the same or similar meanings or contents in the texts.
The embodiment of the invention also provides a matching implementation scheme, which specifically comprises the following steps: the processor 603 is configured to match malicious information with the identification information, and includes:
and sending the identification information to a server, and receiving a matching result returned after the server uses the identification information to match with the malicious information.
Because the matching of the identification information and the malicious information needs to be supported by a database, the database can be placed in a server at the cloud end in order to ensure the identification accuracy and timely update of the database, and therefore the matching process can be an interaction process of a terminal and the server. The server at the cloud end can update the database of the malicious information in time by using the advantages of the server at the cloud end.
The embodiment of the invention also provides a specific implementation mode for matching the identification information and the malicious information, which comprises the following steps: the processor 603, configured to match the malicious information with the identification information, includes: calculating the similarity between the identification information and malicious information; the processor 603, configured to successfully match the identification information with the malicious information, includes: the calculated similarity exceeds a predetermined threshold.
The process of calculating the similarity can be realized on the server side or the terminal side, and the implementation equipment can be determined by the principle of approaching to the database of malicious information.
The embodiment of the invention also provides an updating scheme of the database of the malicious information, which specifically comprises the following steps: the processor 603 is further configured to continue the phone call and wait for the user to answer the call if the identification information fails to match the malicious information; and after the user answers the phone, if the mark information that the phone is a malicious phone is received, storing the identification information into malicious information.
If the database of the malicious information exists locally, the malicious information can be stored in the local database, and if the database of the malicious information exists at one end of the server, the malicious information can be stored in the server by sending the malicious information to the server, and the server stores the malicious information in the database at one side of the server. The specific implementation process can be set according to the needs, and the embodiment is not limited uniquely.
Fig. 7 shows only a portion related to the embodiment of the present invention for convenience of description, and please refer to the method portion in the embodiment of the present invention for details that are not disclosed. The device is exemplified by a terminal, which may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal digital assistant), a POS (Point of Sales), a vehicle-mounted computer, etc., and is exemplified by a mobile phone:
fig. 7 is a block diagram illustrating a partial structure of a mobile phone related to a terminal provided in an embodiment of the present invention. Referring to fig. 7, the handset includes: radio Frequency (RF) circuit 710, memory 720, input unit 730, display unit 740, sensor 750, audio circuit 760, wireless fidelity (WiFi) module 770, processor 780, and power supply 790. Those skilled in the art will appreciate that the handset configuration shown in fig. 7 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile phone in detail with reference to fig. 7:
the RF circuit 710 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, receives downlink information of a base station and then processes the received downlink information to the processor 780; in addition, the data for designing uplink is transmitted to the base station. In general, the RF circuit 710 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuit 710 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to global system for Mobile communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The memory 720 may be used to store software programs and modules, and the processor 780 may execute various functional applications and data processing of the cellular phone by operating the software programs and modules stored in the memory 720. The memory 720 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 720 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 730 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone. Specifically, the input unit 730 may include a touch panel 731 and other input devices 732. The touch panel 731, also referred to as a touch screen, can collect touch operations of a user (e.g. operations of the user on or near the touch panel 731 by using any suitable object or accessory such as a finger, a stylus, etc.) and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 731 may include two portions of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts it to touch point coordinates, and sends the touch point coordinates to the processor 780, and can receive and execute commands from the processor 780. In addition, the touch panel 731 may be implemented by various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 730 may include other input devices 732 in addition to the touch panel 731. In particular, other input devices 732 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 740 may be used to display information input by the user or information provided to the user and various menus of the mobile phone. The display unit 740 may include a display panel 741, and optionally, the display panel 741 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch panel 731 can cover the display panel 741, and when the touch panel 731 detects a touch operation on or near the touch panel 731, the touch operation is transmitted to the processor 780 to determine the type of the touch event, and then the processor 780 provides a corresponding visual output on the display panel 741 according to the type of the touch event. Although the touch panel 731 and the display panel 741 are two independent components in fig. 7 to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 731 and the display panel 741 may be integrated to implement the input and output functions of the mobile phone.
The handset may also include at least one sensor 750, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 741 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 741 and/or a backlight when the mobile phone is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
Audio circuitry 760, speaker 761, and microphone 762 may provide an audio interface between a user and a cell phone. The audio circuit 760 can transmit the electrical signal converted from the received audio data to the speaker 761, and the electrical signal is converted into a sound signal by the speaker 761 and output; on the other hand, the microphone 762 converts the collected sound signal into an electric signal, converts the electric signal into audio data after being received by the audio circuit 760, and then processes the audio data output processor 780, and then transmits the audio data to, for example, another cellular phone through the RF circuit 710, or outputs the audio data to the memory 720 for further processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 770, and provides wireless broadband Internet access for the user. Although fig. 7 shows the WiFi module 770, it is understood that it does not belong to the essential constitution of the handset, and can be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 780 is a control center of the mobile phone, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 720 and calling data stored in the memory 720, thereby integrally monitoring the mobile phone. Optionally, processor 780 may include one or more processing units; preferably, the processor 780 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 780.
The handset also includes a power supply 790 (e.g., a battery) for powering the various components, which may preferably be logically coupled to the processor 780 via a power management system, so that the power management system may be used to manage charging, discharging, and power consumption.
Although not shown, the mobile phone may further include a camera, a bluetooth module, etc., which are not described herein.
In the embodiment of the present invention, the processor 780 included in the terminal further has a function of executing the method flow in the foregoing embodiment.
It should be noted that, in the above device embodiment, each included unit is only divided according to functional logic, but is not limited to the above division as long as the corresponding function can be achieved; in addition, specific names of the functional units are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present invention.
In addition, it is understood by those skilled in the art that all or part of the steps in the above method embodiments may be implemented by related hardware, and the corresponding program may be stored in a computer readable storage medium, where the above mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the embodiment of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (7)

1. A malicious phone identification method, comprising:
when a call comes in, judging whether the source end of the call comes in is a telephone number existing in the address list or a known public telephone, if so, continuing the call and waiting for the user to answer; if not, switching on the telephone to acquire audio data;
extracting voiceprint information of the audio data, and matching the voiceprint information with malicious voiceprints;
if the voiceprint information is successfully matched with the malicious voiceprint, determining that the telephone is a malicious telephone;
if the voiceprint information fails to be matched with the malicious voiceprint, continuing the telephone call and playing a ring back tone to a calling party to wait for a user to answer; after continuing the telephone call for a preset time, if the user does not answer, disconnecting the call connection;
after the user answers the phone, if the mark information that the phone is a malicious phone is received, voiceprint information is extracted, and the extracted voiceprint information is stored in a malicious voiceprint library, so that the malicious voiceprint library is enriched.
2. The method of claim 1, wherein the using the voiceprint information to match a malicious voiceprint comprises: calculating the similarity between the voiceprint information and the malicious voiceprint;
the successful matching of the voiceprint information and the malicious voiceprint comprises the following steps: the calculated similarity exceeds a predetermined threshold.
3. The method of claim 1, wherein said using the voiceprint information to match a malicious voiceprint comprises:
and sending the voiceprint information to a server, and receiving a matching result returned after the server matches the voiceprint information with the malicious voiceprint.
4. An apparatus for recognizing a malicious telephone, comprising:
the logic control unit is used for determining whether a source end of the incoming call is a white list user when the incoming call exists, if so, continuing the incoming call and waiting for the user to answer the call;
the audio acquisition unit is used for connecting the telephone to acquire audio data after the logic control unit determines that the result is negative;
an information extraction unit for extracting voiceprint information of the audio data;
the information matching unit is used for matching the voiceprint information with the malicious voiceprint;
the telephone confirming unit is used for determining that the telephone is a malicious telephone if the voiceprint information is successfully matched with the malicious voiceprint;
the answering control unit is used for continuing the telephone call and playing a ring back tone to a calling party if the voiceprint information fails to be matched with the malicious voiceprint, and waiting for a user to answer the call; after continuing the telephone call for a preset time, if the user does not answer, disconnecting the call connection;
and the information maintenance unit is used for storing the voiceprint information into a malicious voiceprint library if the marking information that the telephone is a malicious telephone is received after the user answers the phone, so that the malicious voiceprint library is enriched.
5. The apparatus of claim 4,
the information matching unit is used for calculating the similarity between the voiceprint information and the malicious voiceprint;
the telephone confirming unit is used for determining that the telephone is a malicious telephone if the similarity calculated by the information matching unit exceeds a preset threshold.
6. The apparatus of claim 4,
and the information matching unit is used for sending the voiceprint information to the server and receiving a matching result returned after the server matches the voiceprint information with the malicious voiceprint.
7. A computer-readable storage medium, characterized in that a program is stored in the storage medium; the program, when executed, implements a malicious phone identification method as claimed in any one of claims 1-3.
CN201510172266.9A 2015-04-13 2015-04-13 Malicious telephone identification method and device Active CN106161749B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510172266.9A CN106161749B (en) 2015-04-13 2015-04-13 Malicious telephone identification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510172266.9A CN106161749B (en) 2015-04-13 2015-04-13 Malicious telephone identification method and device

Publications (2)

Publication Number Publication Date
CN106161749A CN106161749A (en) 2016-11-23
CN106161749B true CN106161749B (en) 2020-09-08

Family

ID=57336834

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510172266.9A Active CN106161749B (en) 2015-04-13 2015-04-13 Malicious telephone identification method and device

Country Status (1)

Country Link
CN (1) CN106161749B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106470260A (en) * 2015-08-18 2017-03-01 东莞酷派软件技术有限公司 A kind of call blocking method and device
CN107154996B (en) * 2017-06-30 2020-02-11 Oppo广东移动通信有限公司 Incoming call interception method and device, storage medium and terminal
CN107197463A (en) * 2017-07-10 2017-09-22 北京亿赛通网络安全技术有限公司 A kind of detection method of telephone fraud, storage medium and electronic equipment
CN107231494A (en) * 2017-07-10 2017-10-03 北京亿赛通网络安全技术有限公司 A kind of acquisition methods of user communication characteristic, storage medium and electronic equipment
CN110062097B (en) * 2019-05-08 2021-01-05 深圳市锐尔觅移动通信有限公司 Crank call processing method and device, mobile terminal and storage medium
CN110351415A (en) * 2019-06-26 2019-10-18 厦门快商通信息咨询有限公司 Determination method, apparatus, equipment and the storage medium of harassing call number
CN110602303A (en) * 2019-08-30 2019-12-20 厦门快商通科技股份有限公司 Method and system for preventing telecommunication fraud based on audio fingerprint technology
CN112784038A (en) * 2019-10-23 2021-05-11 阿里巴巴集团控股有限公司 Information identification method, system, computing device and storage medium
CN113099040A (en) * 2021-04-02 2021-07-09 刘远 Memory, abnormal calling prevention and control method, device and equipment

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010109619A (en) * 2008-10-29 2010-05-13 Ntt Communications Kk Authentication device, authentication method, and program
CN102223431A (en) * 2011-06-27 2011-10-19 杨子江 Method and system for preventing harassment call
CN103458412A (en) * 2012-06-04 2013-12-18 百度在线网络技术(北京)有限公司 System and method for preventing phone fraud, mobile terminal and cloud terminal analysis server
CN103685613A (en) * 2013-12-05 2014-03-26 江苏大学 Telephone-fraud-resistant system based on voice recognition and method thereof
CN103700371A (en) * 2013-12-13 2014-04-02 江苏大学 Voiceprint identification-based incoming call identity identification system and identification method
CN103929523A (en) * 2014-03-26 2014-07-16 广东明创软件科技有限公司 Method and mobile terminal for intelligently processing incoming call
CN104065836A (en) * 2014-05-30 2014-09-24 小米科技有限责任公司 Method and device for monitoring calls
CN104104771A (en) * 2014-07-25 2014-10-15 小米科技有限责任公司 Conversation processing method and device
CN104184872A (en) * 2014-09-14 2014-12-03 陈桂芳 Crank call preventing mobile phone achieving method based on conversation content

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010109619A (en) * 2008-10-29 2010-05-13 Ntt Communications Kk Authentication device, authentication method, and program
CN102223431A (en) * 2011-06-27 2011-10-19 杨子江 Method and system for preventing harassment call
CN103458412A (en) * 2012-06-04 2013-12-18 百度在线网络技术(北京)有限公司 System and method for preventing phone fraud, mobile terminal and cloud terminal analysis server
CN103685613A (en) * 2013-12-05 2014-03-26 江苏大学 Telephone-fraud-resistant system based on voice recognition and method thereof
CN103700371A (en) * 2013-12-13 2014-04-02 江苏大学 Voiceprint identification-based incoming call identity identification system and identification method
CN103929523A (en) * 2014-03-26 2014-07-16 广东明创软件科技有限公司 Method and mobile terminal for intelligently processing incoming call
CN104065836A (en) * 2014-05-30 2014-09-24 小米科技有限责任公司 Method and device for monitoring calls
CN104104771A (en) * 2014-07-25 2014-10-15 小米科技有限责任公司 Conversation processing method and device
CN104184872A (en) * 2014-09-14 2014-12-03 陈桂芳 Crank call preventing mobile phone achieving method based on conversation content

Also Published As

Publication number Publication date
CN106161749A (en) 2016-11-23

Similar Documents

Publication Publication Date Title
CN106161749B (en) Malicious telephone identification method and device
US9813538B2 (en) Malicious call recognition method and apparatus
CN108347512B (en) Identity recognition method and mobile terminal
CN106528545B (en) Voice information processing method and device
CN109587319B (en) Incoming call processing method, terminal and computer readable storage medium
CN109120798B (en) Identification processing method of bound application and mobile terminal
CN110045830A (en) Application operating method, apparatus and computer readable storage medium
CN109167880A (en) Double-sided screen terminal control method, double-sided screen terminal and computer readable storage medium
CN113452845B (en) Method for identifying abnormal telephone number and electronic equipment
CN109453526B (en) Sound processing method, terminal and computer readable storage medium
CN109361804B (en) Incoming call processing method and mobile terminal
CN107992742A (en) A kind of method and apparatus of installation kit identification
CN109729210B (en) Information display method and terminal equipment
CN109714462A (en) A kind of labeling method and its mobile terminal of telephone number
CN109257746A (en) Communication establishing method, communication means, terminal and computer readable storage medium
CN107645604B (en) Call processing method and mobile terminal
CN107592400A (en) The processing method and terminal of recording file
CN109348066B (en) Incoming call intention identification method, terminal and computer readable storage medium
CN108900722B (en) Information input method in call process and mobile terminal
CN107861955B (en) Translation method and mobile terminal
CN110121879B (en) Method and terminal equipment for identifying identity of call object
CN110602329A (en) Incoming call processing method and mobile terminal
CN108833689A (en) Incoming call mute method, mobile terminal and computer readable storage medium
CN111416913B (en) Crank call detection method and device
CN110536014B (en) Incoming call processing method and terminal equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant