CN106782495A - The recognition methods of malicious call and device - Google Patents
The recognition methods of malicious call and device Download PDFInfo
- Publication number
- CN106782495A CN106782495A CN201510808754.4A CN201510808754A CN106782495A CN 106782495 A CN106782495 A CN 106782495A CN 201510808754 A CN201510808754 A CN 201510808754A CN 106782495 A CN106782495 A CN 106782495A
- Authority
- CN
- China
- Prior art keywords
- call
- voice
- malicious call
- malicious
- label
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 48
- 238000004458 analytical method Methods 0.000 claims abstract description 27
- 230000005611 electricity Effects 0.000 claims description 18
- 238000001514 detection method Methods 0.000 claims description 11
- 238000001228 spectrum Methods 0.000 description 26
- 238000005516 engineering process Methods 0.000 description 8
- 238000003860 storage Methods 0.000 description 8
- 230000000694 effects Effects 0.000 description 4
- 238000001914 filtration Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 239000000428 dust Substances 0.000 description 3
- 230000005713 exacerbation Effects 0.000 description 2
- 238000010606 normalization Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000011982 device technology Methods 0.000 description 1
- 230000007717 exclusion Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L15/00—Speech recognition
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/663—Preventing unauthorised calls to a telephone set
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computational Linguistics (AREA)
- Health & Medical Sciences (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
Recognition methods and device the invention discloses a kind of malicious call, during receiving calls, gather other side's voice of certain time length;Other side's voice is sent to cloud server, so that other side's voice is carried out speech analysis by cloud server, obtain the phonetic feature point of other side's voice, the phonetic feature point of other side's voice is matched with the phonetic feature point in the malicious call voice feature data storehouse for pre-building, when the match is successful, the prompting of malicious call is returned;The prompting of the malicious call fed back according to cloud server, shows the prompting of the malicious call on call interface.Improving user makes telephonic security.
Description
Technical field
The invention belongs to mobile device technology field, specifically, it is related to a kind of identification side of malicious call
Method and device.
Background technology
In current social using phone without recipient permit, carry out mandatory illegal phone advertisement,
Phone is publicized and faxed, and they not only also often dial harassing and wrecking at dead of night, continuously on daytime
Phone, disturbs the normal living environment of people and working environment, due to harassing call unbridledly
It is much to implement harassing and wrecking words by the method for the networking telephone to move, existing public telephone network cannot be known again
The source of other harassing call, it is also difficult to differentiate harassing call and normal telephone, and due to current
Telephone set can only be by by the preset trusted telephone number of user oneself, isolating the side of other all phones
Method prevents harassing call, and this just greatly limit the purposes of telephone set, therefore harassing call is difficult Du
Absolutely, utilized by saboteur in society and bad commercial competition, carry out illegal harassing and wrecking activity.
The content of the invention
In view of this, the recognition methods this application provides a kind of malicious call and device, it is possible to achieve logical
The matching for crossing phonetic feature point is intercepted to malicious call.
The embodiment of the present invention provides a kind of recognition methods of malicious call, including:
During receiving calls, other side's voice of certain time length is gathered;
Other side's voice is sent to cloud server, so that other side's voice is carried out voice point by cloud server
Analysis, obtains the phonetic feature point of other side's voice, by phonetic feature point and the evil for pre-building of other side's voice
Phonetic feature point in meaning call voice property data base is matched, and when the match is successful, returns to malice
The prompting of phone;
The prompting of the malicious call fed back according to cloud server, shows the malice electricity on call interface
The prompting of words.
Alternatively, described method, also includes:
During receiving calls, according to user instruction, when user's selection malicious call option is detected,
It is malicious call by other side's incoming identification, and the recording of certain time length is carried out to the voice of malicious call;
The voice of malicious call is sent to cloud server, so that the cloud server is to malicious call
Voice carry out speech analysis, the phonetic feature point of malicious call is obtained, by the voice of the malicious call
Characteristic point is saved in malicious call voice feature data storehouse.
Alternatively, the malicious call includes intermediary's phone, sale call, fraudulent call, harassing call
Or self-defined phone;
During receiving calls, according to user instruction, when user's selection malicious call option is detected,
It is malicious call by other side's incoming identification, including:
During receiving calls, phone label option, the phone label choosing are shown on call interface
Item includes the label of intermediary's phone, the label of sale call, the label of fraudulent call, harassing call
The option of label or self-defined phone label, so that user selects according to other side's voice in phone label option
It is the malicious call corresponding to the label that user selects by other side's incoming identification when selecting any label.
Alternatively, the voice of malicious call is carried out after the recording of certain time length, is also included:
According to the label that user selects, the label information is added in the voice of the malicious call recorded.
Alternatively, the voice of malicious call is carried out after the recording of certain time length, is also included:
Caller ID is added in the voice of the malicious call recorded.
Alternatively, the malicious call voice feature data storehouse includes:The incoming call number of multiple malicious calls
Code information, the phonetic feature point information of multiple malicious calls, the label information of the voice of multiple malicious calls;
Also include in the malicious call voice feature data storehouse:The caller ID of malicious call and malice electricity
The phonetic feature point of corresponding relation, malicious call between the phonetic feature point of words is corresponding with label to close
System, the one-to-one relationship between the caller ID of malicious call and phonetic feature point and label.
Alternatively, it is anti-according to cloud server if the prompting of the malicious call includes label information
The prompting of the malicious call of feedback, shows the prompting of the malicious call on call interface, including:
The label information that user equipment includes according to the prompting of the malicious call, shows on call interface
Show the corresponding malicious call label of the label information.
Alternatively, described method also includes:
During receiving calls, other side's voice of certain time length is gathered;
Other side's voice is sent to cloud server, so that other side's voice is carried out voice point by cloud server
Analysis, obtains the phonetic feature point of other side's voice, and the phonetic feature point of other side's voice is white with what is pre-build
Phonetic feature point in list voice feature data storehouse is matched, and when matching unsuccessful, returns to other side
Phone whether be malicious call selection prompting;
Whether it is the selection prompting of malicious call according to what cloud server fed back, if detecting user's selection
During malicious call option, the malicious call option that user selects is sent to cloud server, so that high in the clouds
Be saved in the phonetic feature point of other side's voice in malicious call voice feature data storehouse by server.
The embodiment of the present invention also provides a kind of identifying device of malicious call, including:
Acquisition module, for during receiving calls, gathering other side's voice of certain time length;
Sending module, for other side's voice to be sent into cloud server, so that cloud server is by other side
Voice carries out speech analysis, obtains the phonetic feature point of other side's voice, by the phonetic feature point of other side's voice
Matched with the phonetic feature point in the malicious call voice feature data storehouse for pre-building, matched into
During work(, the prompting of malicious call is returned;
Display module, the prompting of the malicious call for being fed back according to cloud server, on call interface
Show the prompting of the malicious call.
Alternatively, described device also includes:
Detection module, for during receiving calls, according to user instruction, detects user's selection and dislikes
Meaning phone options;
The acquisition module, it is malicious call to be additionally operable to other side's incoming identification, and to the language of malicious call
Sound carries out the recording of certain time length;
The sending module, is additionally operable to for the voice of malicious call to be sent to cloud server, so that described
Cloud server carries out speech analysis to the voice of malicious call, obtains the phonetic feature point of malicious call,
The phonetic feature point of the malicious call is saved in malicious call voice feature data storehouse.
Alternatively, the malicious call includes intermediary's phone, sale call, fraudulent call, harassing call
Or self-defined phone;
The detection module specifically for:During receiving calls, phone mark is shown on call interface
Option is signed, the phone label option includes the label of intermediary's phone, the label of sale call, swindle
The option of the label of phone, the label of harassing call or self-defined phone label, so that user is according to other side
When voice selects any label in phone label option, by the label that other side's incoming identification is user's selection
Corresponding malicious call.
Alternatively, described device also includes:
Add module, for the label selected according to user, adds in the voice of the malicious call recorded
The label information.
Alternatively, the add module, is additionally operable to add incoming call number in the voice of the malicious call recorded
Code.
Alternatively, the malicious call voice feature data storehouse includes:The incoming call number of multiple malicious calls
Code information, the phonetic feature point information of multiple malicious calls, the label information of the voice of multiple malicious calls;
Also include in the malicious call voice feature data storehouse:The caller ID of malicious call and malice electricity
The phonetic feature point of corresponding relation, malicious call between the phonetic feature point of words is corresponding with label to close
System, the one-to-one relationship between the caller ID of malicious call and phonetic feature point and label.
Alternatively, if the prompting of the malicious call includes label information, the display module is used for:
The label information that prompting according to the malicious call includes, shows the label letter on call interface
Cease corresponding malicious call label.
Alternatively, the acquisition module, is additionally operable to during receiving calls, and gathers the right of certain time length
Fang Yuyin;
The sending module, is additionally operable to for other side's voice to be sent to cloud server, so that cloud server
Other side's voice is carried out into speech analysis, the phonetic feature point of other side's voice is obtained, by the voice of other side's voice
Characteristic point is matched with the phonetic feature point in the white list voice feature data storehouse for pre-building,
With it is unsuccessful when, return counterpart telephone whether be malicious call selection prompting;
The detection module, whether be additionally operable to be fed back according to cloud server is that the selection of malicious call is carried
Show, when user's selection malicious call option is detected, the malicious call option that user is selected passes through institute
State sending module and be sent to cloud server, so that cloud server protects the phonetic feature point of other side's voice
It is stored in malicious call voice feature data storehouse.
The embodiment of the present invention is based on malicious call voice feature data storehouse, when user is in the process of receiving calls
In, other side's voice of certain time length can be gathered;And other side's voice is sent to cloud server, so that
Other side's voice is carried out speech analysis by cloud server, the phonetic feature point of other side's voice is obtained, by other side
The phonetic feature point of voice is matched with the phonetic feature point in malicious call voice feature data storehouse,
When the match is successful, the prompting of malicious call is returned;Further, the malice fed back according to cloud server
The prompting of phone, shows the prompting of the malicious call on call interface, so that user hangs up electricity in time
Words malicious call, preventing from having dust thrown into the eyes, therefore can improve user makes telephonic security.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes of the application
Point, the schematic description and description of the application is used to explain the application, does not constitute to the application's
Improper restriction.In the accompanying drawings:
Fig. 1 is a kind of collocation method in the phonetic feature storehouse of malicious call of the offer of the embodiment of the present application
Schematic flow sheet;
Fig. 2 is a kind of schematic flow sheet of the recognition methods of malicious call of the offer of the embodiment of the present application;
Fig. 3 is a kind of structural representation of the identifying device of malicious call of the offer of the embodiment of the present application.
Specific embodiment
Embodiments of the present invention are described in detail below in conjunction with drawings and Examples, thereby to the present invention
How application technology means can fully understand to solve technical problem and reach the implementation process of technology effect
And implement according to this.
In a typical configuration, computing device include one or more processors (CPU), input/
Output interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory
And/or the form, such as read-only storage (ROM) or flash memory (flash RAM) such as Nonvolatile memory (RAM).
Internal memory is the example of computer-readable medium.
Computer-readable medium includes that permanent and non-permanent, removable and non-removable media can be by
Any method or technique realizes information Store.Information can be computer-readable instruction, data structure,
The module of program or other data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory
(PRAM), static RAM (SRAM), dynamic random access memory (DRAM), other
The random access memory (RAM) of type, read-only storage (ROM), electrically erasable is read-only deposits
Reservoir (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage
(CD-ROM), digital versatile disc (DVD) or other optical storages, magnetic cassette tape, tape magnetic
Disk storage or other magnetic storage apparatus or any other non-transmission medium, can be used for storage can be counted
The information that calculation equipment is accessed.Defined according to herein, computer-readable medium does not include non-temporary computer
Readable media (transitory media), such as data-signal and carrier wave of modulation.
Some vocabulary are such as have invoked in the middle of specification and claim to censure specific components.This area skill
Art personnel are, it is to be appreciated that hardware manufacturer may call same component with different nouns.This explanation
Book and claim not in the way of the difference of title is used as distinguishing component, but with component in function
On difference be used as distinguish criterion.Such as " the bag in specification in the whole text and claim mentioned in
Containing " it is an open language, therefore " include but be not limited to " should be construed to." substantially " refer to can
In the error range of reception, those skilled in the art can solve the technology in the range of certain error and ask
Topic, basically reaches the technique effect.Additionally, " coupling " one word is herein comprising any directly and indirect
Electric property coupling means.Therefore, if a first device is coupled to a second device described in text, represent
The first device can directly be electrically coupled to the second device, or by other devices or coupling means
The second device is electrically coupled to indirectly.Specification subsequent descriptions are implementation preferable implementation of the invention
Mode, so the description is for the purpose of illustrating rule of the invention, to be not limited to the present invention
Scope.Protection scope of the present invention ought be defined depending on the appended claims person of defining.
Also, it should be noted that term " including ", "comprising" or its any other variant be intended to contain
Lid nonexcludability is included, so that commodity or system including a series of key elements not only include those
Key element, but also other key elements including being not expressly set out, or also include for this commodity or
The intrinsic key element of system.In the absence of more restrictions, being limited by sentence "including a ..."
Fixed key element, it is not excluded that also exist in the commodity or system including the key element it is other it is identical will
Element
The recognition methods of the malicious call of the embodiment of the present invention is to be based on malicious call voice feature data storehouse,
When user is during receiving calls, other side's voice of certain time length can be gathered;And send out other side's voice
Cloud server is given, so that other side's voice is carried out speech analysis by cloud server, other side's voice is obtained
Phonetic feature point, by the language in the phonetic feature point of other side's voice and malicious call voice feature data storehouse
Sound characteristic point is matched, and when the match is successful, returns to the prompting of malicious call;Further, according to
The prompting of the malicious call of cloud server feedback, shows carrying for the malicious call on call interface
Show, so that user hangs up the telephone malicious call in time, prevent from having dust thrown into the eyes.
Therefore, before the recognition methods of malicious call provided in an embodiment of the present invention is discussed in detail, this hair
The bright embodiment illustratively collocation method in the phonetic feature storehouse of malicious call first:
Fig. 1 is a kind of collocation method in the phonetic feature storehouse of malicious call of the offer of the embodiment of the present application
Schematic flow sheet, as shown in figure 1, including:
101st, during receiving calls, phone label option is shown on call interface;
The malicious call of the present embodiment for example includes intermediary's phone, sale call, fraudulent call, harassing and wrecking electricity
Words or self-defined phone etc., it is corresponding, in the present embodiment, corresponding electricity is provided with to each malicious call
Words label, wherein, phone label option for example including the label of intermediary's phone, the label of sale call,
The option of the label of fraudulent call, the label of harassing call or self-defined phone label.
102nd, when user selects any label according to other side's voice in phone label option, other side is come
Electricity is designated the malicious call corresponding to the label of user's selection;
Specifically, for example, when user determines that incoming call is intermediary's phone according to other side's voice, can be in phone
Intermediary's phone label is selected in label option, other side's incoming identification is designated intermediary's phone;And for example,
When user determines that incoming call is fraudulent call according to other side's voice, swindle can be selected in phone label option
Phone label, fraudulent call is designated by other side's incoming identification, and differ an illustration here.
103rd, the voice to malicious call carries out the recording of certain time length;
Alternatively, the voice of malicious call is carried out in step 103 after the recording of certain time length, is also wrapped
Include:According to the phone label that user selects, user's selection is added in the voice of the malicious call recorded
Phone label;
Alternatively, the voice of malicious call is carried out in step 103 after the recording of certain time length, is also wrapped
Include:Caller ID is added in the voice of the malicious call recorded.
104th, the voice of malicious call is sent to cloud server;
105th, cloud server carries out speech analysis to the voice of malicious call, obtains the language of malicious call
Sound characteristic point;
Specifically, phonetic feature point can be carried out using speech recognition technology when step 105 is implemented
Extract, specifically include:
Obtain the power spectrum of the voice of the malicious call;
The power spectrum that will be obtained obtains the short-time rating spectrum of noisy speech by filtering process;
Short-time rating spectrum according to the noisy speech for being obtained, noisy speech is asked for by the way of frame is average
Medium duration power spectrum;
The medium duration power spectrum of the noisy speech to being obtained carries out asymmetric filtering and shelters anti-noise, with
Obtain the medium duration power spectrum of clean speech;
The medium duration power spectrum of medium duration power spectrum, noisy speech according to the clean speech and contain
Make an uproar voice short-time rating spectrum obtain clean speech short-time rating spectrum;
Short-time rating spectrum to clean speech carries out energy normalized treatment, to eliminate multiplying property noise;
Short-time rating spectrum to eliminating the clean speech of multiplying property noise the loudness such as carries out and aggravates
The short-time rating of the clean speech after reciprocity loudness exacerbation is composed into row index nonlinear operation;
Short-time rating to having carried out the clean speech after index nonlinear operation is composed and carries out Fourier inversion
Change, to ask for cepstrum coefficient;
Mean normalization treatment is carried out to cepstrum coefficient, the phonetic feature point of the malicious call is obtained.
Speech recognition technology of the present invention any can realize that phonetic feature point lifts with existing
Speech recognition technology, the present invention this is not limited in any way.
106th, the phonetic feature point of malicious call is saved in malicious call voice feature data storehouse.
In a kind of optional implementation method, if carrying the malice electricity in the voice of the malicious call
The label of words;Then step 106 includes when implementing:
The label carried in voice according to the malicious call, sets up the phonetic feature of the malicious call
Put the corresponding relation with the label;
The phonetic feature point of the malicious call is saved in malicious call with the corresponding relation of the label
Voice feature data storehouse.
In a kind of optional implementation method, if carrying the malice electricity in the voice of the malicious call
The caller ID of words;Then step 106 includes when implementing:
The caller ID carried in voice according to the malicious call, sets up the voice of the malicious call
The corresponding relation of characteristic point and the caller ID;
The phonetic feature point of the malicious call and the corresponding relation of the caller ID are saved in malice
Call voice property data base.
In a kind of optional implementation method, cloud server receives the malicious call that user equipment sends
After voice, can also be by the speech recognition of the malicious call into corresponding text information;Set up described
Corresponding relation between the phonetic feature point of the text information of malicious call and the malicious call, and by institute
The corresponding relation stated between the text information of malicious call and the phonetic feature point of the malicious call is preserved
To in malicious call voice feature data storehouse.
In a kind of optional implementation method, the embodiment of the present invention also includes:
During receiving calls, other side's voice of certain time length is gathered;
Other side's voice is sent to cloud server, so that other side's voice is carried out voice point by cloud server
Analysis, obtains the phonetic feature point of other side's voice, and the phonetic feature point of other side's voice is white with what is pre-build
Phonetic feature point in list voice feature data storehouse is matched, and when matching unsuccessful, returns to other side
Phone whether be malicious call selection prompting;
Whether it is the selection prompting of malicious call according to what cloud server fed back, if detecting user's selection
During malicious call option, the malicious call option that user selects is sent to cloud server, so that high in the clouds
Be saved in the phonetic feature point of other side's voice in malicious call voice feature data storehouse by server.
Wherein, the foundation in the white list voice feature data storehouse for pre-building is, for example, as follows:User equipment
Contact phone in white list is received, the call voice of contact person in white list is gathered and is sent to high in the clouds clothes
Business device, cloud server carries out phonetic feature point extraction to the call voice of contact person in white list, will be white
The phonetic feature point of the call voice of contact person is saved in white list voice feature data storehouse in list.
It follows that the collocation method in the phonetic feature storehouse of the malicious call for providing according to embodiments of the present invention
Included but is not limited in the malicious call voice feature data storehouse for obtaining:The caller ID of multiple malicious calls
Information, the phonetic feature point information of multiple malicious call, the label information of the voice of multiple malicious calls,
The corresponding text information of voice of multiple malicious calls;
Further, the collocation method in the phonetic feature storehouse of malicious call provided in an embodiment of the present invention is obtained
Malicious call voice feature data storehouse in can also include:The caller ID and malicious call of malicious call
Phonetic feature point between corresponding relation, the corresponding relation of the phonetic feature point of malicious call and label,
The phonetic feature point of malicious call and the corresponding relation of text information, the caller ID and word of malicious call
The corresponding relation of information, the corresponding relation of the label of malicious call and text information, the incoming call of malicious call
One-to-one relationship, the caller ID of malicious call between number and phonetic feature point and label, language
Sound characteristic point, the one-to-one relationship between label and text information.
Recognition methods below by way of specific embodiment to malicious call of the invention is described in detail.
Fig. 2 is a kind of schematic flow sheet of the recognition methods of malicious call of the offer of the embodiment of the present application,
As shown in Fig. 2 including:
201st, during receiving calls, other side's voice of certain time length is gathered;
202nd, other side's voice is sent to cloud server, so that cloud server carries out other side's voice
Speech analysis, obtains the phonetic feature point of other side's voice, by the phonetic feature point of other side's voice with build in advance
Phonetic feature point in vertical malicious call voice feature data storehouse is matched, and when the match is successful, is returned
Return the prompting of malicious call;
Specifically, other side's voice is carried out speech analysis by cloud server, and the voice for obtaining other side's voice is special
Levy a little for example includes when realizing:
Obtain the power spectrum of other side's voice;
The power spectrum that will be obtained obtains the short-time rating spectrum of noisy speech by filtering process;
Short-time rating spectrum according to the noisy speech for being obtained, noisy speech is asked for by the way of frame is average
Medium duration power spectrum;
The medium duration power spectrum of the noisy speech to being obtained carries out asymmetric filtering and shelters anti-noise, with
Obtain the medium duration power spectrum of clean speech;
The medium duration power spectrum of medium duration power spectrum, noisy speech according to the clean speech and contain
Make an uproar voice short-time rating spectrum obtain clean speech short-time rating spectrum;
Short-time rating spectrum to clean speech carries out energy normalized treatment, to eliminate multiplying property noise;
Short-time rating spectrum to eliminating the clean speech of multiplying property noise the loudness such as carries out and aggravates
The short-time rating of the clean speech after reciprocity loudness exacerbation is composed into row index nonlinear operation;
Short-time rating to having carried out the clean speech after index nonlinear operation is composed and carries out Fourier inversion
Change, to ask for cepstrum coefficient;
Mean normalization treatment is carried out to cepstrum coefficient, the phonetic feature point of other side's voice is obtained.
Specifically, by the phonetic feature point of other side's voice and the malicious call voice feature data for pre-building
Phonetic feature point in storehouse is matched for example to be included when realizing:
By in the phonetic feature point of other side's voice and the malicious call voice feature data storehouse for pre-building
When phonetic feature point is matched, if the feature point number being consistent is more than or equal to default threshold value,
Can determine that the match is successful, otherwise it fails to match.
203rd, the prompting of the malicious call fed back according to cloud server, shows described on call interface
The prompting of malicious call.
If the prompting of the malicious call includes label information, step 203 includes:
The label information that user equipment includes according to the prompting of the malicious call, shows on call interface
Show the corresponding malicious call label of the label information.For example, the malicious call of cloud server feedback
Prompting includes fraudulent call label, then the prompting of fraudulent call is shown as on call interface;And for example,
The prompting of the malicious call of cloud server feedback includes advertisement telephone label, then show on call interface
It is shown as the prompting of advertisement telephone.
The evil that the collocation method in the phonetic feature storehouse based on malicious call provided in an embodiment of the present invention is obtained
Meaning call voice property data base, when user is during receiving calls, can gather the right of certain time length
Fang Yuyin;And other side's voice is sent to cloud server, so that cloud server carries out other side's voice
Speech analysis, obtains the phonetic feature point of other side's voice, by the phonetic feature point of other side's voice and malice electricity
Phonetic feature point in language sound property data base is matched, and when the match is successful, returns to malicious call
Prompting;Further, the prompting of the malicious call for being fed back according to cloud server, on call interface
The prompting of the malicious call is shown, so that user hangs up the telephone malicious call in time, prevents from having dust thrown into the eyes,
Therefore user can be improved makes telephonic security.
Fig. 3 is a kind of structural representation of the identifying device of malicious call of the offer of the embodiment of the present application,
As shown in figure 3, including:
Acquisition module 31, for during receiving calls, gathering other side's voice of certain time length;
Sending module 32, for other side's voice to be sent into cloud server, so that cloud server will
Other side's voice carries out speech analysis, obtains the phonetic feature point of other side's voice, and the voice of other side's voice is special
Levy and a little matched with the phonetic feature point in the malicious call voice feature data storehouse for pre-building,
During with success, the prompting of malicious call is returned;
Display module 33, the prompting of the malicious call for being fed back according to cloud server, on call circle
The prompting of the malicious call is shown on face.
Alternatively, described device also includes:
Detection module 34, for during receiving calls, according to user instruction, detects user's choosing
Select malicious call option;
The acquisition module 31, it is malicious call to be additionally operable to other side's incoming identification, and to malicious call
Voice carry out the recording of certain time length;
The sending module 33, is additionally operable to for the voice of malicious call to be sent to cloud server, so that
The cloud server carries out speech analysis to the voice of malicious call, obtains the phonetic feature of malicious call
Point, the phonetic feature point of the malicious call is saved in malicious call voice feature data storehouse.
The malicious call includes intermediary's phone, sale call, fraudulent call, harassing call or self-defined
Phone;
The detection module 34 specifically for:During receiving calls, electricity is shown on call interface
Words label option, the phone label option include the label of intermediary's phone, the label of sale call,
The option of the label of fraudulent call, the label of harassing call or self-defined phone label, so as to user according to
It is user's selection by other side's incoming identification when other side's voice selects any label in phone label option
Malicious call corresponding to label.
Alternatively, described device also includes:
Add module 35, for the label selected according to user, in the voice of the malicious call recorded
Add the label information.
The add module 35, is additionally operable to add caller ID in the voice of the malicious call recorded.
The malicious call voice feature data storehouse includes:The caller ID information of multiple malicious calls,
The label information of the phonetic feature point information of multiple malicious calls, the voice of multiple malicious calls;
Also include in the malicious call voice feature data storehouse:The caller ID of malicious call and malice electricity
The phonetic feature point of corresponding relation, malicious call between the phonetic feature point of words is corresponding with label to close
System, the one-to-one relationship between the caller ID of malicious call and phonetic feature point and label.
If the prompting of the malicious call includes label information, the display module 33 is used for:Root
According to the label information that the prompting of the malicious call includes, the label information is shown on call interface
Corresponding malicious call label.
The acquisition module 31, is additionally operable to during receiving calls, and gathers other side's language of certain time length
Sound;
The sending module 32, is additionally operable to for other side's voice to be sent to cloud server, so that high in the clouds takes
Other side's voice is carried out speech analysis by business device, the phonetic feature point of other side's voice is obtained, by other side's voice
Phonetic feature point is matched with the phonetic feature point in the white list voice feature data storehouse for pre-building,
Match it is unsuccessful when, return counterpart telephone whether be malicious call selection prompting;
The detection module 34, be additionally operable to according to cloud server feed back whether be malicious call choosing
Prompting is selected, when user's selection malicious call option is detected, the malicious call option that user selects is led to
Cross the sending module and be sent to cloud server, so that cloud server is by the phonetic feature of other side's voice
Point is saved in malicious call voice feature data storehouse.
Fig. 3 shown devices can perform the method described in Fig. 1 and embodiment illustrated in fig. 2, and it realizes former
Reason and technique effect are repeated no more.
1a, a kind of recognition methods of malicious call, perform positioned at user equipment side, including:
During receiving calls, other side's voice of certain time length is gathered;
Other side's voice is sent to cloud server, so that other side's voice is carried out voice point by cloud server
Analysis, obtains the phonetic feature point of other side's voice, by phonetic feature point and the evil for pre-building of other side's voice
Phonetic feature point in meaning call voice property data base is matched, and when the match is successful, returns to malice
The prompting of phone;
The prompting of the malicious call fed back according to cloud server, shows the malice electricity on call interface
The prompting of words.
2a, the method as described in 1a, also include:
During receiving calls, according to user instruction, when user's selection malicious call option is detected,
It is malicious call by other side's incoming identification, and the recording of certain time length is carried out to the voice of malicious call;
The voice of malicious call is sent to cloud server, so that the cloud server is to malicious call
Voice carry out speech analysis, the phonetic feature point of malicious call is obtained, by the voice of the malicious call
Characteristic point is saved in malicious call voice feature data storehouse.
3a, the method as described in 2a, the malicious call include intermediary's phone, sale call, swindle
Phone, harassing call or self-defined phone;
During receiving calls, according to user instruction, when user's selection malicious call option is detected,
It is malicious call by other side's incoming identification, including:
During receiving calls, phone label option, the phone label choosing are shown on call interface
Item includes the label of intermediary's phone, the label of sale call, the label of fraudulent call, harassing call
The option of label or self-defined phone label, so that user selects according to other side's voice in phone label option
It is the malicious call corresponding to the label that user selects by other side's incoming identification when selecting any label.
4a, the method as described in 3a, after carrying out the recording of certain time length to the voice of malicious call,
Also include:
According to the label that user selects, the label information is added in the voice of the malicious call recorded.
5a, the method as described in 2a, after carrying out the recording of certain time length to the voice of malicious call,
Also include:
Caller ID is added in the voice of the malicious call recorded.
6a, the method as any one of 1a-5a, the malicious call voice feature data storehouse Zhong Bao
Include:Phonetic feature point information, the multiple of the caller ID information of multiple malicious calls, multiple malicious calls
The label information of the voice of malicious call;
Also include in the malicious call voice feature data storehouse:The caller ID of malicious call and malice electricity
The phonetic feature point of corresponding relation, malicious call between the phonetic feature point of words is corresponding with label to close
System, the one-to-one relationship between the caller ID of malicious call and phonetic feature point and label.
7a, the method as described in 6a, if the prompting of the malicious call includes label information, root
The prompting of the malicious call fed back according to cloud server, shows carrying for the malicious call on call interface
Show, including:
The label information that user equipment includes according to the prompting of the malicious call, shows on call interface
Show the corresponding malicious call label of the label information.
8a, the method as described in 1a, also include:
During receiving calls, other side's voice of certain time length is gathered;
Other side's voice is sent to cloud server, so that other side's voice is carried out voice point by cloud server
Analysis, obtains the phonetic feature point of other side's voice, and the phonetic feature point of other side's voice is white with what is pre-build
Phonetic feature point in list voice feature data storehouse is matched, and when matching unsuccessful, returns to other side
Phone whether be malicious call selection prompting;
Whether it is the selection prompting of malicious call according to what cloud server fed back, if detecting user's selection
During malicious call option, the malicious call option that user selects is sent to cloud server, so that high in the clouds
Be saved in the phonetic feature point of other side's voice in malicious call voice feature data storehouse by server.
9b, a kind of identifying device of malicious call, including:
Acquisition module, for during receiving calls, gathering other side's voice of certain time length;
Sending module, for other side's voice to be sent into cloud server, so that cloud server is by other side
Voice carries out speech analysis, obtains the phonetic feature point of other side's voice, by the phonetic feature point of other side's voice
Matched with the phonetic feature point in the malicious call voice feature data storehouse for pre-building, matched into
During work(, the prompting of malicious call is returned;
Display module, the prompting of the malicious call for being fed back according to cloud server, on call interface
Show the prompting of the malicious call.
10b, the device as described in 9b, also include:
Detection module, for during receiving calls, according to user instruction, detects user's selection and dislikes
Meaning phone options;
The acquisition module, it is malicious call to be additionally operable to other side's incoming identification, and to the language of malicious call
Sound carries out the recording of certain time length;
The sending module, is additionally operable to for the voice of malicious call to be sent to cloud server, so that described
Cloud server carries out speech analysis to the voice of malicious call, obtains the phonetic feature point of malicious call,
The phonetic feature point of the malicious call is saved in malicious call voice feature data storehouse.
11b, the device as described in 10b, the malicious call include intermediary's phone, sale call, swindleness
Deceive phone, harassing call or self-defined phone;
The detection module specifically for:During receiving calls, phone mark is shown on call interface
Option is signed, the phone label option includes the label of intermediary's phone, the label of sale call, swindle
The option of the label of phone, the label of harassing call or self-defined phone label, so that user is according to other side
When voice selects any label in phone label option, by the label that other side's incoming identification is user's selection
Corresponding malicious call.
12b, the device as described in 11b, also include:
Add module, for the label selected according to user, adds in the voice of the malicious call recorded
The label information.
13b, the device as described in 10b, the add module are additionally operable in the malicious call recorded
Caller ID is added in voice.
14b, the device as any one of 9b-13b, in the malicious call voice feature data storehouse
Including:It is the caller ID information of multiple malicious calls, the phonetic feature point information of multiple malicious calls, many
The label information of the voice of individual malicious call;
Also include in the malicious call voice feature data storehouse:The caller ID of malicious call and malice electricity
The phonetic feature point of corresponding relation, malicious call between the phonetic feature point of words is corresponding with label to close
System, the one-to-one relationship between the caller ID of malicious call and phonetic feature point and label.
15b, the device as described in 14b, if the prompting of the malicious call includes label information,
The display module is used for:The label information that prompting according to the malicious call includes, on call circle
The corresponding malicious call label of the label information is shown on face.
16b, the device as described in 9b:
The acquisition module, is additionally operable to during receiving calls, and gathers other side's voice of certain time length;
The sending module, is additionally operable to for other side's voice to be sent to cloud server, so that cloud server
Other side's voice is carried out into speech analysis, the phonetic feature point of other side's voice is obtained, by the voice of other side's voice
Characteristic point is matched with the phonetic feature point in the white list voice feature data storehouse for pre-building,
With it is unsuccessful when, return counterpart telephone whether be malicious call selection prompting;
The detection module, whether be additionally operable to be fed back according to cloud server is that the selection of malicious call is carried
Show, when user's selection malicious call option is detected, the malicious call option that user is selected passes through institute
State sending module and be sent to cloud server, so that cloud server protects the phonetic feature point of other side's voice
It is stored in malicious call voice feature data storehouse.
Described above has shown and described some preferred embodiments of the invention, but as it was previously stated, should manage
The solution present invention is not limited to form disclosed herein, is not to be taken as the exclusion to other embodiment,
And can be used for various other combinations, modification and environment, and can in invention contemplated scope described herein,
It is modified by the technology or knowledge of above-mentioned teaching or association area.And those skilled in the art are carried out changes
Dynamic and change does not depart from the spirit and scope of the present invention, then all should be in the protection of appended claims of the present invention
In the range of.
Claims (10)
1. a kind of recognition methods of malicious call, performs positioned at user equipment side, it is characterised in that bag
Include:
During receiving calls, other side's voice of certain time length is gathered;
Other side's voice is sent to cloud server, so that other side's voice is carried out voice point by cloud server
Analysis, obtains the phonetic feature point of other side's voice, by phonetic feature point and the evil for pre-building of other side's voice
Phonetic feature point in meaning call voice property data base is matched, and when the match is successful, returns to malice
The prompting of phone;
The prompting of the malicious call fed back according to cloud server, shows the malice electricity on call interface
The prompting of words.
2. the method for claim 1, it is characterised in that also include:
During receiving calls, according to user instruction, when user's selection malicious call option is detected,
It is malicious call by other side's incoming identification, and the recording of certain time length is carried out to the voice of malicious call;
The voice of malicious call is sent to cloud server, so that the cloud server is to malicious call
Voice carry out speech analysis, the phonetic feature point of malicious call is obtained, by the voice of the malicious call
Characteristic point is saved in malicious call voice feature data storehouse.
3. method as claimed in claim 2, it is characterised in that the malicious call includes dielectric
Words, sale call, fraudulent call, harassing call or self-defined phone;
During receiving calls, according to user instruction, when user's selection malicious call option is detected,
It is malicious call by other side's incoming identification, including:
During receiving calls, phone label option, the phone label choosing are shown on call interface
Item includes the label of intermediary's phone, the label of sale call, the label of fraudulent call, harassing call
The option of label or self-defined phone label, so that user selects according to other side's voice in phone label option
It is the malicious call corresponding to the label that user selects by other side's incoming identification when selecting any label.
4. the method as any one of claim 1-3, it is characterised in that the malicious call
Voice feature data storehouse includes:The language of the caller ID information of multiple malicious calls, multiple malicious calls
The label information of sound characteristic point information, the voice of multiple malicious calls;
Also include in the malicious call voice feature data storehouse:The caller ID of malicious call and malice electricity
The phonetic feature point of corresponding relation, malicious call between the phonetic feature point of words is corresponding with label to close
System, the one-to-one relationship between the caller ID of malicious call and phonetic feature point and label.
5. method as claimed in claim 4, it is characterised in that if in the prompting of the malicious call
Including label information, then the prompting of the malicious call for being fed back according to cloud server shows on call interface
Show the prompting of the malicious call, including:
The label information that user equipment includes according to the prompting of the malicious call, shows on call interface
Show the corresponding malicious call label of the label information.
6. a kind of identifying device of malicious call, it is characterised in that including:
Acquisition module, for during receiving calls, gathering other side's voice of certain time length;
Sending module, for other side's voice to be sent into cloud server, so that cloud server is by other side
Voice carries out speech analysis, obtains the phonetic feature point of other side's voice, by the phonetic feature point of other side's voice
Matched with the phonetic feature point in the malicious call voice feature data storehouse for pre-building, matched into
During work(, the prompting of malicious call is returned;
Display module, the prompting of the malicious call for being fed back according to cloud server, on call interface
Show the prompting of the malicious call.
7. device as claimed in claim 6, it is characterised in that also include:
Detection module, for during receiving calls, according to user instruction, detects user's selection and dislikes
Meaning phone options;
The acquisition module, it is malicious call to be additionally operable to other side's incoming identification, and to the language of malicious call
Sound carries out the recording of certain time length;
The sending module, is additionally operable to for the voice of malicious call to be sent to cloud server, so that described
Cloud server carries out speech analysis to the voice of malicious call, obtains the phonetic feature point of malicious call,
The phonetic feature point of the malicious call is saved in malicious call voice feature data storehouse.
8. device as claimed in claim 6, it is characterised in that the malicious call includes dielectric
Words, sale call, fraudulent call, harassing call or self-defined phone;
The detection module specifically for:During receiving calls, phone mark is shown on call interface
Option is signed, the phone label option includes the label of intermediary's phone, the label of sale call, swindle
The option of the label of phone, the label of harassing call or self-defined phone label, so that user is according to other side
When voice selects any label in phone label option, by the label that other side's incoming identification is user's selection
Corresponding malicious call.
9. the device as any one of claim 6-8, it is characterised in that the malicious call
Voice feature data storehouse includes:The language of the caller ID information of multiple malicious calls, multiple malicious calls
The label information of sound characteristic point information, the voice of multiple malicious calls;
Also include in the malicious call voice feature data storehouse:The caller ID of malicious call and malice electricity
The phonetic feature point of corresponding relation, malicious call between the phonetic feature point of words is corresponding with label to close
System, the one-to-one relationship between the caller ID of malicious call and phonetic feature point and label.
10. device as claimed in claim 9, it is characterised in that if in the prompting of the malicious call
Including label information, then the display module is used for:The mark that prompting according to the malicious call includes
Label information, shows the corresponding malicious call label of the label information on call interface.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510808754.4A CN106782495A (en) | 2015-11-20 | 2015-11-20 | The recognition methods of malicious call and device |
PCT/CN2016/106145 WO2017084591A1 (en) | 2015-11-20 | 2016-11-16 | Identification method and device for malicious call |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510808754.4A CN106782495A (en) | 2015-11-20 | 2015-11-20 | The recognition methods of malicious call and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106782495A true CN106782495A (en) | 2017-05-31 |
Family
ID=58717391
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510808754.4A Pending CN106782495A (en) | 2015-11-20 | 2015-11-20 | The recognition methods of malicious call and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106782495A (en) |
WO (1) | WO2017084591A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107154996A (en) * | 2017-06-30 | 2017-09-12 | 广东欧珀移动通信有限公司 | Call blocking method, device, storage medium and terminal |
CN108848507A (en) * | 2018-05-31 | 2018-11-20 | 厦门快商通信息技术有限公司 | A kind of bad telecommunication user information collecting method |
CN109547621A (en) * | 2018-12-11 | 2019-03-29 | 平安科技(深圳)有限公司 | A kind of information prompting method, device, electronic equipment and storage medium |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112151070B (en) * | 2019-06-26 | 2023-05-05 | 杭州海康威视数字技术股份有限公司 | Voice detection method and device and electronic equipment |
CN110610705B (en) * | 2019-09-20 | 2023-07-25 | 上海数鸣人工智能科技有限公司 | Voice interaction prompter based on artificial intelligence |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103095889B (en) * | 2013-01-07 | 2015-06-03 | 上海欣方智能系统有限公司 | Junk call intercepting system based on talk mode identification and operating method thereof |
CN104113466A (en) * | 2013-04-17 | 2014-10-22 | 腾讯科技(深圳)有限公司 | Harassing phone call identification method, client, server and system |
CN105338157A (en) * | 2014-07-29 | 2016-02-17 | 小米科技有限责任公司 | Nuisance call processing method, and device and telephone |
CN104184872A (en) * | 2014-09-14 | 2014-12-03 | 陈桂芳 | Crank call preventing mobile phone achieving method based on conversation content |
CN104320529A (en) * | 2014-11-10 | 2015-01-28 | 京东方科技集团股份有限公司 | Information receiving processing method and voice communication device |
CN105120068A (en) * | 2015-07-16 | 2015-12-02 | 百度在线网络技术(北京)有限公司 | Voice communication answering method and device |
-
2015
- 2015-11-20 CN CN201510808754.4A patent/CN106782495A/en active Pending
-
2016
- 2016-11-16 WO PCT/CN2016/106145 patent/WO2017084591A1/en active Application Filing
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107154996A (en) * | 2017-06-30 | 2017-09-12 | 广东欧珀移动通信有限公司 | Call blocking method, device, storage medium and terminal |
CN108848507A (en) * | 2018-05-31 | 2018-11-20 | 厦门快商通信息技术有限公司 | A kind of bad telecommunication user information collecting method |
CN109547621A (en) * | 2018-12-11 | 2019-03-29 | 平安科技(深圳)有限公司 | A kind of information prompting method, device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2017084591A1 (en) | 2017-05-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106782495A (en) | The recognition methods of malicious call and device | |
US11450324B2 (en) | Method of defending against inaudible attacks on voice assistant based on machine learning | |
CN106686191A (en) | Processing method for adaptively identifying harassing call and processing system thereof | |
CN106790950A (en) | The recognition methods of malicious call and device | |
US20200034743A1 (en) | Bot-based data collection for detecting phone solicitations | |
CN105279416B (en) | Personal identification method and its system based on multi-biological characteristic bonding apparatus fingerprint | |
US9837079B2 (en) | Methods and apparatus for identifying fraudulent callers | |
CN106790949A (en) | The collocation method and device in the phonetic feature storehouse of malicious call | |
CN106778113A (en) | The method and apparatus that mobile terminal and application are unlocked by Intelligent worn device | |
CN106453061A (en) | Method and system for recognizing internet fraud behavior | |
CN106850931A (en) | The method and mobile intelligent terminal of Barassment preventing telephone | |
JP2023515910A (en) | System and method for using relationship structure for email classification | |
US11363139B2 (en) | Identifying, screening, and blocking of calls from problematic telecommunications carriers and number blocks | |
Li et al. | Behaviour profiling on mobile devices | |
Giura et al. | Is it really you? User identification via adaptive behavior fingerprinting | |
CN104869264A (en) | Method of monitoring swindle telephone and joining telephone conference and device of monitoring swindle telephone and joining telephone conference | |
CN107742068A (en) | A kind of implicit identity authorization system of the multi-source of smart machine and method | |
CN106874718A (en) | privacy processing method, device and terminal | |
KR101033870B1 (en) | Method and device for processing spam call | |
CN106559551A (en) | A kind of information cuing method of address list, device | |
CN106161018A (en) | A kind of method and apparatus managing classification password | |
CN109246296A (en) | A kind of mobile phone safe information generates and storage method | |
Marzuoli et al. | Call me: Gathering threat intelligence on telephony scams to detect fraud | |
RO135860A2 (en) | System and method for anonymization of identification data of persons participating in an audio/video call | |
CN115396548B (en) | Incoming call interception method and device, wearable equipment and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170531 |
|
WD01 | Invention patent application deemed withdrawn after publication |